{"id":9555,"date":"2016-02-05T10:00:06","date_gmt":"2016-02-05T08:00:06","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9555"},"modified":"2016-02-05T10:44:03","modified_gmt":"2016-02-05T08:44:03","slug":"spear-phishing","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/02\/spear-phishing\/","title":{"rendered":"[:en]Phishing and whaling[:af]Phishing en whaling[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Recently we gave you some pointers on identifying <a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2016\/01\/13\/phishing-e-mails\/\" target=\"_blank\">phishing<\/a>\u00a0e-mails. So now that you know all the signs and how to outwit the criminals,\u00a0there&#8217;s another variant &#8211; spear phishing. But don&#8217;t panic, it&#8217;s almost the same, with a bit of a twist.<\/p>\n<p><b>Spear phishing<\/b> is an e-mail that seems to be sent from an individual or business you know. Of course it&#8217;s really from hackers attempting to obtain you credit card, bank account numbers, passwords and financial information.<\/p>\n<p>These types of attacks focus on a single user or department within an organisation and use another staff member from the organisation&#8217;s name to gain the victim&#8217;s trust. (Also see our recent article on the incident at <a href=\"http:\/\/blogs.sun.ac.za\/it\/2016\/01\/new-cyber-crime-e-mail-targets-specific-individuals\/\" target=\"_blank\">Finance<\/a>.)<\/p>\n<p>They often appear to be from your company&#8217;s human resources or IT department, requesting\u00a0staff to update information, for example passwords or account details. Alternatively the e-mail might contain a link, which will execute spyware when clicked on.<\/p>\n<\/p>\n<p>But wait, there are even more fishing comparisons.<\/p>\n<div id=\"nmtbi9cntw\" class=\"nmcw nmbl nmca\">\n<div id=\"nmtbi9cnt\">\n<div class=\"_oDd\" style=\"text-align: right\">\n<p style=\"text-align: left\">When a phishing attack is directed specifically at senior executives, other high profile staff or seemingly wealthy people, it&#8217;s called <em>whaling<\/em>. By whaling cyber criminals are trying to catch the &#8220;big phish&#8221;, or whale.<\/p>\n<p style=\"text-align: left\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/01\/phishing.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-9564\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/01\/phishing.gif\" alt=\"phishing\" width=\"600\" height=\"211\" \/><\/a><\/p>\n<p>[SOURCE: http:\/\/www.webopedia.com]<\/p>\n<\/div>\n<\/div>\n<div id=\"nmtbi9cntw\" class=\"nmcw nmbl nmca\">\n<div id=\"nmtbi9cnt\">\n<div class=\"mod\">\u00a0<\/div>\n<div class=\"_oDd\" style=\"text-align: right\">\u00a0<\/div>\n<div class=\"_oDd\" style=\"text-align: right\">\u00a0<\/div>\n<div class=\"_oDd\" style=\"text-align: right\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[:af]<\/p>\n<p>Ons het onlangs vir jou `n paar wenke gegee hoe om `n <a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2016\/01\/13\/phishing-e-mails\/\" target=\"_blank\"><em>phishing<\/em><\/a>\u00a0e-pos uit te ken. So noudat jy gereed is om enige krimineel uit te oorl\u00ea, het ons vir jou nog `n weergawe van <em>phishing<\/em> &#8211; <em>spear phishing<\/em>. Maar moenie paniekbevange raak nie. Dis amper dieselfde, net \u0149\u00a0bietjie anders.\u00a0<\/p>\n<p><strong><em>Spear phishing<\/em><\/strong> is wanneer \u0149\u00a0e-pos lyk of dit gestuur is vanaf \u0149\u00a0individu of besigheid wat jy ken. Inderwaarheid kom dit van kuberkrakers wat probeer om jou kredietkaart, bankrekening, wagwoord en finansi\u00eble inligting te aas.<\/p>\n<p>Hierdie tipe aanvalle fokus op \u0149\u00a0enkele gebruiker of departement binne `n organisasie. Deur die e-pos te stuur vanaf iemand binne die organisasie se e-pos, word jou vertroue gewen en gee hy makliker die inligting. (Sien ook ons berig oor die onlangse insident by \u00a0<a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2016\/01\/new-cyber-crime-e-mail-targets-specific-individuals\/\" target=\"_blank\">Finansies<\/a>)<\/p>\n<p>Die e-posse lyk dikwels asof dit gestuur word deur jou\u00a0menslike hulpbronne of IT-afdeling en versoek gewoonlik dat personeel hulle inligting (byvoorbeeld wagwoorde of rekeninginligting ) opdateer of heraktiveer. Alternatiewelik bevat die e-pos \u0149\u00a0skakel wat <em>spyware\u00a0<\/em>aktiveer indien daarop gekliek word.\u00a0<\/p>\n<p>&nbsp;<\/p>\n<\/p>\n<p>Maar dis nie al nie &#8211; daar is selfs nog meer visvang-analogie\u00eb.<\/p>\n<p>Wanneer `n <em>phishing<\/em>-aanval direk geloods word op senior uitvoerende hoofde, ho\u00eb-profiel personeel of skynbaar finansie\u00ebl welaf persone, word dit <em>whaling<\/em> genoem. Deur <em>whaling<\/em> probeer kuberkrakers een\u00a0&#8220;big phish&#8221;, of te wel die walvis, vang.<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/01\/phishing.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-9564\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/01\/phishing.gif\" alt=\"phishing\" width=\"600\" height=\"211\" \/><\/a><\/p>\n<div id=\"nmtbi9cntw\" class=\"nmcw nmbl nmca\">\n<div id=\"nmtbi9cnt\">\n<div class=\"mod\">\u00a0<\/div>\n<div class=\"_oDd\" style=\"text-align: right\">[BRON:\u00a0http:\/\/www.webopedia.com]<\/div>\n<\/div>\n<\/div>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Recently we gave you some pointers on identifying phishing\u00a0e-mails. So now that you know all the signs and how to outwit the criminals,\u00a0there&#8217;s another variant &#8211; spear phishing. But don&#8217;t panic, it&#8217;s almost the same, with a bit of a twist. Spear phishing is an e-mail that seems to be sent from an individual [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,49,29187],"tags":[20381,48692,48693],"class_list":["post-9555","post","type-post","status-publish","format-standard","hentry","category-email","category-general","category-security-2","tag-phishing","tag-spear-phishing","tag-whaling"],"publishpress_future_action":{"enabled":false,"date":"2026-05-22 04:59:19","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9555"}],"version-history":[{"count":37,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9555\/revisions"}],"predecessor-version":[{"id":9801,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9555\/revisions\/9801"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}