What Are The Newest Phishing Attacks?

 

Phishing is a term adopted from the word “fishing.” When we go fishing, we put a line in the water with bait on it, and we sit back and wait for the fish to come along and take the bait. Maybe the fish was hungry. Perhaps it just wasn’t paying attention. At any rate, eventually a fish will bite, and you’ll have something delicious for dinner.

 

How Does Phishing Work?

 

This is essentially how cyber phishing works: Cybercriminals create an interesting email, maybe saying that you’ve won a $100 gift certificate from Amazon. Sound too good to be true? Find out! All you have to do is click the link and take a short survey. Easy enough, right?

 

Once you click the link, guess what happens? A virus is downloaded onto your system. Sometimes it’s malware, and sometimes it’s ransomware. Malware includes Trojans, worms, spyware, adware, and rootkits. These malicious programs each have different goals, but all are destructive and aimed at harming your computers.

 

Ransomware encrypts all your files until you pay a ransom, but even then, there’s no guarantee you’ll get your database restored. Malware is all about stealing credentials, passwords, and other valuable information from your company. Sometimes it’s just about destroying your data.

 

As cyber thieves continue to steal from people all over the world, they create new ways to do this. After all, many people have become familiar with some phishing scams so they may not work as well. The solution is to come up with new scams that are enticing—things that users may not have heard about before. The more convincing hackers can make their scams, the more successful they will be.

 

How Has Phishing Changed?

 

The entire landscape of cybercrime is changing. It used to be mostly young guys sitting in their parent’s basement, trying to find clever ways to pass the time. Unfortunately, this crime has become so successful that the governments of countries are now involved. A vast majority of ransomware schemes originate in Russia. The government employs hundreds of hackers, and have teams of IT experts who work around the clock to create new and more effective hacking scams.

 

When hackers are backed by a government like China, they have practically unlimited resources. This makes them even harder to stop. If they were merely individuals committing crimes for personal gain, the authorities could track them down and put them in jail. But today’s cybercriminals are well-organized agencies that are part of a large foreign government, so stopping them is almost impossible.

 

What Are Some Of The New Types Of Phishing Scams?

 

Below, we discuss some of the most notorious cybercrimes and some new ones that are making the rounds:

 

Sextortion: Have you ever sent nude photos to someone? Are there any lewd or compromising photos of you floating around? Sextortion is all about locating embarrassing photos of you. If you own a business, then this can be a crime that pays well for thieves. They send the business owner a little sample of the erotic photos, then demand money or else they’ll publish them on the Internet. The problem with this crime is that there’s no guarantee you’ll get all copies of the photos back. You may pay the criminals and still not be sure.

 

Gift Cards: This scam is highly successful because typically the thieves don’t ask for very much money. Many victims will go ahead and pay even if they suspect that it’s a trick, just because there are only a few hundred dollars at stake. You may get a phone call from someone saying they’re from a creditor or the IRS. They will speak in hostile threatening tones. They’ll claim that if you don’t pay up immediately, terrible things will happen—maybe your car will be repossessed. Next, they instruct you to go to a local store like Walmart and buy gift cards in the amount you owe. Once you buy them, you call the thief back and give them the numbers found on the back of the cards. Once they have these, they can use them online to make purchases.

 

Phishing/Ransomware: Phishing crimes have become so successful that now there are variants like spear-phishing, vishing, and smishing. These are all forms of the same ruse. A hacker will send you a very convincing email. It may say something like, “Congratulations! You’ve just won $100 from Amazon. Click on the link below to claim your prize.”

 

You click on the link and guess what? A malware or ransomware virus is downloaded onto your computer. If you’re a business owner, this virus can spread quickly to other computers on your network. In many cases, all your computers are locked, and you’ll get an ugly message saying that if you want your files restored, you must pay a ransom. Sometimes business owners follow the instructions on the screen, and they get their files back… but, sometimes not. There’s no guarantee. Ransoms are always demanded using cryptocurrency because this form of payment is untraceable.

 

Wire Fraud Scam: Hackers are targeting the human resource functions of businesses of all types with phishing. They’re convincing employees to swap out direct deposit banking information to offshore accounts. A nonprofit in Kansas City (KVC Health Systems)said that there were numerous attempts each month involving scammers who were trying to convince their payroll personnel to change information about where to send employee pay. The IRS recently released a warning about an uptick in a wide range of fraud attempts involving payroll information.

