%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 13 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250702112041+00'00') /ModDate (D:20250702112041+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 6848 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 72.695 521.469 674.039 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 72.695 l 565.984 72.695 l 565.984 745.984 l f 45.266 746.734 m 45.266 72.695 l 46.016 72.695 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(PROTECTING YOURSELF FROM SPEARPHISHING ATTACKS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(December 03,2019)] TJ ET BT 182.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 197.096 664.909 Td /F3 9.0 Tf [(David Wiles)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td 4.305 Tw /F4 9.0 Tf [(For a large enterprise like Stellenbosch University phishing )] TJ ET BT 61.016 626.431 Td 0.000 Tw /F4 9.0 Tf [(attacks are the most common cybercrime.)] TJ ET BT 61.016 606.442 Td 1.872 Tw /F4 9.0 Tf [(In the late 1990s and early 2000s, we were all inundated with )] TJ ET BT 61.016 595.453 Td 3.020 Tw /F4 9.0 Tf [(spam emails, selling everything from fake pharmaceuticals to )] TJ ET BT 61.016 584.464 Td 4.806 Tw /F4 9.0 Tf [(cheap perfumes. With spam, cybercriminals use a blanket )] TJ ET BT 61.016 573.475 Td 0.955 Tw /F4 9.0 Tf [(approach sending emails to as many people as possible, hoping )] TJ ET BT 61.016 562.486 Td 0.000 Tw /F4 9.0 Tf [(a few gullible customers will be funding further spam emails.)] TJ ET BT 61.016 542.497 Td 1.171 Tw /F4 9.0 Tf [(General "shotgun" phishing is still a problem today, but the past )] TJ ET BT 61.016 531.508 Td 4.739 Tw /F4 9.0 Tf [(18 months have seen a rise in a more sinister form of )] TJ ET BT 61.016 520.519 Td 1.514 Tw /F4 9.0 Tf [(cyberattack, spearphishing, which is much more targeted to an )] TJ ET BT 61.016 509.530 Td 0.000 Tw /F4 9.0 Tf [(individual or an enterprise's email system.)] TJ ET BT 61.016 489.541 Td 0.991 Tw /F4 9.0 Tf [(Spearphishing is similar to phishing, it's also a vector for identity )] TJ ET BT 61.016 478.552 Td 0.811 Tw /F4 9.0 Tf [(theft where cybercriminals try to get users to hand over personal )] TJ ET BT 61.016 467.563 Td 0.000 Tw /F4 9.0 Tf [(and sensitive information without their knowledge.)] TJ ET BT 61.016 447.574 Td 1.040 Tw /F4 9.0 Tf [(Cybercriminals view phishing attacks as a profitable and an easy way to gain access to an enterprise enabling them to )] TJ ET BT 61.016 436.585 Td 0.829 Tw /F4 9.0 Tf [(launch more sophisticated attacks, for example, spearphishing attacks. Humans are, after all, the weakest link and thus )] TJ ET BT 61.016 425.596 Td 0.000 Tw /F4 9.0 Tf [(the most effective target for criminals looking to infiltrate a network like the university.)] TJ ET BT 61.016 405.607 Td 0.416 Tw /F4 9.0 Tf [(Even though spearphishing is more focused than its less-sophisticated relative phishing, everyone can apply the following )] TJ ET BT 61.016 394.618 Td 0.000 Tw /F4 9.0 Tf [(principlesto protect yourself and the university against cybercriminal activity:)] TJ ET BT 61.016 374.629 Td /F1 9.0 Tf [(Use common sense when it comes to phishing attacks)] TJ ET BT 61.016 363.640 Td 1.766 Tw /F4 9.0 Tf [(Be sensible and smart while browsing online and checking your emails. Never click on links, download files or open )] TJ ET BT 61.016 352.651 Td 1.060 Tw /F4 9.0 Tf [(attachments in email or social media, even if it appears to be from a known, trusted source. You should never click on )] TJ ET BT 61.016 341.662 Td 1.001 Tw /F4 9.0 Tf [(links in an email to a website unless you are absolutely sure it's authentic. If you have any doubt, open a new browser )] TJ ET BT 61.016 330.673 Td 2.293 Tw /F4 9.0 Tf [(window and type the address into the address bar. Always be wary of emails asking for confidential information )] TJ ET BT 61.016 319.684 Td 0.821 Tw /F4 9.0 Tf [(especially if it asks for personal details or banking information. The university and your bank will never request sensitive )] TJ ET BT 61.016 308.695 Td 0.000 Tw /F4 9.0 Tf [(information via email. They do not need it. They have it all already.)] TJ ET BT 61.016 288.706 Td /F1 9.0 Tf [(Watch out for shortened links)] TJ ET BT 61.016 277.717 Td 0.353 Tw /F4 9.0 Tf [(Pay particularly close attention to shortened links, especially on social media. Cybercriminals often use Bit.ly, Tinyurl.com, )] TJ ET BT 61.016 266.728 Td 0.299 Tw /F4 9.0 Tf [(Goo.gl or Tr.im to trick you into thinking you are clicking a legitimate link when in fact, you are being inadvertently directed )] TJ ET BT 61.016 255.739 Td 0.135 Tw /F4 9.0 Tf [(to a fake site. Always place your mouse over a web link in an email )] TJ ET BT 332.144 255.739 Td 0.135 Tw /F2 9.0 Tf [(\(known