We won the E-commerce Awards Poland 2023 competition -> Learn more

Internet scams – phishing, spoofing, pharming and spam. How to defend against them?

Online fraud is almost as old as the Internet itself. The number of frauds has increased over the years, as the number of users of the public network has grown. As technology has developed, so have the methods of attack and defense against them. Today, we will discuss the four most popular types of attacks that both consumers and businesses are exposed to: phishing, spoofing, pharming, and spamming. We will also tell you how to defend against them and how to take care of cybersecurity in your company.
Read our guide to find out:

Cyber security still underestimated


Given how quickly new cyber threats are emerging and how those that are known in theory are evolving, there is a huge scale of oversight. However, the authors of the report in question point to the great potential for the development of artificial intelligence in the context of enhancing cyber security in the business sector. However, it should not be forgotten that cyber criminals also have access to AI-based tools.

We don’t have reliable data on companies in Poland, so it will be safe to assume that it is similar or slightly worse. At the end of the day, however, the most important thing is to answer the question yourself: is my company putting a strong enough emphasis on security issues? Here’s what companies face – even if they don’t know it.

What is phishing?


Phishing is – colloquially speaking – catching victims for bait. The association with fishing is not coincidental. In English, fishing is fishing, which sounds the same as phishing precisely.

In phishing, an online scammer sends messages that are disguised to pretend to be from a reliable source. In this way, it tries to obtain sensitive data from its target, such as:

  • logins and passwords,
  • payment card numbers,
  • bank account numbers,
  • Access to accounts (private and corporate),
  • address details.

This, of course, is not the end of the list – fraudsters obtain all kinds of data this way – the ones they just happen to need. How does this happen?

Bait above all


The means of executing a phishing scam are usually emails, SMS, instant messaging or phone calls. In the case of SMS, we may also encounter the term smishing, and scams carried out via phone calls are often called vishing.

How to verify the sender? In the case of email phishing, the matter is relatively simple – you need to verify the sender’s address, as this is what often helps unmask the scammer. It’s not enough to glance at the sender’s field – the content there is easily crafted to display anything – even the name of the U.S. president.
Here’s an example: in the main mail view, the sender displayed only as Mail. The subject line not only contained the recipient’s name, but also informed about the shipment. Who among us hasn’t ordered a package online recently? This very fact is being exploited by cybercriminals, trying to get users to click on the link left in the message:

An example of an attempted Internet scam - an e-mail sent by a scammer impersonating the Postal Service.

In the above example, even a quick glance at the email address lets you know that we are dealing with an attempted scam. The whole message, moreover, is prepared carelessly. However, this does not mean that we are safe – such messages are still sent, because under certain conditions they have to work. What’s more – many scammers are much more meticulous, and distinguishing their messages from the original is sometimes much more complicated.

What is the purpose of phishing?


The most important thing in phishing is to get the victim to interact – this involves clicking on a link provided in a message, downloading a designated application (such as one that infects a phone) or sharing data during a phone call. After going to the address indicated by the fraudulent link, for example, the user may end up at a phishing site – one that looks twinned with the login page of the bank where the scammer’s victim has an account. The next step is simply to log in, giving the scammer access to the account.

The obvious and ultimate goal of phishing, then, is to gain access to bank accounts or obtain sensitive data to sell. These individuals often only need to get the details of an email account, which will allow them to hack into and change the passwords of most other accounts a user may have.

The most dangerous variety of phishing is so-called spear phishing, which gets its name from whale hunting. Spear means spear in English. Spear phishing is nothing more than an attempt to attack a specific person or organization, that is, a scam targeted and planned to harm a specific target. It’s particularly dangerous because spear phishing scammers usually have much more knowledge about their chosen victim than those who attack en masse.

There is also a method of phishing called whaling, or simply whaling. The idea is to attack in a precise way a decision-maker or a person holding a high position in the company. All this in order to – after a successful attack – get access to sensitive, secret and valuable data about the company, customers or competitors.

How to defend against phishing emails?


Here are some basic tips to help you and your company’s employees protect themselves from data loss due to phishing. Each of them can (and even should!) be applied right away, without any preparation.

Always check what you click on

You can check links in emails or on websites by hovering over them with your mouse cursor. Most web browsers will then display a bar with the destination address at the bottom of the displayed page. On mobile devices, simply hold down the hyperlink longer to display the address hidden underneath.

Look at the addresses you visit

They can be confusingly similar to the right ones – sometimes one letter or dot put in the wrong place will get you to a completely different site than you expect.

Be careful when logging in

When you log in to your mail, bank account or other important sites, check the address bar in your browser. Any site where you leave your data should be protected by an SSL certificate – you’ll know this by the padlock icon to the left of the address. When you click it, you will get detailed information about the certificate:

Verify the sites where you leave your data to avoid phishing.

Regularly update the browser you are using

If possible, enable automatic updates. Outdated browser versions are more vulnerable and will not help you detect fraud attempts.