 

What Can We Do To Stop Phishing?

 

You may have spent years trying to build up your company. You have a huge amount of time and money invested, and yet one cyber attack could bring your company to its knees.

 

The first thing you need is knowledge. Knowledge is still power in our world. You need to know how cyber attacks occur. What are the latest phishing scams? How does ransomware work?

 

You also need to train your employees so they’ll know as well. Just one careless employee can open the door to thieves and cost you thousands of dollars. It’s much cheaper invest in training your employees. Make sure your employees get regular training to remind them how to recognize a phishing email or malicious website.

 

Unfortunately, cybercrimes won’t stop anytime soon. They’ve been too successful, and there’s almost no chance of getting caught. What you have to do is protect yourself and your data with the best security software. If you’re not sure whether your cybersecurity program is strong enough, hire a managed IT provider. They can perform penetration testing to assess your level of security.

 

A great managed IT service provider will do a full assessment of all your security protocols and let you know whether you need to add layers of protection. When you have the best cybersecurity platform in place, you can sleep better at night.

 

Call Underdog Today

570-243-9205

Want to Know More

Client Testomonials

We found it very easy to work with Carmine. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.

Pam Watkins, Forks Bistro

Barton Heights had a very successful computer upgrade due to Carmine.  I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server.  He advised us and placed the order.  He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs.  He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers.  Carmine stepped up and took care of those problems as well, even though that was not his responsibility.  He always responds quickly to any issue that occurs.  I would highly recommend him to anyone!

Dr. Jeremy Wentz., Barton Heights Veterinary Hospital

I HAVE WORKED WITH CARMINE FOR MANY YEARS.  HE HAS DONE EVERYTHING FROM NETWORK SERVER INSTALLATION TO PROGRAM TROUBLESHOOTING.  HIS QUALITY OF WORK AND KNOWLEDGE ARE OUTSTANDING.   YOU CAN ALWAYS COUNT ON CARMINE TO WORK HARD FOR YOU.

Tim Stump, Shawnee Mountain Ski Area

Carmine makes you feel that you are his first concern if you have a Server down or you have a small printing question.  We have been with Carmine for 16 years and have only received quality service.

Dee McConnel, Straub Metal International

Thank you Carmine.  Will recommend you from the rooftops.

Law Office of Maria T. Candelaria, Maria Candelaria

12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan.

If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC.

There are some others that are good, but I cannot express the difference enough – they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you!

Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!

Carollee Streeter Kidd, CLK Transcription

“Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do”

Jennifer Narkavich, My Girl Managed Services - Marketing Consultant

For More Information Fill out form below


Computer and Network Support

Traditional Computer and Network Support Services.

Traditional I.T. Services

Break/Fix IT Services for Businesses that Need Occasional IT Support.
Don’t Fear, We Fix IT Here!

[Learn More]

Web/Application Development

We are well versed in different languages for any Project

Looking for an out of the box application

If you are looking for a Web Based “Cloud” Application or Desktop Application. We can Help!

[Learn More]

Underdog Serenity Care

Our Services are Designed to Allow you to get back to your Business

White Glove Service

with Peace of Mind. All our Services are built around Security!

[Learn More]
Project Management, Project Consulting, Consulting

Project Based Consulting

From Project Management to One Off Projects

Have an I.T. Project that you need help with?

Have a big project that you don’t want to tie up your Staff with, give us a call Today! We can Lead or Follow

Threat Protection, Prevention and Education. Underdog Computer and Network Support takes your security serious

Cyber Security Threat Protection and Prevention

We help you protect and defend what you spent years building

Cyber Crime on the Rise

We help you Protect what is yours! Put in Tools to Prevent Attacks in the First Place!

[Learn More]
Structured Cabling, Low Voltage Cabling, Cat 5,6,5e. Coax Network Management

Structured Cabling

Renovating, Building or Expanding. Before You Close the Walls Call Us

Ethernet Cabling

If you are building, expanding or renovating your office NOW is the time. We do full Network Designs!

[Learn More]