Article

Piotr Nasiłowski – Business Cyber Security Consultant

Category: Expert stories

Cybersecurity in the age of phishing – how you get tricked

Freelance consultant Piotr Nasilowski received a strange yet compelling email that almost made the cybersecurity specialist give into temptation.

Luckily, he realised the email was too good to be true: proving that an expert can also be susceptible to cybercrimes.

By Piotr Nasiłowski – Business Cybersecurity Consultant

In May 2021, I found a bizarre email in my mailbox – the Director of the National Centre of Cyberspace Security demanded that I confirm my readiness to be enlisted in the Cyber Army. The message contained a direct link to the enlistment form for this unit.

As I was scratching my head, I kept reading about how the situation was dramatic because “now only thanks to the supply of electricity from Germany and Sweden our country can function”. It was so improbable that I could not take it seriously. Or should I?

Since I am a cybersecurity expert – and I was sure that I had not been called up to the cyber army – I realised I had become the target of a campaign to defraud me of my data.

It got me thinking: most internet users do not have the expertise in cybersecurity. But by building awareness of cyber threats, everyone can fight cybercriminals daily. What is more – everyone should fight them.

In other words: by using the web, we all have been called up to the cyber army.


 

  Phishing messages are crafted to look as much like actual correspondence from a trusted sender as possible. Phishing emails addressed to the mailboxes of employees in public institutions or corporations are especially critical. They may compromise data not only of an individual but also the work of the entire organisation.

 


The rod and the bait – meet phishing

The scam described above is called phishing (derived from “fishing” = catching fish) and is a prevalent form of cyberattack. It uses electronic mail, Instagram, Facebook or Twitter but also text messages and phone calls.

Phishing aims to mislead a recipient to achieve certain benefits. The scammer uses personal data, access to a bank account, a computer, or confidential information if the user stores it on the workstation.

 

      • The fishing rod is the communication channel (e.g. email, text message)
      • The bait is the manipulative message
      • The catch is the information that provides the cybercriminal with specific benefits such as access to a bank account, a government institution, confidential corporate information.

Phishing messages are crafted with a lot of care to look as much like actual correspondence from a trusted sender as possible. Phishing emails addressed to the mailboxes of employees in public institutions or corporations are especially critical. They may compromise data not only of an individual but also the work of the entire organisation.

 

Spear phishing

Another category of attacks is spear phishing, by targeting specific organisations or employees at particular positions.
Such messages are created with the use of social engineering techniques.

It is not uncommon for scammers to perform surveillance on the Internet about the person or the specific position at which the person works.

 

Whaling

Whaling, or hunting for a “whale” or “big fish”, is a separate category of phishing.

“Big fish” are CEOs of large corporations, senior executives and similar persons at high-level positions. Messages crafted for whaling require much more effort from a cybercriminal than phishing addressed to random users.

People at high-level positions are more widely educated, intelligent, and well-read, making it harder to trick them.

 

CEO fraud

Although the situations in which cybercriminals are successful in whaling are infrequent, often only one click per tens of thousands of emails is enough for the company to suffer millions of dollars in losses.

The same applies to a category of phishing known as CEO fraud. The criminal impersonates a superior in order, for example, to instruct a bank employee to make a transfer to a designated account.

 

Clone phishing

An exciting and treacherous case is also clone phishing.

This type of attack is usually preceded by breaking into and stealing company resources through an original, previously sent email (including the list of recipients and an attachment or link) replaced with a malicious one and then resent.

Clone phishing is one of the most dangerous attacks because it is hard to differentiate it from genuine emails.

You receive communication which content you know well because you usually receive several of them during the day. And without thinking, you click a link.

However, the link does not lead to the familiar website; instead, you have become a victim of a phishing attack. And malware will probably be installed on your workstation by the scammers.

 

Vishing and Smishing

Not only electronic mail can be a communication channel for phishing scammers.

With voice phishing (vishing), the attack occurs through the automatic dialling of many telephone numbers. It will play a previously prepared recording, providing false information about an unauthorised transaction from their account and the like.

It is dangerous as the telephone number is consistent with the number assigned to the bank’s hotline. And a voice message tells us to call the phone number to resolve the problem. You will connect to a scammer who will trick you into accessing your bank account.

With SMS phishing (smishing), the scammers ask the user in the text message to contact a specific phone number, click a link or write an email to a specified address. Then the whole process of social engineering and phishing occurs.

 

Page hijacking

Slightly less common - and one of the most dangerous phishing attacks - is page hijacking. This includes manipulation of the content of an existing website to steal user data.

The website you usually use appears normal, but when you enter it, you automatically download malware, and the attacker may steal data from your workstation.

There is a particular method used by Internet scammers – manipulation of the domain names. The scammer changes just one letter in the URLs, and everything looks all right at first glance, e.g. onlne.mbank.pl instead of online.mbank.pl.

