• Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Call us at: 877-275-4545

Partner? Login here
Breach Secure Now!Breach Secure Now!
  • Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

A look at how hackers create spear phishing emails

May 9, 2015 Posted by Art Gross Data Breach, Security No Comments

Spear phishing emails are highly effective and have been the cause of many successful hacking attempts. Unlike a regular phishing email that could be sent to thousands or millions of recipients, a spear phishing email is created to target just one victim. And if that victim falls for the bait, there is a good chance that they will turn over valuable information including network user accounts and passwords or confidential information such as bank account login credentials.

In an interview over at Business Insider, Ray Boisvert a professional ethical hacker for hire tells how he creates spear phishing emails.

He would scour LinkedIn looking for the least cybersavvy (company) employees, such as those who work in nontechnical areas and new hires unlikely to recognize an atypical email.

The infiltrator will then try to guess the employee’s email address by learning the format of a typical address for that company (e.g., [email protected]) and sending out messages repeatedly until they stop bouncing back.

After attaining the victim’s email address, the hacker looks to social media to learn as much as possible about his target’s professional background, friends, and general interests.

In this way, he can customize the phishing email as much as possible — even posing as one of the victim’s closest friends (profile picture included) — to make it look familiar and increase the odds that the target will trust it.

Clearly social media is a treasure trove of valuable information that can be used to help create spear phishing emails. Make sure your employees, customers, family and friends understand how these email are created and targeted at individuals. Steps to help prevent phishing scams include:

  • Minimize the amount of information shared on LinkedIn, Facebook, Twitter and other social media sites
  • Raise awareness of what phishing emails are and how to spot them
  • Instill some fear or concern into employees, family and friends so they will at least question the validity of emails
Tags: Data BreachPhishing
No Comments
Share
0

You also might be interested in

Welcome to Breach Secure Now!

Oct 28, 2014

The Breach Secure Now! website will try to educate and[...]

Top 5 Security Actions Every CEO Should Take

Nov 21, 2014

An article over at Security Intelligence discusses the 5 actions[...]

Hey Small Business: You ARE a cyber-target!

Nov 22, 2014

The security firm, FireEye, has a very eye opening report[...]

Leave a Reply Cancel Reply

Dark Web Assessments

Search

Recent Posts

  • Reinforcing Cybersecurity Habits & the Dark Web May 26, 2023
  • Voice AI: A New Frontier for Cybercrime & Security May 19, 2023
  • Risk Factor Reminders May 12, 2023
  • Healthcare Cybersecurity May 5, 2023
  • The Different Types of Hackers April 28, 2023

Contact Us

  • Breach Secure Now!
  • 55 Madison Ave, Suite 400 Morristown, NJ 07960
  • 877-275-4545
  • info@breachsecurenow.com

Get Social

Schedule a Demo

Recent Blog Posts

  • Reinforcing Cybersecurity Habits & the Dark Web May 26, 2023
  • Voice AI: A New Frontier for Cybercrime & Security May 19, 2023
  • Risk Factor Reminders May 12, 2023

© 2023 · Breach Secure Now!

Prev Next