Continue on TOI App

Explained: What is whale phishing scam and tips to stay safe

Whale phishing involves targeting wealthy or influential individu... Read More
Whale phishing is a type of social engineering attack that specifically targets high-profile individuals or organisations with significant wealth or influence. These individuals, often referred to as "whales," are seen as lucrative targets due to the potential for substantial financial gains.

How does whale phishing work?
  1. Research and Targeting: Attackers meticulously research their target, gathering information about their personal and professional lives. This includes identifying their social media accounts, professional affiliations, and any publicly available information.
  2. Social Engineering: Once the target is identified, attackers craft personalised phishing emails or messages that appear to be from a trusted source. These messages may contain urgent requests for financial assistance, information sharing, or other actions that seem legitimate.
  3. Trust and Manipulation: Attackers employ social engineering techniques to manipulate their targets into believing the authenticity of the message. They may leverage emotional appeals, create a sense of urgency, or exploit personal information to build trust.
  4. Data Extraction: Once the target falls victim, attackers may attempt to extract sensitive information, such as login credentials, financial details, or proprietary data. This information can be used for financial gain, identity theft, or other malicious purposes.
Tips to stay protected:
  1. Always be cautious of unsolicited emails, especially those requesting urgent action or containing unusual attachments.
  2. Before responding to any suspicious message, verify the sender's identity using known contact information.
  3. Never click on links or download attachments from unknown or suspicious sources.
  4. Employ strong, unique passwords for all online accounts and enable two-factor authentication whenever possible.
  5. Ensure that your operating system and software applications are up-to-date with the latest security patches.
  6. Limit the amount of personal information you share online, especially on social media platforms.
  7. Stay informed about the latest phishing scams and techniques to recognise and avoid them.
About the Author

Follow Us On Social Media
end of article
More Trending Stories
UP NEXT
Do Not Sell Or Share My Personal Information