One fine day, you receive an internal email message from the CFO of a parent company asking you to transfer more than 800,000 euros as part of a ‘strictly confidential acquisition.’ That’s what happened to the CEO and CFO, who ended up transferring the amount, only to find out later it was a fraud.
Whaling emails are very often personalized, including details such as the target’s name, job title, or other relevant information that the criminals have collected from a variety of sources. To ensure your business is protected from Whaling attacks, you must be able to identify what they look like. Here are a few examples.Now, this might appear to be a normal communication cycle because after exchanging emails, you’re talking to a real-world person.
3. Cybercriminals can use birthdays, holidays, job titles, promotions, and relationships to build more sophisticated, undetectable attacks. Hence, be careful about what you are sharing on your company’s social media handles.Are these practices enough?