Handling an incident in a phishing scenario
Phishing is one of the most prevalent types of cyber threats. While this attack method has been used for a long time, the techniques that attackers employ have been significantly improved to increase their success rates. The core strategy of the attack remains the same; an attacker, using emails, text messages, and phone calls, impersonates a legitimate individual or institution and coaxes unsuspecting people to provide sensitive information, such as passwords and money. In most cases, hackers will proceed to use the sensitive information to access multiple accounts, steal data, make malicious changes to systems, steal money, and use the identity of the victim to commit other crimes.
In recent reports, many security companies have highlighted that the Business Email Compromise (BEC) type of phishing has been on the rise with increasingly devastating results. Such an attack involves phishers spoofing the emails of executives in companies...