Just got bump this terminology, The "whaling attack"


So I got this recently a new terminology called as "Whaling Attack"?

Whaling attack is similarly same as with other phishing attack but its target is going to the big fish, which is the CEO, CFO, or COO in the company or in a large organization. Its purpose is to lure and deceive the victim using an e-mail or other multi-media sources that could lead the victim to think that this data is a valid information and that he/she is required to respond at least to the destination source where the attacker innovate to make thing it's a legit destination, for example an e-mail address, SMS, or maybe through a social media, which is actually kinda stupid to think of, but still a valid source.


In many whaling phishing attacks, the attacker's goal is to manipulate the victim into authorizing high-value wire transfers to the attacker. The term whaling stems from the size of the attacks, and the whales are thought to be picked based on their authority within the company.

Due to their highly targeted nature, whaling attacks are often more difficult to detect than standard phishing attacks. In the enterprise, security administrators can help reduce the effectiveness of whaling attacks by encouraging the corporate management staff to undergo information security awareness training.


How whaling attacks work?

The goal of a whaling attack is to trick an individual into disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts. For example, the attackers may send the victim an email that appears to be from a trusted source; some whaling campaigns include a customized malicious website that has been created especially for the attack.

Whaling attack emails and websites are highly customized and personalized, and they often incorporate the target's name, job title or other relevant information gleaned from a variety of sources. This level of personalization makes it difficult to detect a whaling attack.

Whaling attacks often depend on social engineering techniques, as attackers will send hyperlinks or attachments to infect their victims with malware or to solicit sensitive information. By targeting high-value victims, especially CEOs and other corporate officers, attackers may also induce them to approve fraudulent wire transfers using business email compromise techniques. In some cases, the attacker impersonates the CEO or other corporate officers to convince employees to carry out financial transfers.

These attacks can fool victims because attackers are willing to spend more time and effort constructing them due to their potentially high returns. Attackers will often use social media, such as Facebook, Twitter and LinkedIn, to gather personal information about their victim to make the whaling phishing attack more plausible.

Differences between phishing, whaling phishing and spear phishing

Because ordinary phishing attacks, whaling phishing attacks and spear phishing attacks are all online attacks on users in order to gain sensitive information or to social engineer the victim into taking some harmful action, the three are often confused.

A whaling attack is a special form of spear phishing that targets specific high ranking victims within a company. Spear phishing attacks can target any specific individual. Both types of attack generally require more time and effort on the part of the attacker than ordinary phishing attacks.

Phishing is a broader term that covers any type of attack that tries to fool a victim into taking some action, including sharing sensitive information, such as usernames, passwords and financial records for malicious purposes; installing malware; or completing a fraudulent financial payment or wire transfer. While ordinary phishing attacks usually involve sending emails to a large number of individuals without knowing how many will be successful, whaling phishing attacks usually target one specific individual at a time -- typically a high-ranking individual -- with highly personalized information.

Comments

Popular posts from this blog

LVM: How to remove a volume using pvremove

Using Oracle 11g thru VirtualBox appliance in Mac OS X Lion

Use Shell Editor for Eclipse for editing bash, ksh, csh in Unix/Linux system