By Jill Romford on Tuesday, 07 November 2023
Category: Blog

How to Recognize and Avoid Phishing Scams

Fraudsters employ emails or text messages to deceive individuals into divulging their personal and financial details, yet there exist multiple methods to safeguard yourself. 

In the age of surveillance capitalism, your email address has a cash value. Service providers track you when you sign up for a service, use an app, or surf the internet. Data brokers use advanced technology to gather all those tiny, wide-ranging traces of your digital activity, even purchasing it from dubious sources. They weave it into a coherent, shockingly encyclopedic profile of individuals. Then, they sell this information to governments and ad tech companies, who resell the data for targeted advertising.

There are over 5,000 data broker companies worldwide, and the global data broker service market is expected to make over $545 billion in 2028.

Even cybercriminals can buy the data

How can an ordinary human beat this gigantic machine to stay ahead of spamming and phishing emails, especially if your address is exposed publicly? 

How exposed are we to threats that arrive via our inboxes, and what steps can we take to stay safer?

What is Phishing?

Phishing is a cybercrime technique that involves the deceptive practice of luring individuals into divulging sensitive and confidential information, such as passwords, credit card numbers, and personal identification details. 

It typically takes the form of fraudulent emails, websites, or messages that impersonate trustworthy entities, like banks, government agencies, or well-known companies. 

The ultimate goal of phishing is to exploit the victim's trust and manipulate them into providing valuable data, which can be subsequently used for malicious purposes.

Phishing attacks often rely on social engineering tactics to manipulate the victim's emotions or sense of urgency. For instance, a common phishing email might claim that the recipient's bank account has been compromised, urging them to click on a link to "verify" their account information. 

When the victim follows the link and enters their data, it is actually sent to the cybercriminals behind the scam. 

These attackers may then gain unauthorized access to the victim's accounts, steal their money, or engage in identity theft.

Phishing can take various forms, including spear phishing, where the attacker targets specific individuals or organizations, and vishing, which involves phone calls instead of digital communication. Smishing, a variant of phishing, uses text messages to deceive victims into clicking on malicious links. It is essential for individuals and organizations to stay vigilant and educate themselves about the telltale signs of phishing attempts, such as typos or suspicious email addresses. 

Employing cybersecurity measures like two-factor authentication and regularly updating passwords can also help protect against falling victim to these fraudulent schemes.

Phishing is a prevalent and highly damaging form of cybercrime that preys on human psychology and trust. 

It remains a constant threat in the digital age, making it imperative for individuals and organizations to be aware of its methods and to take proactive measures to protect their sensitive information from falling into the wrong hands.

Common types of Phishing?

These are some of the common types of phishing attacks that cybercriminals employ to deceive individuals and organizations, highlighting the importance of vigilance and cybersecurity measures to protect against these threats.

What is Spam? 

 Spam encompasses any unsolicited mass communication, primarily transmitted through email, although it can also be disseminated via text messages (SMS), social media, or phone calls. These unsolicited messages can range from innocuous yet irritating promotional emails to potentially fraudulent or malicious schemes.

Defining spam as unsolicited bulk messages, spamming denotes the act of sending such messages, with the person responsible for their transmission referred to as a spammer.

The origin of the term "spam" in the context of invasive mass messaging can be traced back to a Monty Python skit, in which a group of Viking-clad diners loudly and persistently insists that everyone must consume Spam, whether they desire it or not. This mirrors how an email spammer inundates your inbox with unwanted messages.

When written with a capital "S," Spam signifies the canned pork product adored by the aforementioned Vikings. In contrast, with a lowercase "s," spam denotes the unsolicited and disruptive emails and other messages that inundate your inbox and various communication channels.

Spam comes in various forms, and the types of spam can be categorized based on the communication channels through which they are distributed. 

Common types of spam 

Spam encompasses a wide spectrum of nuisances, extending beyond bothersome emails. 

It includes various forms of internet spam, such as social media comments riddled with excessive links or sensationalist headlines that persistently appear on media outlets and websites, making them hard to avoid.

