Phishing

Criminals use fraudulent emails, fake websites and other methods to gain access to confidential company data. By pretending to be a known person (colleague, boss) or organisation (bank, service provider), they exploit the victim’s trust so that they willingly disclose information.

 

Where do I encounter phishing in my everyday work?

The working day begins and you check your emails, then you discover an email from one of your service providers. The text mentions an invoice, the amount of which surprises you. The invoice is attached as a document. You are surprised because you have not commissioned this service provider in recent months. What you do in the next few seconds is crucial:

A) You treat this email with scepticism because you are sure that you were not expecting an invoice from this service provider. You take another close look at the email. Although your service provider is listed as the sender, the email address is suspicious. For example, it reads web@YSJ1QFWP8RU0C0N6.net or bricklayer316@moselland.de. Your suspicion deepens and you delete the email. If you are unsure, give your service provider a quick call. Do not open the attachment in this email under any circumstances until you are absolutely certain that it really comes from your service provider.

B) You open the attachment in the email to find out more. Nothing bad seems to happen, but the invoice is obviously fake. You delete the email. However, a virus has already been activated when you opened the attachment. While you are busy doing other things, it sends emails with fake invoices to all your contacts in your name. If you are unlucky, the virus will then download malicious programs onto your computer, which can lead to system failures or even extortion.

 

What can I do to protect myself from phishing?

Always treat email attachments and links with suspicion. Always check the sender’s email address in emails. Delete obvious fakes. But even if you have the slightest suspicion, ignore the email at first and check it outside your email programme:

  • If you know the alleged sender personally, it is best to give them a quick call. You can also send them an email. However, be sure to use an email address that you know belongs to the intended recipient and DO NOT reply to the suspicious email.
  • If the alleged sender is a company you know (e.g. Amazon or your bank), close the email. Deliberately take the detour via your browser and log in to your customer account with this company. NEVER use a link from an email to do this. Check your customer account to see if you have received a message. This is probably not the case.
  • If you do not recognise the sender, quickly Google ‘email spam’ and keywords from the subject line or a description of the email (e.g. debt collection demand, invoice attachment). In most cases, you will find warnings about fake emails. You may even find an email that is identical to the one you received. Delete all emails where you cannot independently confirm the identity of the sender.

 

Further information can be found in the information section of the Consumer Advice Centre on email spam, phishing and Trojans: www.verbraucherzentrale.de/wissen/digitale-welt/phishingradar