It is easy to overlook such a typo; thus, browsing a fake domain and entering your online account login information can be disastrous.

Piotr Nasiłowski – Business Cyber Security Consultant

Piotr Nasiłowski : Clone phishing is one of the most dangerous attacks because it is hard to differentiate it from genuine emails


 

  Everyone thinks that they will not be deceived, but internet criminals create new attack methods every day.

 


How not to take the bait

I recently came across the news about a very clever credit card phishing campaign on the OLX platform – I recommend reading this article: What does an OLX scam victim feel? (In Polish). As the victim says, “I thought no one could deceive me, but I have still been scammed”.

The victims of phishing attacks are not only the elderly who are not online savvy due to the generational gap. Nor are these uneducated people.

Sometimes it’s enough to not act automatically: read carefully, look carefully, and don't click anything while you're affected by emotions or haste.


 

  Sometimes it’s enough to not act automatically: read carefully, look carefully, and don't click anything while you're affected by emotions or haste.

 


Piotr Nasiłowski is a certified Business Cyber Security Consultant with six years of professional track record in the field

9 bits of advice on how to avoid Internet scam

Check carefully every email address from which you received a message: you can use a simple Google search to check if the address is associated with a given institution which it claims to be, or contact the hotline of a given institution.

ALWAYS forward emails and text messages from the people impersonating an institution to those institutions.


Do not open links to websites if the URL address looks suspicious. Take special note if the correspondence seems credible, but the sender is from an unknown address.

Read the contents of the email, text message very carefully. Clarify the situation with the institution's reliable communication channels (like the official hotline or email), regardless of the sender's address.

Check the correctness of Polish/English or another language in the message. Official messages from institutions, organisations, companies, corporations rarely have typos.

Confirm with your superior if the instruction they gave seems unusual, necessarily by other communication channels. In other words: when you receive an email in which your superior instructs you to do something extraordinary - call them.

Be up to date with the privacy policy of your bank, electricity provider, telecommunication services provider. No institution will ever ask for login information over the phone or email, no matter how trustworthy the call sounds or how professional the email looks.

Never give your credit card details when someone wants to transfer money to you. When someone has card details, they may withdraw money from it.

Show a suspicious message to someone else - your colleague from the office or the superior, and if this is a private message - someone close to you. Many phishing attacks have been thwarted just by having a third person look at a potentially dangerous message.

Blog

Read more

left-arrow
right-arrow

Agile
Expert stories

Agile Transformation in Large Enterprises

This article explores the competitive advantage of agility in businesses, focusing on how it helps companies adapt to changing markets.

Expert stories
Tech & Development

How to ensure the best collaboration between developer and tester

This article discusses practical strategies to align development requirements with actionable tasks, aiming for more efficient development cycles and better collaboration in the team.

Data & Analytics
Expert stories
Tech & Development

Exploring AI’s capability for app development

Software developer & emagineer explores the possibilities of building an application prototype with Chat GPT in this step-by-step guide.

Code
Expert stories
Succeed as a consultant

Seven mistakes every tester should avoid in QA

Written by a Test Team Leader and emagineer, this article dives into seven key pitfalls within software testing. Discover how to steer clear of these traps, strengthen your strategies, and lead your team toward testing excellence.

Expert stories
Tech & Development

Different approaches to generating front-end code

From simplifying HTTP requests to optimizing data mapping, front-end developer and emagineer Kamil Naja discusses the different approaches to generating front-end code.

Case: Tech & development
Expert stories
Succeed as a consultant

Nx for Angular: A reliable tool simplifying the work with IT projects

Front-end developer explores how Nx can benefit Angular projects and its compatibility with other technologies like React & Node.

Cloud & Infrastructure
Expert stories

Financial Management in the Cloud: Everything About FinOps

Learn about FinOps and find out how these best practices enable organizations to achieve maximum business value.

Expert stories
Succeed as a consultant

Tips from a consultant: How to optimize your workflow as an IT specialist

Front-end specialist shares his advice on how to become more efficient in your work as an IT consultant, incorporating habits that will sharpen your expertise and act as a gateway to securing better projects

Expert stories
Tech & Development

Microsoft Dev Box

Join emagineer and software architect Mateusz Pruchniak as he explores Microsoft Dev Box, virtualized solution that enables IT engineers to quickly launch self-service workstations while maintaining centralized management.

IT specialist working from home.
Expert stories
Succeed as a consultant

Non-functional requirements in the Application Development Process

Within the development process, non-functional requirements emerge as a pivotal factor. The challenge lies in effectively gathering and processing these requirements, ensuring clarity and direction for every member of the IT team. The ultimate goal: crafting a distinctive and dependable end product that offers a seamless experience to the end user.