as "hovering"\))] TJ ET BT 419.830 255.739 Td 0.135 Tw /F4 9.0 Tf [( to see if youre being sent to the )] TJ ET BT 61.016 244.750 Td 0.000 Tw /F4 9.0 Tf [(right website.)] TJ ET BT 61.016 224.761 Td /F1 9.0 Tf [(Does the email look suspicious? Read it again)] TJ ET BT 61.016 213.772 Td 0.519 Tw /F4 9.0 Tf [(Many phishing emails are obvious. They will be filled with plenty of spelling mistakes, CAPITALISATION and exclamation )] TJ ET BT 61.016 202.783 Td 0.959 Tw /F4 9.0 Tf [(marks. They will also have impersonal salutations e.g. Dear Valued Customer or Dear Sir/Madam salutations and )] TJ ET BT 61.016 191.794 Td 2.202 Tw /F4 9.0 Tf [(will have implausible and generally suspicious content. Cybercriminals will often intentionally make mistakes in their )] TJ ET BT 61.016 180.805 Td 0.000 Tw /F4 9.0 Tf [(emails bypass spam filters and improve responses.)] TJ ET BT 61.016 160.816 Td /F1 9.0 Tf [(Be wary of threats and urgent deadlines)] TJ ET BT 61.016 149.827 Td 1.625 Tw /F4 9.0 Tf [(Sometimes the university does need you to do something urgently, however, this is an exception rather the rule. For )] TJ ET BT 61.016 138.838 Td 1.875 Tw /F4 9.0 Tf [(example, you all have been getting reminders to reactivate your network account by the end of March. Threats and )] TJ ET BT 61.016 127.849 Td 0.435 Tw /F4 9.0 Tf [(urgency, especially coming from what claims to be a legitimate company, are a giveaway sign of phishing. Some of these )] TJ ET BT 61.016 116.860 Td 1.178 Tw /F4 9.0 Tf [(threats may include notices of a fine or advising you to take action to stop your account from being closed. Ignore the )] TJ ET BT 61.016 105.871 Td 0.000 Tw /F4 9.0 Tf [(scare tactics and rather contact the company via phone.)] TJ ET BT 61.016 85.882 Td /F1 9.0 Tf [(Browse securely with HTTPS)] TJ ET q 225.750 0 0 159.000 325.234 487.211 cm /I1 Do Q 0.500 0.500 0.500 rg BT 325.234 638.811 Td /F1 8.0 Tf [(Image not found)] TJ ET BT 325.234 628.811 Td /F1 8.0 Tf [(http://blogs.sun.ac.za/gergablog/files/2019/03/SpearPhishing.jpg)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 64 /Height 64 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 64 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 929>> stream h՚n@TR#."Z!P\!W[M.],*@ș36nOM]#|֯/D4ILJpEQ$UUM\UUel6O~C8|DD>cD>5k~gߴZ bQŤ4QYg$"*bXZડ,#'INO bnD?Q睑Qj+z6Xfp{3w@#k!<<TU~r Ry{`/1˲p9k8~slpW?4ǽ3VI܂LY ӮY "|@p>9=,k[ ; u]ߝslM%pfE^`\%=["e^b-|CHcS[뺶,õOnKTv󒾝}a5/N Mx7 "y\ L(Dt:,wQ$TC(cs 39vƒR}6XLRt:%Ib!v2M@峷1HV_(CNS\sVՀSai~i`bc0DN8Ik}Ӷ}YŴug|_}>MLb9/zkϾͼ-ci;B{#֌O`*BvΑk}%9kǪyi>iNz faO`ݎg/ endstream endobj 13 0 obj << /Type /Page /Parent 3 0 R /Contents 14 0 R >> endobj 14 0 obj << /Length 1698 >> stream 0.500 0.500 0.500 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 627.811 521.469 130.173 re f 0.773 0.773 0.773 rg 45.266 627.811 m 566.734 627.811 l 565.984 628.561 l 46.016 628.561 l f 566.734 757.984 m 566.734 627.811 l 565.984 628.561 l 565.984 757.984 l f 45.266 757.984 m 45.266 627.811 l 46.016 628.561 l 46.016 757.984 l f 61.016 643.561 m 550.984 643.561 l 550.984 644.311 l 61.016 644.311 l f 0.153 0.153 0.153 rg BT 61.016 749.193 Td 0.570 Tw /F4 9.0 Tf [(You should always, where possible, use a secure website,indicated by https:// and a security lock icon in the browsers )] TJ ET BT 61.016 738.204 Td 1.312 Tw /F4 9.0 Tf [(address bar)] TJ ET BT 109.848 738.204 Td 1.312 Tw /F2 9.0 Tf [(,)] TJ ET BT 112.350 738.204 Td 1.312 Tw /F4 9.0 Tf [( to browse. This is particularly important when submitting sensitive information online, such as credit card )] TJ ET BT 61.016 727.215 Td 0.000 Tw /F4 9.0 Tf [(details.)] TJ ET BT 61.016 707.226 Td 1.274 Tw /F4 9.0 Tf [(Never use public, unsecured Wi-Fi,including MatiesWiFi,for banking, shopping or entering personal information online. )] TJ ET BT 61.016 696.237 Td 0.000 Tw /F4 9.0 Tf [(Convenience should never be more important than safety)] TJ ET BT 289.625 696.237 Td /F2 9.0 Tf [(.)] TJ ET BT 292.127 696.237 Td /F4 9.0 Tf [(When in doubt, use your mobiles 3/4G or LTE connection.)] TJ ET BT 445.963 676.248 Td /F2 9.0 Tf [([ARTICLE by)] TJ ET BT 500.980 676.248 Td /F2 9.0 Tf [(David Wiles])] TJ ET 0.400 0.400 0.400 rg BT 61.016 657.759 Td /F2 9.0 Tf [(Posted in:Phishing,Security,Tips | Tagged:Phishing,Spear Phishing | With 0 comments)] TJ ET endstream endobj xref 0 15 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000514 00000 n 0000000577 00000 n 0000007477 00000 n 0000007589 00000 n 0000007704 00000 n 0000007824 00000 n 0000007932 00000 n 0000009102 00000 n 0000009167 00000 n trailer << /Size 15 /Root 1 0 R /Info 5 0 R >> startxref 10918 %%EOF Protecting yourself from spearphishing attacks « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Protecting yourself from spearphishing attacks

