Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Security › Top Five Examples of Phishing Attacks in 2017

    Top Five Examples of Phishing Attacks in 2017

    By Vikram Singh RaoJuly 20, 2021
    Facebook Twitter Reddit LinkedIn
    phishing

    An alarming 60% of small firms that have been a victim of cybercrime go out of business within just six months of the attack. With an increasing number of phishing scams, it would serve these businesses to be aware of the different kinds of attacks currently inflicting themselves on unsuspecting targets, in order to prepare themselves and to limit any potential damage.

    Here are five examples of phishing attacks that targeted small firms in 2017 and the kind of attack that businesses need to be looking out for.

    Contents

    • The ‘Shipping Information’ Phishing Scam
    • Business Email Compromise (BEC)
    • IRS W2 Tax Season Spear-Phishing Scam
    • Google Docs Hack
    • Phishing Attack on Chipotle

    The ‘Shipping Information’ Phishing Scam

    A new category of phishing scams was unveiled in 2017, designed specifically for small businesses. A phishing email was sent to over 3,000 businesses with a subject line that read ‘Shipping Information. The body of the email described a future delivery from United Parcel Service (UPS), which included an innocent-looking tracking link. When the recipient opened the link, however, they left themselves vulnerable to malware and potentially letting loose a virus into their system.

     

    Business Email Compromise (BEC)

    The attack from the BEC, based in Nigeria, hit more than 50 countries and targetted over 500 businesses, mainly industrial firms. Recipients of the email were asked to download a malicious file. Once the file was downloaded, the malware was free to make its way around business networks and data.

    IRS W2 Tax Season Spear-Phishing Scam

    A spear-phishing email circulated at the start of last year’s U.S. tax season. A number of fake emails were sent out in the W-2 Phishing Scam. The emails appeared to come from corporate executives and asked employees to submit personal details for tax and compliance purposes. A spear-phishing email is a seemingly innocent email sent to an individual, prompting them to click on a link, after which they’re then asked to enter sensitive data, such as financial details. Details in this can then be used to impersonate the victim when making online transactions.

    Google Docs Hack

    In May last year, over three million workers all over the world had to stop working after a fraudulent email was sent via Google Docs that invited recipients to edit documents. Once an invitation was opened, it took the user to a third-party app that allowed cybercriminals to access their Gmail account.

    Phishing Attack on Chipotle

    Earlier this year, a team of cybercriminals in Eastern Europe sent malware-laden emails to workers of fast-food chain Chipotle. When any of the staff clicked on the email, they inadvertently gave the hackers access to POS systems in numerous Chipotle branches. The cybercriminals were then able to acquire the credit card details of millions of Chipotle customers.

    The consequences for any business that ignores the risks involved with a phishing attack can be fatal. It’s within the interest of every company to implement security measures that have been proven to work. Rather than only taking action after the event, these businesses need to establish a policy around security that becomes a part of their company culture.

    One significant part of this policy should be additional caution when opening emails from unknown email addresses and avoiding opening them, or certainly avoid clicking on any links they’re unsure of.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024

    Navigating the Waters: Best Practices for Phishing Testing in 2024

    February 19, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.