Data & Analytics
Expert stories
Tech & Development

The Future of AI

We constantly hear that AI will take control of everything and that we as humans will become less necessary or even redundant—is that really the case? In the following article, Cloud Administrator and emagineer Paweł Pancerz discusses how this revolution will unfold in the near future.

Illustration of a solid chain with code written in the metal
Expert stories
Risk & Compliance

Best practices in Software Supply Chain Security

This article focuses on presenting key practices in software supply chain security that allow organizations to minimize the risk of security gaps and threats related to software delivery.

Expert stories
Succeed as a consultant

Snapshot testing in front-end applications

In today’s fast-paced software development landscape, maintaining application consistency is of utmost importance. One approach that has gained popularity is snapshot testing, and emagineer Kamil Naja is here to take us through the ins and outs.

Code
Expert stories
Succeed as a consultant
Tech & Development

Effective ways to work with Backend

In the realm of front-end solutions, the vital role of back-end applications cannot be overstated. In this article, emagineer Kamil Naja delves into the world of backend development, uncovering effective methods to optimize the process.

Agile
Expert stories

What it takes to succeed as an external consultant in the finance industry

The financial services sector has a reputation for being a broad, fast-paced and challenging environment, with tight timeframes and rapidly evolving customer demands. So what does this mean for a consultant working in this sector?

Expert stories

Neo4j is revolutionising information management

With the rapid growth of data, modern database solutions are gaining importance. This article explores Neo4j – a graph database that revolutionizes the way information is stored and analyzed.

code illustration
Data & Analytics
Expert stories
Tech & Development

Machine Learning Algorithm: Logistic Regression

Logistic Regression is a Linear Model for classification; a traditional linear model is used to predict a numerical value. Learn how logistic Regression works and how it differs from Linear Regression.

Data & Analytics
Expert stories
Succeed as a consultant

AI support in the development of front-end solutions

Gain valuable insights into the evolving landscape of front-end development as we explore the transformative applications of AI technologies. This article delves into three prominent AI tools: ChatGPT, GitHub Copilot, and GitHub Copilot Chat, and how they can be leveraged by front-end developers.

Agile
Expert stories

Challenges of Agile Transformation in the Finance Sector

An important part of making the change to agile is to understand the reasons for it from the outset. Organisations, including those in financial services, often do not understand why they should become agile in the first place, simply believing the transition will solve all their issues, like a plug and play solution.

Data & Analytics
Expert stories
Tech & Development

How to leverage Robotic Process Automation (RPA) to drive business growth

Automation and RPA is on the rise as businesses vie to remain competitive. Understand the factors driving this trend as companies work to stay ahead of the curve.

Warszawa downtown skyline
Bestshoring
Expert stories
Nearshoring

The Polish Advantage: A Closer Look at IT Outsourcing to Poland

Outsourcing IT development and operations to Poland can give companies advantages, such as access to highly skilled IT professionals. While cost savings are attractive, businesses prioritise expertise and the large pool of Polish developers. Learn about the main benefits and facts when considering Poland for IT outsourcing.

Michał Bucholc
Expert stories

Key areas of competence for Help Desk employees

Discover the essential skills that helpdesk employees need to excel in their roles and provide top-notch customer service. From technical knowledge to communication skills, this article explores the key areas of competence for helpdesk employees and offers actionable strategies for acquiring and honing these skills.

Data & Analytics
Expert stories
Tech & Development

Machine Learning Algorithm: Linear Regression

Linear regression is one of the most popular algorithms in both Statistics and Machine Learning. It is the simplest type of Machine Learning Algorithm. This means that it is a good place to start. In this blog, Allan Lehane is going to explain how ML Algorithms work in general using Linear Regression as an example.

Expert stories
Tech & Development

Creating a full stack application with a Machine Learning Component hosted on Microsoft’s Azure Platform

In this article we are going to discuss how a Machine Learning algorithm works in theory and I’m also going to discuss an example of a full stack application with a Machine Learning Component, which is hosted on Microsoft Azure.

Marcin Kosiński workiing as a consultant in emagine's Warsaw office.
Cloud & Infrastructure
Expert stories

A key skill set for a Data Scientist

There has been a growing demand for Data Scientists, i.e., people who analyze data in order to develop machine learning models. The work is far from boring, yet it requires specific skills and experience. Which competencies are the most important?

Piotr Nasiłowski – Business Cyber Security Consultant
Expert stories
Risk & Compliance

Cybersecurity in the age of phishing – how you get tricked

Cyber security: Freelance consultant Piotr Nasilowski received a strange yet tempting email that almost made the skilled cybersecurity specialist give into temptation. Fortunately, he realised the email was too good to be true, revealing that an expert is also susceptible to cybercrimes.