Phishing Attacks : New Tactics and How to Stay Safe

0 Comments

Phishing has evolved far beyond “Nigerian prince” emails. Today’s attackers use AI-written messages, realistic branding, and multi-step tricks to steal passwords, MFA codes, money, and sensitive data. The best defense is a mix of smart habits + strong technical controls.


🚀 What’s New in Phishing Tactics

🤖 AI-Written, Highly Personalized Messages

Attackers use public info (LinkedIn, company websites, social media) to craft believable emails that match your role, projects, and writing style.

Example: “Hi Kumud, please review the attached CTM evidence sheet before Friday…”


🧑‍💼 Executive Impersonation + Invoice Fraud (BEC)

Business Email Compromise targets finance, HR, and admins with urgent payment or gift-card requests—often timed around travel, audits, or month-end.

Red flag: urgency + secrecy + payment change.


📱 MFA Fatigue and Verification Code Scams

Attackers trigger repeated login prompts and pressure users to approve one “to stop alerts,” or ask for OTP codes “for verification.”

Rule: Never share OTP/MFA codes. Never approve prompts you didn’t initiate.


🔗 QR Code Phishing (Quishing)

Instead of links, attackers embed QR codes in emails/posters that lead to fake login pages—often bypassing basic link scanning.

Tip: Use the phone camera preview and verify the domain before signing in.


🌐 Look-Alike Domains and “Evil” URLs

Domains that look nearly identical: micros0ft-login.com, paypaI.com (capital i), subdomains like microsoft.com.secure-login[.]site.

Tip: Read domains right-to-left and verify the real base domain.


📎 HTML Attachments and “Cloud Share” Traps

Attackers send HTML files or fake SharePoint/Google Drive links that open realistic login pages to steal credentials.

Tip: Treat unexpected “shared document” alerts as suspicious—confirm with the sender via another channel.


🎭 Smishing + Vishing (SMS & Voice Phishing)

Scams shift to SMS and calls: “Your parcel is held,” “Your bank account is locked,” “IT support needs your code.”

Tip: Never trust caller ID. Call back via official numbers.


🧠 Multi-Step Phishing (More Realistic)

Attackers build trust over multiple messages: first a harmless question, then a “document,” then login prompt.

Tip: Verify before you click, especially when a conversation suddenly changes direction.


🛑 Common Red Flags (Quick Scan)

✅ Unexpected urgency (“do this now”)
✅ Unusual payment or bank change request
✅ Sender display name looks right but email is wrong
✅ Links/QR codes that don’t match the brand
✅ Requests for OTP/MFA codes or password resets
✅ Attachments you didn’t expect (especially HTML/ZIP)


✅ How to Stay Safe (People + Process + Tech)

👩‍💻 For Employees (Simple Habits)

✅ The 10-Second Check

  1. Who is this really from? (check full email address)

  2. What are they asking you to do? (money, login, code, data)

  3. Where does the link go? (hover/preview)

  4. Verify via Teams/phone if it’s sensitive

🧾 Payment Safety Rule

If it involves money, bank details, gift cards, or payroll, verify using a known number or in-person approval.

🧯 If You Clicked a Phishing Link (What to Do Immediately)

✅ Disconnect from VPN/Wi-Fi if you downloaded something
✅ Report to IT/SOC immediately (don’t feel embarrassed—speed matters)
✅ Change password from a clean device
✅ If you entered MFA/OTP, tell IT right away—session tokens may be compromised
✅ Check for suspicious mailbox rules / forwarding

Categories:

Leave a Reply

Your email address will not be published. Required fields are marked *