{"id":8034,"date":"2019-02-21T17:36:28","date_gmt":"2019-02-21T16:36:28","guid":{"rendered":"https:\/\/www.biteno.com\/en\/?p=8034"},"modified":"2019-03-21T17:46:54","modified_gmt":"2019-03-21T16:46:54","slug":"the-biggest-phishing-scams-of-2018","status":"publish","type":"post","link":"https:\/\/www.biteno.com\/en\/the-biggest-phishing-scams-of-2018\/","title":{"rendered":"The Biggest Phishing Scams of 2018"},"content":{"rendered":"<p>As the world becomes more connected, the potential for <a href=\"https:\/\/www.biteno.com\/en\/5-of-the-best-wordpress-security-plugins-available-today\/\">security issues<\/a> increases. The internet makes it possible for hackers to steal money and information in new ways, including through what are known as <strong>phishing attempts.<\/strong> Everyone, especially business owners, should be aware of phishing and what it can lead to so they can protect their <strong>personal information<\/strong> and their <strong>money.<\/strong><\/p>\n<h2>What is Phishing?<\/h2>\n<p>Phishing is an attempt to gain <strong>personal information,<\/strong> including passwords or credit card numbers, by sending emails that appear to be from a reputable company. The hackers who set up the phishing attack make their email address look like it\u2019s official, then request the receiver clicks on a <strong>link<\/strong> or downloads an <strong>attachment.<\/strong> If the recipient does this, the attacker then has their <strong>username<\/strong> and <strong>password<\/strong> or has the ability to<strong> control their computer<\/strong> to get the personal information they\u2019re looking for.<\/p>\n<p>Phishing is one of the oldest types of cyber attacks and it\u2019s becoming more prevalent today because of technology improvements. The attacks of 2018 are far more <strong>sophisticated,<\/strong> enabling the hackers to try to get personal information from anyone, even those who normally would know what to look for and how to avoid this type of cyber attack. The oldest version of phishing is to send out an email that looks like it\u2019s coming from the person\u2019s <strong>bank.<\/strong> The goal was to get the recipient to visit a fake website and use their real login information to sign into the bank to verify information. Once they entered their information into the <strong>fake website<\/strong>, the hacker had the ability to log on to the bank\u2019s <strong>actual website<\/strong> and transfer money from the victim\u2019s account to their own.<\/p>\n<h2>Phishing is Still Prevalent Today<\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-8042\" src=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-300x300.png\" alt=\"phishing is\" width=\"200\" height=\"200\" title=\"\" srcset=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-300x300.png 300w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-80x80.png 80w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-36x36.png 36w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-180x180.png 180w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-120x120.png 120w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-450x450.png 450w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay-45x45.png 45w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/phishing_2_pixabay.png 500w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Phishing has been around for so many years because <strong>it still works<\/strong>. Hackers can still use phishing attempts against both <strong>individuals<\/strong> and <strong>businesses<\/strong> to steal personal information and money. Business owners have to be especially careful to avoid phishing attempts as the ones used today are used to steal all of the personal information for the <a href=\"https:\/\/www.biteno.com\/en\/how-to-avoid-data-loss-and-protect-your-company-and-customers\/\">business\u2019s customer<\/a>s. This often includes names, phone numbers, physical addresses, email addresses, and credit card numbers. Phishing attempts that successfully lead the hacker to this information cause a huge breach for the business and can cause <strong>serious amounts of damag<\/strong>e. Some of the biggest types of phishing attacks that occurred throughout 2018 include compromised <strong>MailChimp accounts, tax fraud, account takeovers,<\/strong> and others listed below.<\/p>\n<h2>MailChimp Account Phishing<\/h2>\n<p>At the beginning of 2018, a new phishing attack started out by using compromised MailChimp accounts. The accounts were compromised by data stolen through fake <strong>invoices.<\/strong> The emails were then used to send a zipped file to other people. Since MailChimp is a trusted email company used by businesses to send invoices and other important information, these emails were able to reach just about <strong>anyone.<\/strong> The emails were not caught by spam filters because they appeared to be <strong>legitimate<\/strong> emails. When the zipped file was opened, it downloaded a <strong>malware app<\/strong> that was then used to monitor the computer and steal information. This attack ran for around three and a half months.<\/p>\n<h2>\u00a0Shortcut Phishing Attacks<\/h2>\n<p>First detected in July of 2018, the <strong>shortcut phishing attack<\/strong> targeted users of <strong>Windows 10.<\/strong> A hacker named TA505 sent out emails appearing to be from Windows that offered an opportunity to create unique shortcuts to settings within Windows. The email included a PDF file that had a PowerShell script to download a <strong>trojan<\/strong> on the computer when it was opened. The trojan, <strong>FlawedAmmyy<\/strong>, gave the hacker remote access to the infected machine. They had complete access to any information stored on the computer, allowing them to get personal information such as <strong>bank account information<\/strong> or <strong>credit card numbers<\/strong>.<\/p>\n<h2>Phishing Attacks Relating to the GDPR<\/h2>\n<p>In 2018, the European Union\u2019s <strong>General Data Protection Regulation (GDPR)<\/strong> took effect. This is intended to protect data and privacy for all members of the EU by giving users more control over their own personal data. It also helped simplify regulations for international companies that do business in the EU or the European Economic Area (EEA). While the new law was intended to simplify regulations and help protect privacy, it did cause confusion for many business owners who were trying to figure out how to comply with the new laws. Phishing attacks started targeting businesses who might need <strong>help with compliance<\/strong>. Emails promised <strong>information<\/strong> or <strong>services<\/strong> to help with the new regulations but led to malware being downloaded or information being stolen from the businesses instead.