Report suspicious messages

If you receive a message with a link that may be a scam attempt, don’t leave it without reacting. Report the message to your network administrator, do not open the e-mail, and under no circumstances click on the link.

How to protect your business from phishing?


Your company should know how to defend against phishing. Simply sending out a message with best practices (such as those listed above) to all employees may not be enough. It’s worthwhile to put specific measures in place within your organization to protect employees (and company data) from fraud in the long term.

Better security features

A password manager, two-factor authentication, up-to-date antivirus and anti-malware software, strongly secured Wi-Fi networks – all solutions that by themselves won’t make phishing stop affecting your business, but will clearly help detect and repel attacks.

Phishing training courses

Your employees need to know what to look out for when working online. Provide them with training on phishing protection and make sure that participants have the opportunity to test their attentiveness. The training doesn’t have to end with an exam, but you can ask the trainers to prepare a quiz to make your employees aware of how alert they are to fraud attempts.

Secure internal communications

Fraudsters most often attack by email for one simple reason: it’s the easiest. So your company’s internal communication doesn’t have to be by email. While this is by far the most convenient solution (especially when communication is internal only in part and sometimes intertwined with external communication), consider using a communicator that will only serve internally and formulate clear rules for its use.

Spoofing – what is it?


Another threat lurking for companies and consumers on the Internet is spoofing. This is a type of fraud in which an attacker impersonates an employee of an institution or a specific individual in order to defraud.

We are familiar with high-profile cases in which a defrauded person sends large sums of money to scammers thinking they are financing the cost of an urgent surgery for Brad Pitt or the cost of flying Scarlett Johansson into the country. While articles on this subject tend to evoke general hilarity, in reality these are just glaring examples of a real danger that can affect everyone.

Spoofing in a nutshell


In this technique, a scammer impersonates an email address, phone number or IP address and contacts the victim. This is a more sophisticated form of phishing that resists basic defense techniques. It won’t do anything to check the phone number of the caller, because – if the scammer has prepared well – it will be a valid number, the same one found on the website of the bank or other institution impersonated.

So if anything raises your doubts, follow a few steps to help protect yourself from fraud.

Be careful

This is a general rule, but it’s worth keeping it in the back of your mind at all times, especially when you are contacted by someone claiming to be an employee of a bank or other important institution. If you’re not sure if you’re talking to a real consultant, write down the number he or she is calling from, compare it with the bank’s official number and call back if it’s correct.

Remember that scammers only impersonate the institution’s number, they do not actually have access to it. So if you call the right number, you will be connected to the bank, not the scammer.

Once connected to the institution, ask if anyone has contacted you and provide the personal information of the person who called you – if they introduced themselves.

Find out how to verify the employees of the institution

Many banks and financial institutions provide detailed information on how to verify that a caller is actually an employee of the institution. Visit your bank’s website and check so that you can easily verify who contacted you in the future. Some banks provide the ability to verify in a mobile app.

Don’t give out data, don’t click on links

No employee of a bank or other institution will ask for private data, passwords, access codes or other sensitive information. If such a request is made by a caller, end the call and report the matter to your bank.

Behave similarly if a scammer sends any links or attachments. Do not click on or open them unless you are sure what they contain and who the sender is.

Pharming – what is it?


When describing phishing, we mentioned phishing sites. These are websites that – not infrequently successfully – pretend to be the official website of a bank, store or other portal to get victims to log in and thus leave their access data.

Creating these sites and “swapping” the right ones for fraudulent ones is precisely one type of pharming. In pharming, scammers install malware on their target’s computer that redirects the user – unnoticed – to a site appropriately prepared by the scammer.

Mr. Rafal wants to make some money transfers. He starts his computer, not knowing that it is infected with malware. He turns on his web browser and types in the address of the bank’s website. At that moment, a program running in the background launches a redirect and instead of the bank’s website, Mr. Rafal ends up on a site prepared by the fraudster.

The site looks identical, so – unless Mr. Rafal is far more cautious – instead of logging into the bank’s site, he will enter his account access data into the login form, and the latter will send it directly to the scammer’s database.

How do you defend yourself against pharming?


In many cases, due caution should suffice. Here are three simple ways that will greatly enhance your ability to fight pharming.

Secure your network connection

A popular and often disastrous mistake is to stay with the password to the network (home or business) given by the connection provider. It’s a good idea to give a strong password to both your Wi-Fi network and your router. A secure password should contain numbers, upper and lower case letters and special characters. You should also change your password from time to time for security.

Always check the address bar

We already mentioned this when discussing phishing. If you go to the website of a bank or other important institution, as well as places where you log into any account, verify that the site’s address matches and that it has an SSL certificate (the padlock icon to the left of the address) before entering your login and password. Also verify who the certificate provider is.

Take care of your antivirus software

Although the effectiveness of so-called “antiviruses” is sometimes debated, the matter is trivially simple: it is better to have any protection – even imperfect – than none at all. However, in order to realize the potential of malware tools, three rules must be followed:

First: regularly update your virus databases.

