If you work in finance or accounting and receive an email from your boss asking you to transfer some funds to an external account, you might want to think twice.
That's because so-called "whaling" attacks -- a refined kind of phishing in which hackers use spoofed or similar-sounding domain names to make it look like the emails they send are from your CFO or CEO -- are on the rise, according to security firm Mimecast.
If fact, 55 percent of the 442 IT professionals Mimecast surveyed this month said their organizations have seen an increase in the volume of whaling attacks over the past three months, the firm reported on Wednesday.
Those organizations spanned the U.S., U.K., South Africa and Australia.
Domain-spoofing is the most popular strategy, accounting for 70 percent of such attacks, Mimecast said; the majority pretend to be the CEO, but some 35 percent of organizations had seen whaling emails attributed to the CFO.
"Whaling emails can be more difficult to detect because they don't contain a hyperlink or malicious attachment, and rely solely on social engineering to trick their targets," said Orlando Scott-Cowley, a cybersecurity strategist with Mimecast.
(Score: 2) by The Archon V2.0 on Saturday December 26 2015, @11:08PM
If only we had that level of control. We got hit with a whaling attack two weeks ago. At least (I'm not completely in the loop) four high-ranking members of the finance department got hit. Three reported the e-mail or spam-binned it because they had the brain to realize the CEO didn't change writing style/"accent" since his speech to them the day before. Or maybe they saw that the special highlight next to internal e-mail addresses wasn't there. Or maybe they got up and walked the 50 feet to ask him.
The fourth sent our BYOD iPhone/Android support guys an e-mail saying she'd been getting e-mails from the CEO but his instructions were getting confusing and she needed help.
Well, I suppose we know IT's ticket escalation rules are working, if that got where it needed to go....