4 Common Phishing Lies Exposed

Scammers use different stories to "fish" sensitive information from targets. The goal is to get as much information as possible from the target. "Smishing" is the term for phishing for information via text message (SMS). The methods used to phish is the same regardless of the medium of the message. Read examples of conversations that are designed to phish a victim.
 

Lie #1: You Are in Trouble with Authorities

Communication appears to comes from an official agency and threatens punishment if action not taken.


authority



Lie #2: Your Family is in Danger

The criminal imitates a friend or family member and claims to be in danger, in order to get sensitive information.

danger-phishing

 

Lie #3: We Need Your Credentials Again

A email arrives that imitates an account the person uses. The message requests reentry of credentials.

reenter

 

Lie #4: You Have Won an Amazing Reward

The criminal entices the user to provide data in order to take advantage of a supposed special offer or free item.

prize-phishing

 

Signs of a Lie

Some signs that a person is trying to scam you can include:

  • The offer in the message is too good to be true.
  • You are not aware of how the person got your phone number.
  • The sender is from an organization that does not use text messaging.
  • The message has typos or odd grammar.
  • The person messaging is making the situation seem extremely urgent.
  • The person is asking for a password or other sensitive information "in the clear" without any security.
  • Logos or other elements in the message are low quality or wrong.
  • When asked for a phone call or other means of confirmation, the person does not agree.

Take more steps to prevent and understand phishing by downloading our guide.

guide to modern phishing attempts

Did you enjoy this blog article? Comment below with your feedback.

 

About CIPHER

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of services: Managed Security Services (MSS), Managed Detection and Response (MDR), Cyber Intelligence Services (CIS), Red Team Services (RTS), Governance, Risk and Compliance (GRC) and Cybersecurity Technology Integration (CTI). These services are supported by the Cipher Lab, an elite threat and cyber intelligence research and development lab, and also by five 24x7 Security Operations Centers (SOC).

Cipher is a highly accredited company holding ISO 27001, ISO 22301, ISO 20000, ISO 9001, SOC I, SOC II, PCI QSA, PCI ASV and CREST certifications. The quality of service has led Cipher to win many awards from world-renowned research companies such as Gartner, Frost & Sullivan and Forrester. Clients consist of companies from mid-size enterprises to world-renowned corporations and government agencies, with countless success stories.

Recent Security Posts

Essential-Cyber-Security-Tips-Guide.jpg

Twitter Feed