Second: regularly scan your computer for threats.

Third: carefully read the messages sent by the software.

It is worth paying special attention to this last rule – many threats find their way onto users’ computers despite the fact that antivirus systems have detected them. Often, computer users machinically disable notifications or allow applications from an unknown source to run in order to do what they intended to do as quickly as possible (and not waste time searching for alternatives).

Block the ability to install software on company computers

Many companies are taking this step to increase the security of company computers. This is because there have been known cases in which employees have downloaded applications from unknown sources, which over time turned out to contain malware. Blocking installations is one way to reduce the likelihood of fraud.

Spam and spamming – what is it?


We all face spam, i.e. receiving unnecessary, unwanted, often annoying and sometimes threatening messages. Although declaring war on spam seems to be as effective as fighting windmills, leaving unwanted messages alone is definitely the wrong solution.

Where does spam come from?


Spamming is usually a mass activity – an estimated one hundred billion unwanted messages are sent worldwide every day. Your mailbox probably catches most spam, lumping it automatically into the appropriate category. However, some of the unwanted messages find their way to your inbox, so once again we urge you to be extra careful.

If an email seems suspicious, there’s no point in even opening it. Instead, report it as spam, and if you have to, block the sender so they can’t send any more messages to your email address.

Is there spam beyond email?


The answer – unfortunately – is yes. Spam has long ago reached SMS, instant messaging or social media inboxes. What’s more – spam combined with impersonation is popular, especially on social media. Scammers who gain access to a person’s social media account often use the opportunity to reach out to his or her friends in order to phish for data or to conspire to click on a link containing malware.

We’ve mentioned this before, but it’s worth emphasizing – receiving a message from a known SMS number, from a contact on LinkedIn or from the email of a company you do business with doesn’t mean that everything is fine. That’s why it’s so important to carefully read the messages you receive and pay attention to any deviations from the rule (no footer in a business email, different style of message writing, shortened links, etc.).

How to defend against spam?


Unfortunately, there is no software that will completely eliminate spam from all communication channels. However, there are a few things we can do to reduce spam and not fall victim to scams.

Author verification

If you receive a message from an unknown sender from whom you did not expect a message – you should ignore it, delete it, or preferably block the sender and report the fact that you have received spam to the network administrator (for example, at the company). If it seems to be a known person, it is worth taking – one by one – the following precautions:

  1. Check the sender’s e-mail address carefully for typos. If even one character doesn’t match – it’s spam.
  2. Read the content of the message carefully and pay attention to its design. If the content is questionable or the layout of the email is not up to standard, contact the sender and make sure the message came from him.
  3. If the content of the message includes links and encouragement to click – be very careful.
  4. Move your mouse over the hyperlink and check where it leads. If you’re still not sure, go back to step 2, that is, verify that the sender intended to send you that very link.
  5. If the sender has used an abbreviated link (it will be visible as, for example, bit.ly, cut.to, tiny.url and the strings following this sequence), do not click. In business correspondence, link shortening is rarely used. However, if it happens and you assume that it is the actual sender who decided to shorten the link – go back to point 2.

After going through the above steps, if you are still not sure whether the message is trustworthy or you already know that it is spam, you can:

  • report the message as spam,
  • remove it (preferably with prior notification),
  • add the sender’s address to the blacklist,
  • Suggest to the network administrator to add the sender’s address to the “gray list.”

Greylisting is a slightly more complicated technique than simply adding to a blacklist of senders. Emails sent by a greylisted address will be automatically rejected by the recipient’s server on the first attempt to join. The sender will receive a message that the email cannot be delivered to the specified address. If it is spam, the sender is unlikely to send the email again – it is more profitable to send spam to more new email addresses.

Summary


The list of threats lurking online is long and constantly changing. The best defense against fraudsters is constant vigilance and adherence to the principle of limited trust. Taking care of your company’s security, on the other hand, should not be limited to these two points. Ensure regular security training for your employees, and update security whenever possible. Check what software is installed on company computers and take care of network security.

See other tips in this category:


  • phishing, spoofing, pharming, spam - oszustwa internetowe

    Internet scams – phishing, spoofing, pharming and spam. How to defend against them?


    What are the most common types of online scams and how to defend against them?
    More: Internet scams – phishing, spoofing, pharming and spam. How to defend against them?
  • user experience w sklepie internetowym

    User experience in an online store – improve sales with UX


    How to ensure a good customer experience in an online store? Act in accordance with UX
    More: User experience in an online store – improve sales with UX
  • automatyzacja sprzedaży pozwala zająć się innymi zadaniami

    What is sales automation and how to increase efficiency with its help?


    What is sales automation? In what tasks can it relieve you and your employees?
    More: What is sales automation and how to increase efficiency with its help?

Are you making B2B sales?


Introduce new payment methods that can achieve up to three times the value of your shopping cart.