You can be on Entrepreneur’s cover!

Phishing Is the No. 1 Cyber Threat. Here's Who It's Affecting (and How) Here's what you need to know about the different types of phishing attacks and how to protect yourself and your business.

By Andrew Newman

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

In our recent Consumer Cybersecurity Trends report, RAV researchers delved into the threats facing consumers over the last year. It was relatively unsurprising when once again, phishing took the top spot for cybercriminal activity.

There are various types and various ways for threat actors to pull off a phishing attack. Let's dive into the most prevalent, and also the sneakiest, of ways that phishing is currently threatening the cybersecurity landscape for consumers today.

Related: What Is Phishing? Here's How to Protect Against Attacks.

Email phishing

It may sound like old news by now, but phishing attacks by email don't seem to stop coming — and it's surprising how many people still fall victim to them.

This February, Reddit employees were victims of an email phishing campaign that affected hundreds of company contacts and employees. According to a Reddit statement at the time, "the attacker sent out plausible-sounding prompts pointing employees to a website that cloned the behavior of our intranet gateway in an attempt to steal credentials and second-factor tokens."

Whether this attack could have been avoided is up for debate. At the very least, the fact that an employee was aware enough to understand what was underway and raise the alarm to their security team is vital. The sooner an attack can be mitigated, the better.

As well as email phishing via malicious links and attachments, the weaponization of office documents sent via email has also increased. Office documents that hide macro code are still very common, and 2022 saw many files sent as phishing documents to lure users to run the malicious code.

Related: 4 Things Your Employees Are Doing Right Now That Are Compromising Your Network

Spear phishing

Unlike the traditional "spray and pray" approach, whereby mass phishing emails are sent to as many recipients as possible in the hopes they'll get at least a few hits, "spear phishing" is a targeted phishing attack aimed at a specific individual or organization.

Cybercriminals will research their target in order to personalize the attack and increase their credibility, with the intent of persuading the target to disclose sensitive information or trick them into making payments.

While finance teams and executives would seem to be the most likely targets of spear-phishing campaigns, sales departments might also see an increase — mainly because a sales team member is more likely to receive emails from outside an organization. These employees could be a viable entry point for hackers trying to infiltrate an organization.

Social media is also a factor here, as many employees that use social media, either for personal or professional use, underestimate just how vast their digital footprint may be. In Q1 of 2022, LinkedIn users accounted for 52% of all spear-phishing targets globally, and users were cautioned to be on their guard for a rise in spear-phishing campaigns.

The biggest takeaway here should be that criminals are looking for the weakest link in a company, no matter who they are trying to target. One wrong click from an unsuspecting employee is all it takes, so they will keep trying again and again to ensnare their next victim.

And taking spear phishing attacks to the next level, "whale phishing" targets the most senior-level company members, like the CEO or CFO. Whaling phishing techniques may involve impersonating these figureheads, in order to trick an employee into authorizing high-value money transfers to the attacker or disclosing vital company information.

Related: Is Your Business Prepared for a Cyber Attack? (Infographic)

Smishing

In general, users are misguidedly more trusting of text messages than they are of email. In actual fact, as most smartphones can receive text messages from any number in the world, smartphone users aren't really afforded any SMS privacy at all.

Phishing conducted via SMS, also known as "smishing," will entice a victim into revealing personal information via a link through compelling SMS text messages. Unfortunately, not enough users are aware of the dangers of clicking links in text messages.

These links may lead to credential-phishing sites or inject malware designed to compromise the phone itself. The malware can then be used to spy on the victim's smartphone data or silently send sensitive data to an attacker-controlled server.

Compromised privacy

But what is it that we are afraid of? What can a phishing attack lead to? Once a threat actor has access to data, they can set to work to use it for their own nefarious purposes — be it holding the data ransom, using it for financial theft or creating further disruption for a company (e.g., doxing or cyber espionage).

For example, Atlassian recently suffered a cybersecurity breach in the form of a phishing attack that compromised customers and business insider information, including company floor plans. The attack is thought to have been achieved through using an employee's credentials. We see from this that phishing can lead to unwanted and unwarranted prying eyes into a company's inner sanctums, and it puts both consumers and businesses at risk for further interference. The plethora of phishing techniques is presumably why it ranks as the preferred method of attack for so many cybercriminals.

To protect against phishing attacks, whether as a consumer, employee or business owner, following some basic guidelines will be invaluable:

  • Be wary of unsolicited mail and unexpected emails, especially those that call for urgency.

  • Double-check transactions or data disclosure through a secondary means of communication (e.g., phone calls or face-to-face).

  • Watch out for telltale signs of phishing attempts, such as the misspelling of words, the incorrect use of URLs and completely irrelevant messaging.

  • Additionally, pay attention to emerging technologies on the market — it remains to be seen whether newly available clever AI chatbots could be used to construct phishing emails.

Above all, ensure all staff has cybersecurity training. All employees should be aware of basic tactics used in spear phishing emails, such as tax-related scams, CEO fraud and other social engineering tactics via email. Education and awareness are key defense skills as the majority of these phishing techniques will only actually succeed due to human error.

Andrew Newman

Founder and CTO of ReasonLabs

Andrew Newman is the Founder & CTO of ReasonLabs, a cybersecurity company providing enterprise-grade protection for users around the world.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business News

This Fan-Favorite Masters 2024 Item Is Still $1.50 as Tournament Menu Appears Unscathed by Inflation

The pimento cheese sandwich is a tradition almost as big as the tournament itself.

Business News

I Designed My Dream Home For Free With an AI Architect — Here's How It Works

The AI architect, Vitruvius, created three designs in minutes, complete with floor plans and pictures of the inside and outside of the house.

Side Hustle

This Dad Started a Side Hustle to Save for His Daughter's College Fund — Then It Earned $1 Million and Caught Apple's Attention

In 2015, Greg Kerr, now owner of Alchemy Merch, was working as musician when he noticed a lucrative opportunity.

Making a Change

Learn to Play Guitar Even if You Have No Previous Training for Just $20

Start with the beginner's crash course and learn how to play guitar in no time.

Business Ideas

63 Small Business Ideas to Start in 2024

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2024.

Business News

Here's One Thing Americans Would Take a Pay Cut For — Besides Remote Work

An Empower survey found a high percentage of respondents would take a pay cut for better retirement benefits and remote work options.