Skip to main content

Be fraud aware - What are phishing, smishing and vishing.

 You may have heard the terms phishing, smishing or vishing before, but what exactly do they mean?

At their core, all three terms are a type of financial fraud which tricks unsuspecting victims into giving out sensitive personal information, handing over money or installing malware onto their device.

The only difference between each term is the channel via which you can be targeted; phishing refers to scam emails, smishing refers to scam text or WhatsApp messages and vishing takes place over the phone.

Phishing

The most common phishing method encourages victims to visit a malicious website through a fake email message, which appears to be sent from a legitimate company or source (e.g. from a bank, HMRC, a delivery company or the NHS).

For example, you might receive an email which appears to be from an organisation who you’re familiar with, asking you to click on a link. At this point you will be taken to a webpage on which you’re asked to submit sensitive data, such as passwords, usernames or bank details. This might sound like an obvious trick, but cyber criminals are highly adept at creating authentic looking emails and fake websites which lull victims into a false sense of security as they can look just like the real thing.

Another common method of attack uses emails that appear to come from a legitimate source, but include attachments containing dangerous software (otherwise known as ‘malware’) which could be capable of stealing personal information. The attachment might be labelled as ‘receipt’, ‘invoice’ or something equally enticing to encourage you to open it, at which point the malware is downloaded onto your device.

An example of a real smishing attempt sent to one of our customers

Smishing

Smishing follows largely the same pattern as phishing but it takes place over text (also known as SMS) or messaging services like WhatsApp.

For example, you might have heard of the recent Royal Mail scam, in which thousands of people around the UK received a fake text message claiming that payment was required in order for a package to be delivered. Recipients of the message were instructed to click on a link, directing them to a fraudulent website which collected personal and payment details.

Vishing

Unlike phishing or smishing, vishing refers to over-the-phone fraud where criminals will call you, posing as your bank or another seemingly reputable company, in order to verbally obtain sensitive data such as passwords, addresses and so on.

You may be familiar with the recent HMRC vishing scam, in which fraudsters used an automated phone call to convince victims that they had unpaid tax bills to settle, conning them out of hundreds of pounds. In this particular case the criminals were able to mimic the official HMRC number and used the threat of filing a lawsuit against the victims to scare them into making the payment.


How to protect yourself

Follow these helpful dos and don’ts to prevent yourself from becoming a victim of a phishing attempt…

Don't

  • Disclose any card security details, like your PIN number, Internet Banking log in details or card number, over the phone, by email or text message or via a link included in an email or text.
  • Feel rushed or pressured into making a decision. No genuine bank or other legitimate organisation would ask you to carry out a transaction on the spot.
  • Assume that an email, phone call or text message is authentic. If in doubt hang up the phone or delete the email or text message without opening it.
  • Click on links or attachments included in unsolicited emails or text messages.

Do

  • Call companies back using the number on their website. If you are unsure whether a phone call, email or text message request is genuine, it always best to call the organisation back using the number on its website to confirm.
  • Check email addresses, phone numbers and URLs carefully – do they look suspicious?
  • Install up-to-date anti-virus software on your devices.
  • Follow the ABC framework for fraud: Accept nothing, Believe no-one and Confirm everything.

Comments

Popular posts from this blog

Applications and Threats Content Release Notes

  Threat Intelligence Report Top Attacks and Breaches The biochemical systems at an Oxford university research lab currently studying the Covid-19 pandemic has been  breached . Clinical research was not affected by the incident. Breached systems include machines used to prepare biochemical samples, and hackers are currently attempting to  sell  their access to those machines. Twitter has permanently  suspended  multiple accounts found to be part of four disinformation campaign networks, most likely operated by state-sponsored actors associated with Iran, Russia and Armenia. The Iranian infrastructure was previously used to disrupt the 2020 US presidential campaign discourse. Gmail accounts of global pro-Tibet organizations have been  targeted  by the Chinese APT TA413, an espionage group known for its operations against civil dissidents. The campaign leverages a customized malicious Mozilla Firefox browser extension to gain control over the victims’ Gmail accounts. Npower, a British ga

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has rel

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Local Interface . The  Local Subnets  will be added automatically. Set  Remote