Whaling

7th January 2020 | Cybrary Whaling


Whaling refers to malicious hacking that targets high-ranking executives. Similar to phishing, whaling is where the hacker hunts for data that they can use, but they focus on high-ranking bankers, executives, or others in prominent or powerful positions in an organization. Hackers will search for public information on the target to convince the victim that they are legitimate. Whalers also attack their ‘Whale’ targets by hacking into the company networks where these high-ranking executives work and then target those executive’s computers with malware such as keyloggers or remote access trojans (RAT).

A real-world example of Whaling happened in an undisclosed business where a number of executives fell for an attack laced with accurate details about them and their businesses. The attacker pretended to be from a United States District Court with a subpoena to appear before a grand jury in a civil case. The email included a link to the subpoena, and when recipients clicked the link to view it they were infected with malware instead.

What should SMB’s do about Whaling?

Protect and educate your C-Suite on the dangers of posting too much information on social media that is open to the public. The more information a hacker can research on a CEO or CFO, the easier it is to attack them with a Whaling email attack. This advice also helps prevent hackers from targeting other employees at your company with bogus emails purportedly from the C-Suite executive with novel and convince phishing schemes based upon the hacker’s research. 

SMB PROTECTIONS BEYOND PATCH MANAGEMENT

In addition to adopting a patch management system, CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Watch this short video to learn more about this topic:

Sources: Rapid7

Related Terms: Keylogger, Malware, Phishing, Remote Access Trojan (RAT), Smishing

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

Cybercriminals always follow Internet eyeballs. Not literally, but figuratively. And today's eyeballs are...

Read more
CISA Details an Emerging Mobile Spyware Alert

CISA Details an Emerging Mobile Spyware Alert

Active Attacks on Messaging Apps The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...

Read more
Zero Trust RPAM: The Future of Secure Remote Access

Zero Trust RPAM: The Future of Secure Remote Access

The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...

Read more