Cybersecurity Tips to avoid getting hooked by phishing scams

The FBI reports that phishing attacks are the most common cybercrime in America (see examples at https://www.fbi.gov/scams-and-safety).  Scammers know you're overloaded with email and seize the opportunity to catch you off guard.  These fraudulent emails often claim to be from known individuals or legitimate organizations.  They may contain links to fake websites that impersonate popular retail brands (e.g., Amazon, UPS, banks) where you are asked to enter your email address, password, or other sensitive information, or simply ask if you are available.  Some messages also include malicious attachments intended to infect your computer or devices. It is important that you treat every email with a healthy dose of skepticism.  Here are some tips to help you avoid getting hooked by phishing scams:

Why should I care / who is behind these attacks?

Watch this 6 minute (external) video to learn more about hackers and their victims.

How to spot a phish:

  1. If an email is asking you to do something, has links, QR codes, or attachments stop and question its legitimacy before taking an action 
    1. Wait to take action.  Most mistakes are made when we are multitasking or in a rush. If there is a widespread attack, the IT Security Office will usually update the Phish bowl (see below) and ILR Technology Services may send an email alert, but it might take several hours to reach a critical mass.
    2. Check the sender’s email address. A common technique called Spoofing" is where hackers use a disposable email address and pretend it is from a leader or colleague (E.G.  a message from ajc22459@gmail.com isn’t really from Dean Colvin)
    3. Be suspicious of email that contains QR (quick reference) codes.  This is a common hacking technique used in an attempt to circumvent other protections.  See example email in the Phish Bowl.
  2. Inspect links in emails, particularly when being urged to take immediate action
    1. Cornell IT has implemented Safe Links to help protect the community from malicious attacks.  Learn more about this service here.
    2. If you are on a mobile device, consider waiting to respond from a Cornell Certified Desktop computer
    3. Hover your mouse pointer over links (don’t click) to reveal their true destination (URL)
    4. Watch this 5 minute video and see other tips from the Cornell IT Security Office to learn how to spot phishing emails and interpret URLs
    5. If the message looks bogus, it probably is; delete it or move to the Junk E-Mail folder and move on
  3. Do NOT open attachments or click links to “see what they are”
    1. Consider the potential impact that a single click could have on the rest of your day, your colleagues, and your IT support team
  4. If you are convinced that the message warrants your attention, find a way to confirm its validity that circumvents the links and attachments
    1. Remember that email is not secure and it is trivial for hackers to spoof the “from:” address.  Hover over the senders name and check the email address for legitimacy.
    2. If the “sender” appears to be someone you know and the email address is legitimate, contact them via another channel (phone, text message, direct email, etc.) 
    3. Check the Cornell Phish Bowl for known fraudulent emails
    4. Check the verified Cornell communications page for a list of legitimate Cornell business related emails
    5. Google the topic of the email to check for known scams
    6. If the message is from a vendor, connect to the company’s official web site
  5. If you still aren’t sure, forward the email including attachments to ilrtsrequests@cornell.edu and we will investigate
    1. For a faster response, include the full headers of the original email

For assistance with these or any other technology related concerns, please submit a Service Request and we will connect with you. 

Was this helpful?
0 reviews

Details

Article ID: 3348
Created
Fri 3/4/22 9:34 AM
Modified
Mon 2/12/24 2:56 PM