<\/p>\n<h2>Tax-Related Phishing Attacks<\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-8045\" src=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-300x300.jpg\" alt=\"tax related phishing attacks\" width=\"200\" height=\"200\" title=\"\" srcset=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-300x300.jpg 300w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-80x80.jpg 80w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-36x36.jpg 36w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-180x180.jpg 180w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-120x120.jpg 120w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-450x450.jpg 450w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay-45x45.jpg 45w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/tax_phishing_pixabay.jpg 500w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>During the <strong>tax season,<\/strong> scams are prevalent. Phishing attacks generally involve an email claiming the recipient <strong>owes money<\/strong> and offers a link to send money to avoid fines or other legal actions. Another scam has become prevalent as well, with the email claiming to be from a <strong>state accounting office.<\/strong> In this phishing attack, the email was sent to obtain usernames and passwords for accountants so the hacker could access not only the accountant\u2019s personal information but their clients as well.<\/p>\n<p>These types of phishing attacks have occurred for a number of years now. In 2018, a new method was tried to get money from the victims. In this new method, the hackers use the victim\u2019s bank account to deposit funds, then use a variety of different methods to try to <strong>retrieve the funds.<\/strong> These types of phishing attacks are always more prevalent during tax season but can occur at any time of the year.<\/p>\n<h2>Phishing Attacks Involving Cryptocurrency<\/h2>\n<p>With the huge rise in popularity of cryptocurrency during 2018, phishing hackers started looking for a way to take advantage of this. Most of the time, it involves taking advantage of new cryptocurrencies that hold an<strong> Initial Coin Offering (ICO)<\/strong> to raise money for their cryptocurrency. The company generally creates an email address for money to be sent to by those who want to purchase the cryptocurrency. While many of these are legitimate, hackers will use emails to set up<strong> fake ICOs<\/strong> and have the funds go to an account they control, instead of one controlled by the company creating the cryptocurrency. Purchasers of the ICO believe their money is going to the company when it\u2019s actually being sent to a <strong>hacker.<\/strong><\/p>\n<h2>Account Verification Phishing Attacks<\/h2>\n<p>This type of phishing attack has been around for some time but became far more prevalent during 2018. Most of the time, the victim receives an email that seems like it\u2019s from a <strong>major retailer<\/strong> or <strong>social network<\/strong> site. The email states there\u2019s a problem with the account that needs to be <strong>fixed immediately<\/strong>. The email is designed to look just like one from the company and uses an email address that\u2019s close to the one used by the company. The links in the email, however, take the victim to a<strong> fake website<\/strong> that looks similar to the company\u2019s website and steals the person\u2019s login information. That information can often be used to sign into other accounts on other websites or used to get personal information that might be stored on the real company\u2019s website.<\/p>\n<h2>\u00a0Phishing Attacks to Take Over Accounts<\/h2>\n<p><img decoding=\"async\" class=\"size-medium wp-image-8048 alignleft\" src=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay-300x200.jpg\" alt=\"phishing to get account data\" width=\"300\" height=\"200\" title=\"\" srcset=\"https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay-300x200.jpg 300w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay-80x53.jpg 80w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay-705x470.jpg 705w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay-450x300.jpg 450w, https:\/\/www.biteno.com\/en\/wp-content\/uploads\/2019\/03\/account_phishing_pixabay.jpg 750w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Most phishing attempts are designed to steal <strong>personal information<\/strong> that can be then used to <strong>gain money.<\/strong> A new type of phishing attack, however, is an attempt to take over an <strong>email account<\/strong> so it can be used by the hacker. Once the hacker gains the username and password for the email account, they\u2019ll watch it to learn more about the victim. They can then use the information to steal money or other personal information. Right now, the biggest targets for this type of phishing attacks are <strong>real estate agents.<\/strong> The hacker takes over the account, watching the emails sent and received by the real estate agent until they see a <strong>pending house sale.<\/strong> They then use the email address to send a fake email about the <strong>wire transfer,<\/strong> getting the home buyer to send the funds to the <strong>hacker<\/strong> instead of the seller of the home. This phishing attack can take a while to accomplish, but it can allow the hacker to steal <strong>hundreds of thousands of dollars<\/strong>.<\/p>\n<p>Phishing attacks lead to <strong>billions of dollars in losses<\/strong> every year. Even when certain attacks seem to disappear, new ones that are far more sophisticated are being created. Individuals and business owners can protect themselves from phishing attacks. Most of the time, this can be done by just being <strong>careful.<\/strong> Keep an eye on information about the latest phishing attacks to know what could potentially happen. This enables you to make sure you know about the newest types of phishing attacks so you can avoid them. When you do receive an email, it\u2019s better to <strong>type in the address of the company<\/strong> instead of clicking a link. It\u2019s also a good idea to scan any attachments with <strong>antivirus software<\/strong> before opening them to be sure they\u2019re safe, even if they appear to be from a trusted source. Working with a <a href=\"https:\/\/www.biteno.com\/en\/hosted-exchange-improve-companys-email-security\/\">cybersecurity company<\/a> can also help you make sure your potential for becoming a victim of a phishing attack is minimized to protect your personal information and your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the world becomes more connected, the potential for security issues increases. The internet makes it possible for hackers to steal money and information in new ways, including through what are known as phishing attempts. Everyone, especially business owners, should be aware of phishing and what it can lead to so they can protect their [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":8041,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-misc"],"_links":{"self":[{"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/posts\/8034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/comments?post=8034"}],"version-history":[{"count":0,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/posts\/8034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/media\/8041"}],"wp:attachment":[{"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/media?parent=8034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/categories?post=8034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.biteno.com\/en\/wp-json\/wp\/v2\/tags?post=8034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}