• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware • Security  /  How cyber criminals attract users by launching interesting phishing email subject lines?
Phishing emails
24 August 2017

How cyber criminals attract users by launching interesting phishing email subject lines?

Written by Seqrite
Seqrite
Ransomware, Security
Estimated reading time: 3 minutes

Email is one of the favorite mediums of attack for cyber criminals. They launch spyware, ransomware, viruses and other kinds of malware and phishing attacks using emails. The user only needs to click the link in the email or open the attachment, and a malware gets downloaded on the user’s machine. However, the only thing that hackers aren’t too successful in is luring the target audience to open their emails or click on those malicious links. With modern email users getting smarter by the day, this task is getting tougher for the hackers. This is where the attackers get crafty and devise interesting, attention grabbing subject lines for emails which make them look genuine and demand urgent attention of the reader.

Here are some examples of the subject line that cyber criminals use to get the attention of their target.

Remember me? It’s Alex from Riverdale high:- Hackers use social media to know the victim. They uncover victim’s contacts from Facebook, LinkedIn etc. and look for other people with similar background. It could be a place where the victim lived or studied or a friend’s friend who is not on their contact list. They sometime, even use contact data from an already hacked account, impersonate the hacked account holder to grab victim’s attention. Checking the sender’s email address and not opening irrelevant attachments or links is the best way to avoid an attack.

Online banking alert. Your account will be deactivated in next 2 days:- Usually, such emails have links that open web pages similar to your bank’s site. It asks for account number, old password, and other authentication details. This is where the unsuspecting victims hand over their login credentials to the cyber criminals. Always verify the URL of the website; it should have an ‘https’. It is best to type the URL rather than click links in mails. Check the sender’s email address, if it is not from your bank domain, never open that email.

Failed packaged delivery:- Such emails look like they are from a courier company informing you of a failed delivery. It will have an attachment which will be mentioned in the email as an airway bill or notification. Once the victim opens the attachment, a macro in the word document runs automatically to download malware (perhaps a ransomware) on the computer. The image files are popular means of transferring viruses and worms. Never open an attachment unless you are sure of the identity of the sender and also have cross verified the domain name of the sender’s email id.  Well, the best way is to stay alert: Were you expecting any delivery? Can there be any real reason that the delivery person missed you? If not, ignore the email. The real delivery service will always call you instead of sending you just an email.

Limited period offer: iPhone 7 at $1:- These emails begin with: All you need to do is share your credit card details and the phone will be shipped to you. If it’s not the iPhone, it will some other expensive merchandise being offered at a ridiculously low price. The moment credit card details are shared on such sites, scammers operating the website use them to make large purchases and the victim is left to foot the bill. The best defense here is not falling for such offers. Think rationally. Why would someone offer to sell something that is worth hundreds of dollars at such a steep discount? Make your inquiries before sharing your details. It is okay to miss a great offer if it means that you save yourself from a much larger scam.

These are only a sample of subject lines used by scammers to lure the gullible into sharing their personal details. As the consumers get smarter, the criminals identify more ways to craft their phishing attack. There are plenty of security features offered by Seqrite Endpoint Security which can scan the attachments and the links in the mail to identify a phishing attack and warn the user. The organizations must implement these security systems. They must implement robust security policies that the employees must follow when working on emails. However, following basic security checks (such as the email id, the domain name, the security level) and common sense will always remain the best defense against Phishing.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostSetting up a business? Secure it with Seqrite EPS
Next Post  5 steps for a successful incident response plan
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • BEC and Ransomware attacks unsettle businesses globally.

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Thanos Ransomware adopts hyper-weaponized RIPlace tactics — collects huge pay-offs.

    Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

    November 18, 2020
  • Hackers ransack businesses by riding on the modern-day Trojan Horse.

    PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

    August 26, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.