WaTech's state Office of Cybersecurity will regularly post screenshots of phishing emails (see below) our Security Operations Center is seeing to help computer users identify, and delete, suspicious emails before they can cause damage.
The most common way computer systems become infected with malware is through phishing emails.
It only takes one person to open an infected attachment, click on a link that goes to a malicious website, or be tricked into providing their account credentials.
Phishing emails are increasingly sophisticated and hard to detect. They may appear to be from people or organizations you know and trust. They may even contain information from previous emails threads so that it appears to be part of a continuing conversation.
General tips to avoid becoming a victim:
- Be suspicious of any emails that urge you to take action and try to create a sense of urgency.
- Never click on links or open attachments without first making sure the request is authentic.
- Call the sender by looking up their phone number independently.
- Never call a phone number included in a suspicious email, or reply to the sender.
Common types of attachments seen in phishing campaigns:
- Malicious files with innocent names, such as “invoice.”
- Compressed or .zip/.rar files that can fool your anti-virus if it cannot inspect the files.
- Office products such as Excel and Word can have malicious macros (programs that run inside of programs).
- PDF files may have a malicious link or a macro embedded.
- Files that emulate a DVD drive or a USB drive (extension .iso, .ism) can be used to automatically run a script once opened.
Common ways bad actors try to trick you:
- New cat video. Can you believe this?
- Your organization just received an award, or you were recognized in a staff meeting.
- A popular band is coming to town, are you going?
- You have an imminent deadline for sexual harassment training.
- Sense of Urgency: Your password is about to expire, a deadline is approaching for mandatory training, overdue bill, we have not received your payment, a delivery attempt was made, your mail is on hold, your account credentials have been compromised, there is a warrant out for your arrest.
If you are a state employee and receive a suspicious email at work, please contact your information technology (IT) security staff immediately.