For a large enterprise like Stellenbosch University phishing attacks are the most common cybercrime.

In the late 1990s and early 2000s, we were all inundated with spam emails, selling everything from fake pharmaceuticals to cheap perfumes. With spam, cybercriminals use a blanket approach sending emails to as many people as possible, hoping a few gullible customers will be funding further spam emails.

General “shotgun” phishing is still a problem today, but the past 18 months have seen a rise in a more sinister form of cyberattack,  spearphishing, which is much more targeted to an individual or an enterprise’s email system.

Spearphishing is similar to phishing, it’s also a vector for identity theft where cybercriminals try to get users to hand over personal and sensitive information without their knowledge.

Cybercriminals view phishing attacks as a profitable and an easy way to gain access to an enterprise enabling them to launch more sophisticated attacks, for example, spearphishing attacks. Humans are, after all,  the weakest link and thus the most effective target for criminals looking to infiltrate a network like the university.

Even though spearphishing is more focused than its less-sophisticated relative phishing, everyone can apply the following principles to protect yourself and the university against cybercriminal activity:

Use common sense when it comes to phishing attacks
Be sensible and smart while browsing online and checking your emails. Never click on links, download files or open attachments in email or social media, even if it appears to be from a known, trusted source. You should never click on links in an email to a website unless you are absolutely sure it’s authentic. If you have any doubt, open a new browser window and type the address into the address bar. Always be wary of emails asking for confidential information – especially if it asks for personal details or banking information. The university and your bank will never request sensitive information via email. They do not need it. They have it all already.

Watch out for shortened links
Pay particularly close attention to shortened links, especially on social media. Cybercriminals often use Bit.ly, Tinyurl.com, Goo.gl or Tr.im to trick you into thinking you are clicking a legitimate link when in fact, you are being inadvertently directed to a fake site. Always place your mouse over a web link in an email (known as “hovering”) to see if you’re being sent to the right website.

Does the email look suspicious? Read it again
Many phishing emails are obvious. They will be filled with plenty of spelling mistakes, CAPITALISATION and exclamation marks. They will also have impersonal salutations – e.g. ‘Dear Valued Customer’ or ‘Dear Sir/Madam’ salutations – and will have implausible and generally suspicious content. Cybercriminals will often intentionally make mistakes in their emails bypass spam filters and improve responses. 

Be wary of threats and urgent deadlines
Sometimes the university does need you to do something urgently, however, this is an exception rather the rule. For example, you all have been getting reminders to reactivate your network account by the end of March. Threats and urgency, especially coming from what claims to be a legitimate company, are a giveaway sign of phishing. Some of these threats may include notices of a fine or advising you to take action to stop your account from being closed. Ignore the scare tactics and rather contact the company via phone.

Browse securely with HTTPS
You should always, where possible, use a secure website, indicated by https:// and a security “lock” icon in the browser’s address bar, to browse. This is particularly important when submitting sensitive information online, such as credit card details.

Never use public, unsecured Wi-Fi, including MatiesWiFi, for banking, shopping or entering personal information online. Convenience should never be more important than safety. When in doubt, use your mobile’s 3/4G or LTE connection.

[ARTICLE by David Wiles]

Tags: ,

Comments are closed.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.