www.cisa.gov Open in urlscan Pro
2600:141b:13:7af::447a  Public Scan

Submitted URL: https://www.us-cert.gov/cas/tips/ST04-014.html
Effective URL: https://www.cisa.gov/uscert/ncas/tips/ST04-014
Submission: On January 20 via api from TR — Scanned from US

Form analysis 3 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify

<form action="https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify"><label class="visually-hidden" for="email-address-field">Enter your email address</label> <input class="signup-form" id="email-address-field" name="email"
    placeholder=" Enter your email address" title="Enter your email address" type="text"><br><input class="btn btn-primary" name="submit" title="Sign up for alerts" type="submit" value="Sign Up">&nbsp;</form>

Text Content

Skip to main content

An official website of the United States government Here's how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.
×

search
 

CISA.gov Services Report

--------------------------------------------------------------------------------

Toggle navigation

×

search
 

CISA.gov
Services
Report


CERTMAIN MENU

 * Alerts and Tips
 * Resources
 * Industrial Control Systems

--------------------------------------------------------------------------------



 1. National Cyber Awareness System    >
 2. Tips    >
 3. Avoiding Social Engineering and Phishing Attacks

View Previous Tips


SECURITY TIP (ST04-014)


AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

Original release date: October 22, 2009 | Last revised: August 25, 2020


Do not give sensitive information to others unless you are sure that they are
indeed who they claim to be and that they should have access to the information.


WHAT IS A SOCIAL ENGINEERING ATTACK?

In a social engineering attack, an attacker uses human interaction (social
skills) to obtain or compromise information about an organization or its
computer systems. An attacker may seem unassuming and respectable, possibly
claiming to be a new employee, repair person, or researcher and even offering
credentials to support that identity. However, by asking questions, he or she
may be able to piece together enough information to infiltrate an organization's
network. If an attacker is not able to gather enough information from one
source, he or she may contact another source within the same organization and
rely on the information from the first source to add to his or her credibility.


WHAT IS A PHISHING ATTACK?

Phishing is a form of social engineering. Phishing attacks use email or
malicious websites to solicit personal information by posing as a trustworthy
organization. For example, an attacker may send email seemingly from a reputable
credit card company or financial institution that requests account information,
often suggesting that there is a problem. When users respond with the requested
information, attackers can use it to gain access to the accounts.

Phishing attacks may also appear to come from other types of organizations, such
as charities. Attackers often take advantage of current events and certain times
of the year, such as

 * Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
 * Epidemics and health scares (e.g., H1N1, COVID-19)
 * Economic concerns (e.g., IRS scams)
 * Major political elections
 * Holidays


WHAT IS A VISHING ATTACK?

Vishing is the social engineering approach that leverages voice communication.
This technique can be combined with other forms of social engineering that
entice a victim to call a certain number and divulge sensitive information.
Advanced vishing attacks can take place completely over voice communications by
exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting
services. VoIP easily allows caller identity (ID) to be spoofed, which can take
advantage of the public’s misplaced trust in the security of phone services,
especially landline services. Landline communication cannot be intercepted
without physical access to the line; however, this trait is not beneficial when
communicating directly with a malicious actor.


WHAT IS A SMISHING ATTACK?

Smishing is a form of social engineering that exploits SMS, or text, messages.
Text messages can contain links to such things as webpages, email addresses or
phone numbers that when clicked may automatically open a browser window or email
message or dial a number. This integration of email, voice, text message, and
web browser functionality increases the likelihood that users will fall victim
to engineered malicious activity. 


WHAT ARE COMMON INDICATORS OF PHISHING ATTEMPTS?

