Orlando Sentinel

Holidays bring phishing scam surge

-

called social engineerin­g, they construct emails that look realistic, as if they truly come from a boss, colleague, friend, potential client or vendor, a bank and even the IRS.

“In the last year or two they’ve been running more profession­al campaigns,” says Perry Toone, owner of Thexyz, an email service provider based in Toronto.

“It can take a couple of minutes for me to determine that they’re phishing scams. That tells me they’re doing a very good job.”

Radin believes the scammers found her through her website or a blog. Like many small businesses, she has an email address on her site, and the scammers figured out that she might be interested in selling via a holiday gift guide.

But finding a target is one thing; the scam won’t work unless it tricks an email recipient into clicking. Even those who are tech savvy can sometimes let their guard down. Radin was duped even though she’s the author of “Everyone’s Been Hacked,” a book sold online.

Often a scam succeeds because there’s just a shred of doubt in a computer user — the email is realistic enough that an owner or employee feels they need to read it. Sometimes a staffer clicks out of fear or a sense of responsibi­lity, says Rahul Telang, a professor of informatio­n systems at Carnegie Mellon University’s Heinz College.

“It might not sound very personal, but you have an idea that you should go ahead — you feel like the email is coming from the boss,” he says.

Computer users may not be looking as closely as they should at an email — there can be subtle signs that a message is trouble. Terry Cole, owner of Cole Informatic­s, a company whose work includes cybersecur­ity, recalls getting an email that truly seemed to be from a colleague. He was one of several people in the industry to receive it.

“It said that this colleague had sent me a secure private message that was ready for me to read and included a link to click. This was absolutely consistent with my normal experience­s communicat­ing with him,” says Cole, whose company is in Parsons, Tennessee.

Cole didn’t do in that instance what he usually does and advises everyone to do: check the email address to be sure it’s completely correct. When he clicked on the link, it took him to a bogus website claiming to be connected with Microsoft and asking him for his ID and password. He went no further and suffered no damage to his PC.

The holidays provide scammers with extra opportunit­ies: emailed greeting cards, package shipment notices, offers of discounts — all of them false. Cybercrimi­nals also seek personal informatio­n from owners and employees under the guise of needing them to create a W-2 or 1099 tax form; at this time of year, business owners’ thoughts are turning to taxes.

“Something that claims to know you, your name, where you work and wants you to take some action is harder to spot,” says Sherrod DeGrippo, senior director of threat research and detection at Proofpoint, a cybersecur­ity company based in Sunnyvale, California.

A common scam at holiday time is an email purportedl­y from the boss telling a staffer to go buy gift cards and email the numbers back, DeGrippo says.

“When it appears to come from a boss or CEO, I think there is that tendency among employees to follow those directions. They’re playing on their emotions,” she says.

Often, a scam succeeds in getting an employee to click on a personal email while on a company PC — many workers check their personal email while at work. Even though the email came through on a personal message, it’s the company’s machine that can be infected.

Companies can protect themselves in part by restrictin­g employees’ access to personal email sites, Telang says. He also suggests seminars to help staffers understand the risks that even legitimate­looking emails can present.

Some of the scams aim at monitoring a user’s keystrokes. So anyone accessing a company or personal account of any sort can be giving a criminal access to their money or sensitive personal data.

One tool to prevent a bank account from being emptied or a credit card maxed out is to have accounts with multifacto­r authentica­tion; that requires a password and a separate code sent to a different device and that is different for each login.

 ?? JENNY KANE/AP ?? Scammers find small businesses through websites, social media sites and by combing email address books.
JENNY KANE/AP Scammers find small businesses through websites, social media sites and by combing email address books.
 ?? AP ?? Danielle Radin’s small business was the target of a phishing scam.
AP Danielle Radin’s small business was the target of a phishing scam.

Newspapers in English

Newspapers from United States