These are some of the many types of spam that individuals and organizations encounter across various communication channels. It's important to be vigilant and employ spam filters and security measures to protect against these unsolicited and potentially harmful messages.

Spamming vs Phishing

The distinction between spamming and phishing hinges on the intentions of the sender, whether they are a spammer or a phisher. Spammers, while undeniably bothersome, typically do not have malicious intentions. They engage in spamming as a means to promote their products or services, although these offerings can sometimes be of low quality or even fraudulent. 

On the other hand, phishing attacks are orchestrated by cybercriminals with the primary objective of gaining access to your personal information or introducing malware to your device.

Spammers operate with something to market, and they have determined that sending out unsolicited messages is an effective way to achieve their goal. 

While some of the products or services they promote may be dubious, their primary motivation is sales. Phishing attacks, which can fall under the broader category of spam, tend to harbor more sinister intentions, encompassing activities like fraud, identity theft, and in some cases, corporate espionage.

The email displayed below serves as an example of the well-known advance-fee "Nigerian prince" phishing scam. Utilizing a web browser equipped with anti-phishing technology, such as Avast Secure Browser, can shield you from falling victim to this type of scam.

How Do Spammers Get Your Email Address? 

Not all spammers are evil. Electronic newsletters and ads are a cheap, effective way for businesses to get their message out there.

But there's the rapidly swelling data brokerage industry. Businesses, even some who say they don't sell your data, routinely sell their customer's details for cash. Or they share the data in return for other services via hazy data-sharing agreements with service providers like Google. Emails from 'good' businesses that arrive in your inbox via this spaghetti-like network are usually benign (but creepy!) and easy to deal with.

However, criminals can buy the same databases legally from data brokers like Experian and use them for nefarious purposes. It can be much harder to remove your details from these spammer databases.

Additionally, cybercriminals can buy data stolen in security breaches from dark web data brokers. Ironically, you may get on a spammer database if you subscribe to the wrong newsletter or respond to a phishing message.

There are several ways in which spammers can obtain your email address. 

Some other common methods include:


Recommend guidelines to safeguard yourself from spammers:

What Can Hackers Do Once They Have Your Email Address? 

Email addresses serve as the foundational point of entry for various online platforms and portals, whether it's for something as routine as ordering groceries via a mobile app or registering on a new website (sometimes even serving as your username). 

Unfortunately, this convenience can also be exploited by hackers and malicious actors who can employ a range of fraudulent tactics with your personal or professional email address. In light of this vulnerability, hackers can carry out the following actions:

How to Start Fighting Back Against Phishing and Spam 

It's easy to advise people not to use their email address so easily. But sometimes they are exposed publicly, so there is not much we can do to hide them from evil eyes. So, it is far better to have a plan or know what to watch out for.

But it gets more serious. The unsubscribe button could be a trick to divert you to a phishing website that will install malware on your device. Secondly, it's a way to confirm that your email address is active. 

A third possibility is that they could request and steal some personal information before they (fail to) unsubscribe you. 

Why am I getting spammed?

Receiving spam messages is a consequence of many companies selling their customers' email addresses and contact information to advertisers and other third parties. Spammers favor sending bulk emails because it's a cost-effective approach. Even if just a small fraction of recipients responds to their spam campaigns, spammers can often achieve a positive return on their investment.

Spammers commonly employ spoofing to hide their true identity from both recipients and internet service providers, making it challenging to hold them accountable. The minimal risks and costs associated with spamming make it an appealing option for less scrupulous advertisers and marketers.

The issue of data being sold to spammers became so pronounced that, in 2018, the European Union introduced the General Data Protection Regulation (GDPR), a set of regulations designed to restrict how companies can utilize their customers' personal data.

By 2023, numerous companies had shifted their approach, choosing to retain customer data in-house rather than relying on third-party data processing. This shift not only reduced the prevalence of spam but also enhanced consumer privacy.

Change a Few Habits to Stem the Flood

There's no easy fix for the deluge of spam and phishing emails. As we've seen, the unsubscribe button only works if the sender is law-abiding and worries about their digital reputation.

Ways To Protect Yourself From Phishing

Leave Comments