A whaling attack, also known as
whaling phishing or a whaling phishing attack, is a specific type of phishing
attack that targets high-profile employees, such as the CEO or CFO, in order to
steal sensitive information from a company, as those that hold higher positions
within the company typically have complete access to sensitive data. In many
whaling phishing attacks, the attacker's goal is to manipulate the victim into
authorizing high-value wire transfers to the attacker.
The term whaling stems from the size of
the attacks, and the whales are thought to be picked based on their authority
within the company.
Due to their highly targeted nature,
whaling attacks are often more difficult to detect than standard phishing
attacks. In the enterprise, security administrators can help reduce the
effectiveness of whaling attacks by encouraging the corporate management staff
to undergo information security awareness training.
How whaling attacks
work
The goal of a whaling attack is to
trick an individual into disclosing personal or corporate information through
social engineering, email spoofing and content spoofing efforts. For example,
the attackers may send the victim an email that appears to be from a trusted
source; some whaling campaigns include a customized malicious website that has
been created especially for the attack.
Whaling attack emails and websites are
highly customized and personalized, and they often incorporate the target's
name, job title or other relevant information gleaned from a variety of
sources. This level of personalization makes it difficult to detect a whaling
attack.
Whaling attacks often depend on social
engineering techniques, as attackers will send hyperlinks or attachments to
infect their victims with malware or to solicit sensitive information. By targeting
high-value victims, especially CEOs and other corporate officers, attackers may
also induce them to approve fraudulent wire transfers using business email
compromise techniques. In some cases, the attacker impersonates the CEO or
other corporate officers to convince employees to carry out financial
transfers.
These attacks can fool victims because
attackers are willing to spend more time and effort constructing them due to
their potentially high returns. Attackers will often use social media, such as
Facebook, Twitter and LinkedIn, to gather personal information about their
victim to make the whaling phishing attack more plausible.
Differences between
phishing, whaling phishing and spear phishing
Because ordinary phishing attacks,
whaling phishing attacks and spear phishing attacks are all online attacks on
users in order to gain sensitive information or to social engineer the victim
into taking some harmful action, the three are often confused.
A whaling attack is a special form of
spear phishing that targets specific high ranking victims within a company.
Spear phishing attacks can target any specific individual. Both types of attack
generally require more time and effort on the part of the attacker than
ordinary phishing attacks.
Phishing is a broader term that covers
any type of attack that tries to fool a victim into taking some action,
including sharing sensitive information, such as usernames, passwords and
financial records for malicious purposes; installing malware; or completing a
fraudulent financial payment or wire transfer. While ordinary phishing attacks
usually involve sending emails to a large number of individuals without knowing
how many will be successful, whaling phishing attacks usually target one
specific individual at a time -- typically a high-ranking individual -- with
highly personalized information.
Examples of whaling
attack
One notable whaling attack occurred in
2016 when a high-ranking employee at Snapchat received an email from an
attacker pretending to be the CEO. The employee was tricked into giving the
attacker employee payroll information; ultimately, the FBI investigated the
attack.
Another whaling attack from 2016
involved a Seagate employee who unknowingly emailed the income tax data of
several current and former company employees to an unauthorized third party.
After reporting the phishing scam to the IRS and the FBI, it was announced that
thousands of people's personal data was exposed in that whaling attack
Comments
Post a Comment