So, let me tell you a story. This is a true story. A personal story about a request I got from someone who is near and dear to me.
These kinds of requests are becoming more and more common and so I wanted to share what happened so that you can recognize it when somebody comes knocking on your door (or email) with a similar ask. Who would suspect that a gift card could be the tool of a phishing attack? You should.
Here’s what happened. I received an email from a relative of mine, seemingly asking me for a ‘favor’. Now the email itself seemed benign but the ask was a bit off and it was easy to suspect that something was amiss – but since I had time that afternoon, I was willing to play along for a bit.
SO, I responded and asked what favor was needed. That’s the anticipated next step one should take when somebody you care about asks for a favor; because you care and you want to help, right?
They quickly responded back to me and explained that they were trying to buy an Amazon gift card for a friend, but couldn’t complete the transaction because they were having a problem with the bank. They asked if I would purchase the card and they’d pay me back.
Let’s pause here.
See the thing is, in some ways this could be a normal series of events. I don’t know about you but when somebody I care about asks for a favor I try and help..... but there was something about this exchange that was not normal. It did not actually come from the person that I care about. It came from an impostor and it was part of a phishing attempt.
I could see right away that the email address of the person I was communicating with was slightly different than the near and dear person. The email address was similar … but it wasn’t right. This style of phishing attack is successful because people miss the difference in something as simple as the actual email address and only pay attention to the label/name that the impostor has assigned to the account.
What did I do next? I moved into action. I was able to stop the attack and protect this individually by doing a few things:
Technical fixes aside, the more important message here is to help continue to educate and inform so that people stop falling for these attacks.
Here’s the real message. With electronic communication persona – DON’T TRUST ANYONE! As humans, we really do want to trust each other but we must handle electronic communication differently than how we handle face-to-face communication. If you and I are talking in person, I can be certain that what I hear is what you are saying. Electronic communications are so different. You REALLY have no way of confirming who you are communicating with. So, stop being so trusting!
Luckily in this case, no one that we are aware of fell for this scam. The unanticipated upside of this experience was that the person who is near and dear to me received a plethora of phone calls from people who they hadn’t spoken with in months! And… my response to the attacker was ‘ I just purchased a gift card for you LAST month and you never paid me back!’ (which promptly ended that discussion). Just like you would be a bit on your toes if you were walking in a dark alley, you should ALWAYS be on your toes in the cybersecurity world.
So, to summarize these ways to protect yourself against phishing attempts, use these 3 points to help identify if something is a potential threat:
If you have any questions about more security topics, please click here!