City of Seattle, WA

10/17/2024 | Press release | Distributed by Public on 10/17/2024 15:26

Be alert and aware of the latest phishing techniques

[Link]

Phishing remains one of the most prevalent and dangerous cyber threats in today's digital age. Despite increased awareness, cybercriminals continue to refine their tactics, making it crucial for everyone-yes, even you-to stay informed and vigilant. Let's take a closer look at the origin of phishing, the various types of phishing attacks prevalent in 2024, and some tips to protect yourself.

The Origin of "Phishing"


"Phishing" is a term that dates back to at least 1996, when hackers began stealing AOL accounts using email-based lures to capture passwords and financial data. Drawing from the conventional word "fishing," the "ph" spelling instead of "f" nods to "phone phreaking," an early form of hacking on telecommunications lines from the 1970s.

While many associate phishing with malicious attachments, hackers have evolved their tactics as cybersecurity measures have improved, constantly finding new ways to trick victims.

Common phishing techniques in 2024


1. Email Phishing
The most common form of phishing involves sending deceptive emails that appear to come from reputable organizations. These emails typically contain urgent messages, alarming statements, or enticing offers to prompt recipients to click on links or download attachments. Be wary of any email asking for personal information, especially if it creates a sense of urgency.

2. Spear Phishing
Spear phishing is a more targeted form of phishing. Attackers customize their messages for specific individuals or organizations by gathering information from sources like social media or corporate websites, making their emails seem more convincing. Always double-check the sender's email address and be cautious of unsolicited requests for sensitive information.

3. Smishing, Quishing, and Vishing
Phishing attacks can also occur via SMS (smishing), QR codes (quishing), or voice calls (vishing). In these scenarios, attackers use text messages, QR codes, or phone calls to trick individuals into revealing sensitive information or visiting malicious websites. Never click on links or provide personal information in response to unsolicited messages or calls.

Tips to protect yourself

  • Verify the source
    Always double-check the sender's email address and be cautious of unsolicited requests for sensitive information.
  • Look for red flags
    Be wary of emails or messages that create a sense of urgency or contain alarming statements.
  • Don't click on suspicious links
    Avoid clicking on links or downloading attachments from unknown or suspicious sources.
  • Use multi-factor authentication (MFA)
    MFA adds an extra layer of security, making it harder for attackers to gain access to your accounts.
  • Keep software updated
    Ensure your operating system, antivirus software, and web browsers are up-to-date to protect against the latest threats.
  • Educate yourself and others
    By staying informed and vigilant, you can protect yourself and others from falling victim to phishing attacks.

Remember, cybersecurity is a shared responsibility, and awareness is your first line of defense. Stay safe out there!