ISBA Development Site
This website is for ISBA staff use only. All visitors should return to the main ISBA website.
This website is for ISBA staff use only. All visitors should return to the main ISBA website.
April 2015 • Volume 103 • Number 4 • Page 48
Thank you for viewing this Illinois Bar Journal article. Please join the ISBA to access all of our IBJ articles and archives.
Think you're too smart to take the computer-fraud bait? Don't be so sure.
Well, if the fish isn't on your line
Bait your hook and keep on trying
- The Marvelettes, "Too Many Fish in the Sea"1
It all started with an email from the post office. At least, that's what it looked like. It came from an email address ending with "usps.gov" and it invited the recipient - a California lawyer - to click on an attachment to find instructions for rescheduling a package delivery. "I wanted to see what the package was, so I clicked on [it]."2
Later that day, the lawyer tried to access his firm's bank account. He entered his ID, but then was directed to a page asking for his PIN, rather than the usual password. Then he got a call from a bank employee - at least, that's what the caller said - who noticed that he was having trouble and offered to help. The caller told him to enter his PIN, along with a token number - a code for wire transfers. Then the lawyer found himself at a site saying the page was down for maintenance.
Two days later, the employee called the lawyer and had him enter the information again. After several tries, the employee said it wasn't working, and told him he was locked out of his account for 24 hours.
That, says the lawyer, is "when alarm bells started to go off." Within hours, the lawyer discovered that $289,000 had been transferred from his account to a Chinese bank. "I never thought it would happen to me," he said, claiming that he felt like a "dummy."3
But you don't need to be a dummy for phishers to get your money - and worse. Let's explore the dark world of cyber-crime, and figure out how you can avoid getting hooked.
Phishing in the dark
You and me going fishin' in the dark
- "Fishin' in the Dark"4
The lawyer in the example above fell victim to a "phishing"5 scheme. The term refers to a scheme using "fraudulent emails and copy-cat websites to trick you into revealing valuable personal information" which is then used "to steal your money or your identity or both."6 According to one expert, this particular scheme likely was accomplished by installing a virus to capture the lawyer's keystrokes, and was especially sophisticated because of "the number of steps that had to occur after the victim clicked on the attachment and the timing that had to be so precise."7
Not all phishing schemes are so complex. Many simply involve an email that appears to be from a well-known, trusted company. The cyber-wolves are getting better all the time at dressing up their email in the proverbial sheep's clothing. Their emails have the right "look" - an email could, for example, include Apple's iconic logo, familiar Helvetica Neue typeface, and a spare layout with a gray and white color scheme. It might seem to come from a real company employee - the email address or the body of the text might include the name "Tim Cook" - the real CEO of Apple.
Glinting beneath this bait is the hook - the invitation to click on a link that might trigger the delivery of malware to the recipient's computer, or lead to another legitimate-looking page requesting the desired personal information. Like expert fishermen, phishers are skilled at manipulating their lures to get the target to "bite" by suggesting that failure to respond will have dire consequences. The email might indicate that the account is about to be closed, or that fraudulent activity has been discovered, or that a package will be returned to sender.8
It only takes a moment to jump at the bait - and find your personal information securely snagged on a scammer's phishing line.
Wolves in law firms' clothing
And I'm gonna use every trick in the book.
I'll try my best to get you hooked
- "I'm Gonna Make You Love Me"9
High profile law firms have taken their place beside delivery companies and banks in the phraudster bait box. It's easy to understand why law firms are a powerful lure - it's tough to ignore an email that suggests you have been sued or subpoenaed.
Early this year, a wave of emails purporting to come from major law firms including Sidley Austin and Baker McKenzie hit the Internet. The emails had subject lines like "Your complaint received" or "Notice to appear" - talk about creating a sense of urgency! - and included links that would download keylogging malware if clicked.10
Phishers have baited their hooks with law firms for some time now - in early 2011, an email from a fictitious "Brian Willmer" of "Willmer Hale Law" - spelling really does matter, it turns out - with the subject line "Commercial Litigation Subpoena," urged recipients to click on a link to determine how to respond to a subpoena.11
Don't get hooked
Tips about avoiding phishing scams often seem as though they come directly from Captain Obvious - they are mostly common sense. But it only takes a momentary lapse of reason to get caught, and that lapse is all the more likely when you are multi-tasking and trying desperately to clear all the dung out of your Augean email in-box. Here are a few basics.
Suspect the unexpected. As one expert noted in the wake of the recent law firm phishing scam, "If you haven't spoken to an attorney at Sidley Austin in three years, are you really expecting an email today?"12 An email from an unusual source should be handled with extreme caution.
Verify the source. Pick up the phone and call the sender, using a phone number from your address book or another independent source - not one you find in the email.
Do your own typing. Remember that phishers can disguise the true destination of a link - the URL might look right, but clicking could lead to another site altogether. Don't click on a link provided in an email. Instead, type the URL into the web browser yourself or use a previously-created bookmark.13
Watch for weirdness. Watch for misspellings (remember "Brian Willmer"?), broken English, or, more subtly, a message with tone or vocabulary that seems "off."
Know a lure when you see it. "Phishing scams rely on greed, curiosity, fear, or a sense of urgency to drive potential victims to action," says tech expert Tony Bradley.14 An email that threatens immediate negative action unless you act right away can be a near-irresistible lure. The promise of a "hilarious photo of you!" can tempt you (or scare you, depending on what you think you might have been caught doing) to click and see. Don't take the bait.
Above all, avoid the hook. "Don't open unknown file attachments or click on links in suspicious emails, and don't enter your credentials on login pages linked from email messages," advises Bradley.15
Slow down, be alert to signals of an email scam, and don't let fear or curiosity tempt you into a click you'll regret.
Karen Erger is vice president and director of practice risk management at Lockton Companies.