recommended reading

How to Avoid Getting Spear-Phished by China's Hackers Who Cracked Apple

Ivelin Radkov/Shutterstock.com

The tidal wave of Chinese hack attacks on the U.S. in recent weeks, from The New York Times and the Defense Department to Facebook and now even Apple, have one increasingly common and sophisticated type of malware trick in common: "spear-phishing." The tech giants seem to be the victim of a site called iPhonedevSdk, while WikiLeaks and a new cyber-espionage report appear to connect hacked Cabinet-level emails with a Chinese army-linked group known as "Comment Crew." But beyond the initial paranoia that we may be on the brink of "an asymmetrical digital with China," you'd be forgiven for asking: If tech giants and the government can fall prey to a bad link in an email, why can't I? As some have quipped, targeted spear-phishing emails are "not a terribly sophisticated attack" — it's advance spam, really — but just because the more complex spear-phishing schemes make up a fraction of basic phishing scams doesn't mean you and your company can't avoid embarrassment. Spear-fishing does pay off for hackers 40-to-1, after all. This new round of attacks may be more sophisticated than that, as Facebook has insistedsince it unveiled its internal vulnerability on Friday, but here's a starter guide on how not to be that guy, just in case the Chinese hacker war hits your inbox next:

Step 1: Understand the Difference Between Phishing and Spear-Phishing

Phishing attacks are the more blatantly malicious ones — they come from big organizations sending generic emails from generic addresses to thousands of inboxes, hoping that just some of the malware recipients will click a malicious link or download an infected file. A common phishing scam is a fake version of your bank asking you for your online banking login, but it gets worse than that

Spear-phishing, on the other hand, targets a small group of specific users, as ComputerWorld's Gregg Keizer explained in a 2011 post. And instead of coming from a big company or social-media network, these emails come from senders who appear to be colleagues or friends. They also tend to include personalized touches, as security firm Norton explains on its site:

The salutation on the email message is likely to be personalized: "Hi Bob" instead of "Dear Sir." The email may make reference to a "mutual friend." Or to a recent online purchase you've made. Because the email seems to come from someone you know, you may be less vigilant and give them the information they ask for.

Read more at The Atlantic Wire

(Image via Ivelin Radkov/Shutterstock.com)

Threatwatch Alert

Spear-phishing

Google Chrome Update Addresses Super Sneaky URL Trick

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.