 * Suspicious sender’s address. The sender's address may imitate a legitimate
   business. Cybercriminals often use an email address that closely resembles
   one from a reputable company by altering or omitting a few characters. 
 * Generic greetings and signature. Both a generic greeting—such as “Dear Valued
   Customer” or “Sir/Ma’am”—and a lack of contact information in the signature
   block are strong indicators of a phishing email. A trusted organization will
   normally address you by name and provide their contact information.
 * Spoofed hyperlinks and websites. If you hover your cursor over any links in
   the body of the email, and the links do not match the text that appears when
   hovering over them, the link may be spoofed. Malicious websites may look
   identical to a legitimate site, but the URL may use a variation in spelling
   or a different domain (e.g., .com vs. .net). Additionally, cybercriminals may
   use a URL shortening service to hide the true destination of the link.
 * Spelling and layout. Poor grammar and sentence structure, misspellings, and
   inconsistent formatting are other indicators of a possible phishing attempt.
   Reputable institutions have dedicated personnel that produce, verify, and
   proofread customer correspondence.
 * Suspicious attachments. An unsolicited email requesting a user download and
   open an attachment is a common delivery mechanism for malware. A
   cybercriminal may use a false sense of urgency or importance to help persuade
   a user to download or open an attachment without examining it first.


HOW DO YOU AVOID BEING A VICTIM?

 * Be suspicious of unsolicited phone calls, visits, or email messages from
   individuals asking about employees or other internal information. If an
   unknown individual claims to be from a legitimate organization, try to verify
   his or her identity directly with the company.
 * Do not provide personal information or information about your organization,
   including its structure or networks, unless you are certain of a person's
   authority to have the information.
 * Do not reveal personal or financial information in email, and do not respond
   to email solicitations for this information. This includes following links
   sent in email.
 * Don't send sensitive information over the internet before checking a
   website's security. (See Protecting Your Privacy for more information.)
   * Pay attention to the Uniform Resource Locator (URL) of a website. Look for
     URLs that begin with "https"—an indication that sites are secure—rather
     than "http.”
   * Look for a closed padlock icon—a sign your information will be encrypted.
 * If you are unsure whether an email request is legitimate, try to verify it by
   contacting the company directly. Do not use contact information provided on a
   website connected to the request; instead, check previous statements for
   contact information. Information about known phishing attacks is also
   available online from groups such as the Anti-Phishing Working Group. (See
   the APWG eCrime Research Papers).
 * Install and maintain anti-virus software, firewalls, and email filters to
   reduce some of this traffic. (See Understanding Firewalls for Home and Small
   Office Use, Protecting Against Malicious Code, and Reducing Spam for more
   information.)
 * Take advantage of any anti-phishing features offered by your email client and
   web browser.
 * Enforce multi-factor authentication (MFA). (See Supplementing Passwords for
   more information.)


WHAT DO YOU DO IF YOU THINK YOU ARE A VICTIM?

 * If you believe you might have revealed sensitive information about your
   organization, report it to the appropriate people within the organization,
   including network administrators. They can be alert for any suspicious or
   unusual activity.
 * If you believe your financial accounts may be compromised, contact your
   financial institution immediately and close any accounts that may have been
   compromised. Watch for any unexplainable charges to your account.
 * Immediately change any passwords you might have revealed. If you used the
   same password for multiple resources, make sure to change it for each
   account, and do not use that password in the future.
 * Watch for other signs of identity theft. (See Preventing and Responding to
   Identity Theft for more information.)
 * Consider reporting the attack to the police, and file a report with the
   Federal Trade Commission.


AUTHORS

Cybersecurity and Infrastructure Security Agency (CISA)

This product is provided subject to this Notification and this Privacy & Use
policy.

Please share your thoughts.

We recently updated our anonymous product survey; we'd welcome your feedback.


CONTACT US

(888)282-0870

Send us email(link sends email)

Download PGP/GPG keys

Submit website feedback


SUBSCRIBE TO ALERTS

Receive security alerts, tips, and other updates.

Enter your email address
 


HSIN
Report

--------------------------------------------------------------------------------

Home   Site Map   FAQ   Contact Us   Traffic Light Protocol   PCII  
Accountability   Disclaimer   Privacy Policy   FOIA   No Fear Act  
AccessibilityPlain WritingPlug-ins   Inspector General   The White House  
USA.gov
 

CISA is part of the Department of Homeland Security