www.cisa.gov Open in urlscan Pro
2a02:26f0:dc:38f::447a  Public Scan

URL: https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks
Submission: On March 07 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium Businesses
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Contact Us
   Site Links
   CISA Administrative Subpoena
   Reporting Employee and Contractor Misconduct
   CISA GitHub

Report a Cyber Issue
Breadcrumb
 1. Home
 2. News & Events
 3. News

Share:


Blog


AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

Released
February 01, 2021




WHAT IS A SOCIAL ENGINEERING ATTACK?

In a social engineering attack, an attacker uses human interaction (social
skills) to obtain or compromise information about an organization or its
computer systems. An attacker may seem unassuming and respectable, possibly
claiming to be a new employee, repair person, or researcher and even offering
credentials to support that identity. However, by asking questions, he or she
may be able to piece together enough information to infiltrate an organization's
network. If an attacker is not able to gather enough information from one
source, he or she may contact another source within the same organization and
rely on the information from the first source to add to his or her credibility.


WHAT IS A PHISHING ATTACK?

Phishing is a form of social engineering. Phishing attacks use email or
malicious websites to solicit personal information by posing as a trustworthy
organization. For example, an attacker may send email seemingly from a reputable
credit card company or financial institution that requests account information,
often suggesting that there is a problem. When users respond with the requested
information, attackers can use it to gain access to the accounts.

Phishing attacks may also appear to come from other types of organizations, such
as charities. Attackers often take advantage of current events and certain times
of the year, such as

 * Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
 * Epidemics and health scares (e.g., H1N1, COVID-19)
 * Economic concerns (e.g., IRS scams)
 * Major political elections
 * Holidays


WHAT IS A VISHING ATTACK?

Vishing is the social engineering approach that leverages voice communication.
This technique can be combined with other forms of social engineering that
entice a victim to call a certain number and divulge sensitive information.
Advanced vishing attacks can take place completely over voice communications by
exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting
services. VoIP easily allows caller identity (ID) to be spoofed, which can take
advantage of the public's misplaced trust in the security of phone services,
especially landline services. Landline communication cannot be intercepted
without physical access to the line; however, this trait is not beneficial when
communicating directly with a malicious actor.


WHAT IS A SMISHING ATTACK?

Smishing is a form of social engineering that exploits SMS, or text, messages.
Text messages can contain links to such things as webpages, email addresses or
phone numbers that when clicked may automatically open a browser window or email
message or dial a number. This integration of email, voice, text message, and
web browser functionality increases the likelihood that users will fall victim
to engineered malicious activity.


WHAT ARE COMMON INDICATORS OF PHISHING ATTEMPTS?

 * Suspicious sender's address. The sender's address may imitate a legitimate
   business. Cybercriminals often use an email address that closely resembles
   one from a reputable company by altering or omitting a few characters.
 * Generic greetings and signature. Both a generic greeting—such as "Dear Valued
   Customer" or "Sir/Ma'am"—and a lack of contact information in the signature
   block are strong indicators of a phishing email. A trusted organization will
   normally address you by name and provide their contact information.
 * Spoofed hyperlinks and websites. If you hover your cursor over any links in
   the body of the email, and the links do not match the text that appears when
   hovering over them, the link may be spoofed. Malicious websites may look
   identical to a legitimate site, but the URL may use a variation in spelling
   or a different domain (e.g., .com vs. .net). Additionally, cybercriminals may
   use a URL shortening service to hide the true destination of the link.
 * Spelling and layout. Poor grammar and sentence structure, misspellings, and
   inconsistent formatting are other indicators of a possible phishing attempt.
   Reputable institutions have dedicated personnel that produce, verify, and
   proofread customer correspondence.
 * Suspicious attachments. An unsolicited email requesting a user download and
   open an attachment is a common delivery mechanism for malware. A
   cybercriminal may use a false sense of urgency or importance to help persuade
   a user to download or open an attachment without examining it first.


HOW DO YOU AVOID BEING A VICTIM?

 * Be suspicious of unsolicited phone calls, visits, or email messages from
   individuals asking about employees or other internal information. If an
   unknown individual claims to be from a legitimate organization, try to verify
   his or her identity directly with the company.
 * Do not provide personal information or information about your organization,
   including its structure or networks, unless you are certain of a person's
   authority to have the information.
 * Do not reveal personal or financial information in email, and do not respond
   to email solicitations for this information. This includes following links
   sent in email.
 * Don't send sensitive information over the internet before checking a
   website's security. (See Protecting Your Privacy for more information.)
   * Pay attention to the Uniform Resource Locator (URL) of a website. Look for
     URLs that begin with "https"—an indication that sites are secure—rather
     than "http."
   * Look for a closed padlock icon—a sign your information will be encrypted.
 * If you are unsure whether an email request is legitimate, try to verify it by
   contacting the company directly. Do not use contact information provided on a
   website connected to the request; instead, check previous statements for
   contact information. Information about known phishing attacks is also
   available online from groups such as the Anti-Phishing Working Group(link is
   external). (See the APWG eCrime Research Papers(link is external)).
 * Install and maintain anti-virus software, firewalls, and email filters to
   reduce some of this traffic. (See Understanding Firewalls for Home and Small
   Office Use, Protecting Against Malicious Code, and Reducing Spam for more
   information.)
 * Take advantage of any anti-phishing features offered by your email client and
   web browser.
 * Enforce multifactor authentication (MFA). (See Supplementing Passwords for
   more information.)


WHAT DO YOU DO IF YOU THINK YOU ARE A VICTIM?

 * If you believe you might have revealed sensitive information about your
   organization, report it to the appropriate people within the organization,
   including network administrators. They can be alert for any suspicious or
   unusual activity.
 * If you believe your financial accounts may be compromised, contact your
   financial institution immediately and close any accounts that may have been
   compromised. Watch for any unexplainable charges to your account.
 * Immediately change any passwords you might have revealed. If you used the
   same password for multiple resources, make sure to change it for each
   account, and do not use that password in the future.
 * Watch for other signs of identity theft. (See Preventing and Responding to
   Identity Theft for more information.)
 * Consider reporting the attack to the police, and file a report with the
   Federal Trade Commission(link is external).


RELATED ARTICLES

Mar 07, 2023
Blog


SAFECOM AND NCSWIC RELEASE LLA AND LLE: ARE YOU REALLY SECURE?

Mar 01, 2023
Blog


HELPING CYBER DEFENDERS “DECIDE” TO USE MITRE ATT&CK

Feb 24, 2023
Blog


IT'S A NEW DAWN, IT'S A NEW DAY, IT'S A NEW WEBSITE FOR CISA!

Feb 23, 2023
Blog


SUPPLEMENTING PASSWORDS

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * The White House
 * USA.gov
 * Website Feedback