The Risks of Phishing/Smishing and Social Engineering
For week 4, we took a deep dive into cyber security crimes and explored the potential risks that come with using the internet. The internet has significantly improved our world by making it easier to access information, stay connected with friends and family, and work with organizations without needing to visit brick and mortar locations. While these advancements offer numerous benefits, they also introduce new risks. Cybercriminals can exploit our online presence to gain access to sensitive information such as passwords, personal documents, and financial data. One way they do this is through cyberattacks that used tactics like phishing/smishing, and social engineering. These methods rely on human error and the the natural tendency to trust, making them specially effective and dangerous. My family and I have been victims of both phishing and social engineering attacks. While the incidents were not severe, we have experienced firsthand how these types of cyberattacks can target everyday users.
After that incident, there were obvious signs on how to avoid phishing attacks. As stated by Federal Trade Commission(FTC) you should always protect your computer by using security software, protect your electronics by updating protection software constantly, using multi-factor authentication for your accounts, and protecting data by backing it up. Since temporarily losing access to my Facebook account, I’ve become much more cautious online. I now always check URLs carefully. Rather than clicking on links provided in emails, I open a separate browser window and navigate directly to the official website. I've also enabled multi-factor authentication on all my most important accounts. For any account that contains sensitive information, I change the login credentials yearly and use unique, strong passwords. While I still reuse passwords for low-priority accounts with minimal risk, I no longer click on the first link that appears in a Google search without verifying its authenticity.
Social Engineering cyber attacks rely on the person’s trust to break standard security practices.
Unlike normal hacking, these cyber attacks are done through impersonation of an authoritative figure using either fear base tactics or familiarity exploitation. Attackers may pretend to be bank representatives, IT personnel, law enforcement or company representatives trying to gain access to your systems. Successful attacks will allow the perpetrator to gain access to the victims credentials or even create transactions for the benefit of the attacker. My family nearly fell victim to a social engineering scam. My father regularly sells items through Facebook Marketplace, and on one occasion, a potential buyer reached out with an unusual request. The buyer claimed to have a “business account” and said he was unable to send less than $600 due to account restrictions. The item my father was selling was listed for $400, so the buyer insisted on sending $600 and asked my father to return the $200 difference. A notification appeared in my father’s bank account showing a pending deposit of $600. Unsure about how to proceed, he asked for my opinion since I’ve worked with small businesses and have some experience with business accounts. I told him I had never heard of any of rule requiring a minimum transfer amount like that, and advised him to wait until the transaction was fully processed and cleared by the bank before sending any money. After my father relayed this to the buyer, the tone quickly changed. The buyer became aggressive, threatening to leave a negative review and claiming they would contact the bank if the $200 wasn’t returned immediately. Sensing something was off, I encouraged my father to contact his bank directly to verify the transaction. The bank confirmed that the payment was never actually processed and had already been flagged as a fraudulent attempt. The pending transaction was fictitious, and the buyer’s goal had clearly been to manipulate my father into sending them $200 of his own money.
After that incident, the best suggestion is go with your gut feeling. If something feels off, it's best to use verification tools. In my father’s case, calling the bank directly to confirm the transaction was one of the most effective ways to determine whether the transaction was legitimate. As stated in Ways to Avoid Social Engineering Attacks by Kaspersky, “Social engineering often depends on a sense of urgency. Attackers hope their targets will not think too hard about what's going on. So just taking a moment to think can deter these attacks or show them for what they are — fakes.” In this situation, there were two moments of urgency: first, my father’s eagerness to receive the $400 he was expecting, and second, the attacker’s attempt to manipulate him through fear by threatening to leave a negative review and contact the bank. Ways to avoid social engineering cyber attacks is to be aware of them, verify directly with the source, be skeptical, don’t click on unknown links, and always use multi factor authentication.





Comments
Post a Comment