Phishing has been around for a long time now, and it would seem that the more people know about it the less its prevalence should become. On the contrary, phishing stats keep on rising. Now there is no way to directly confirm this because nobody has these kinds of stats. Not every phishing victim reports their experience, and even if they did there is no centralized body that keeps track of all these incidents. (Google data reveals a 350% surge in phishing websites during this Covid-19 pandemic)
Phishing is not always done only for the money. It is also carried out to gain unauthorized access to a victim’s account or device. Cyber-attacks have evolved a lot and phishing is being used in combination with other attacks to have more successful results.
1) Lack of Awareness: This is the most prevalent reason why attackers keep on succeeding over and over again. Lack of awareness may not always mean a lack of general awareness on the user’s part when it comes to technology. It could also be that a user who is new to an application might not be exactly aware of the security protocols the company(which has developed the app) has in place to prevent fraud. For example, banks frequently remind their users not to share their OTPs with anyone. But other organizations might not put in that effort and are more susceptible.
There is one more factor that goes unnoticed here. Usually, when companies issue security best practices to their users (usually sent to their mobile number as a message), the communication is done in English. The language also plays a key role. A lot of people (if you consider a country like India) may not be able to read and understand the content on these messages. This also has a contributing factor.
2) New to Technology:Â There has been an explosion in the usage in several parts of the world and a large number of people are using the internet for the first time, or have been using it only for a short amount of time. This makes them an easy target.
3) Oversharing of Information:Â People, in general, have gotten used to social media a lot. They share a lot of information about where they go, what they like etc. As soon as they find something interesting they are itching to share it with the world. They want to be the first ones to do it. As a result of this mad sharing, they do not realize how much sensitive information they give away which attackers can use.
For example, if you are interested in bikes, an attacker may send you a link which claims to contain the latest information about bikes in the market or leaks of a superbike or a special discount/sale of a bike. Once you navigate to that link the site may ask you to login using google so that you can unlock that deal. The site looks legit, it uses https and without realizing it your login and the attacker ends up gaining access to your Google credentials (strictly an example). The attacker knowing your interest in bikes has made it simple for him to exploit you.
4) Organizations Lacking Security:Â Now this is not strictly phishing, but this contributes towards successful phishing attacks (kind of facilitates phishing).
How do you think attackers gain access to your mobile number or email id?
Organizations gather all sorts of personal information about their users. They may or may not be completely responsible with the data that they have gathered or the services they have exposed over the internet. When attackers gain access to that data, it becomes very easy for them to impersonate an actual employee of an organization and then make you perform an unintended action.
It’s not just the data, but it can also be the services that these organizations use. There are several examples here:
Businesses usually look at security as some kind of an expense, because the money goes into it and nothing visible comes out of it unless they are hit and the security measures in place protect them. Organizations can do a few things to reduce phishing against their employees. This does not mean giving up flexibility. More often than not, users do not know what they are clicking on, so it’s easier if organizations control that aspect.