{"id":140509,"date":"2019-01-22T12:42:05","date_gmt":"2019-01-22T17:42:05","guid":{"rendered":"https:\/\/www.countingpips.com\/?p=140509"},"modified":"2019-01-23T13:35:16","modified_gmt":"2019-01-23T18:35:16","slug":"what-to-do-when-phished","status":"publish","type":"post","link":"https:\/\/www.investmacro.com\/forex\/2019\/01\/what-to-do-when-phished\/","title":{"rendered":"What to do When Phished"},"content":{"rendered":"<div id=\"inves-1753651803\" class=\"inves-below-title-posts inves-entity-placement\"><div id =\"posts_date_custom\"><div align=\"left\">January 22, 2019<\/div><hr style=\"border: none; border-bottom: 3px solid black;\">\r\n<\/div><\/div><div class=\"program-details wysiwyg\">\n<p>I just wanted to follow up my presentation on \u201cThe Anatomy of a Phish\u201d at last week\u2019s Data Connector event in Dallas with this blog. If you were there, thanks for the lively participation.<\/p>\n<p>Now, we often hear: \u201cDON\u2019T CLICK THE LINK!!\u201d in all caps and several exclamation points. But, come on. We are only human. Everyone makes a mistake and can fall for a phish, smish, or vish. So, what do we do when we\u2019ve clicked the link? Close out everything and shut down, or not shut down? Unplug the computer, or just pretend it didn\u2019t happen? Here are some tips to rely on when you fall for the bait.<\/p>\n<h3><strong>Isolate yourself<\/strong><\/h3>\n<p>Disconnect the Internet cable and turn off wi-fi. How? Simply reach for the ethernet cable that links you to your modem or router and unplug it. It usually has a clear plastic squarish casing with a little clip. Turn off your Wi-Fi by clicking on the Wi-Fi icon in your desk tray. Or open your Wi-Fi settings by typing it in your desktop search bar. If you are on a mobile device, go to your Wi-Fi settings or Wi-Fi shortcut and turn it off.<\/p>\n<p>By isolating yourself, you prevent whatever payload\u2014the malicious code\u2014sitting inside the link from spreading to others in the network. It\u2019s like opening Pandora\u2019s box, but shutting all windows and doors so that whatever was unleashed remains in that room.<\/p>\n<h3><strong>Do NOT shut down your computer or device <\/strong><\/h3>\n<p>Foremost, follow your organization\u2019s protocol. If one is not in place, my advice is do NOT shut down your computer or device. I\u2019ll let you in on a little secret\u2026Skilled \u201chackers\u201d can access your computer even when it\u2019s powered down. Most devices and computers these days, just go into sleep mode and never fully shut down. Unless you unplug it and\/or take out the battery, it doesn\u2019t stop someone from accessing your computer or device. Computer Forensics people often preach: \u201cDon\u2019t shut down your computer,\u201d because it will erase the temporal memory (cache). This cache usually holds the date and time stamps and other useful information that at least gives clues on where to start looking.<\/p>\n<p>One of the cyber security professionals in attendance did point out that if the baited link you clicked unleashes a series of irritating popups ran by java scripts, then your only option is to fully shut down and reboot. There is no other way to disable those annoying popups. I\u2019ve seen especially prevalent ones claim that they are antivirus scanners or PC cleaners with promises to boost your operating or processor speed. Don\u2019t fall for it.<\/p><div id=\"inves-514894865\" class=\"inves-in-content inves-entity-placement\"><hr style=\"border: 1px solid #ddd;\">\r\n<div id=\"inpost_ads_header\">\r\n<p style=\"font-size:10px; float:left; color:#666;\">Free Reports:<\/p><\/div>\r\n<div id=\"inpost_ads\"> \r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/1ApBOV\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2018\/06\/graph_techs_PD.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t     <a href=\"https:\/\/goo.gl\/1ApBOV\"><b><u>Get Our Free Metatrader 4 Indicators<\/u><\/b><\/a> - Put Our Free MetaTrader 4 Custom Indicators on your charts when you join our Weekly Newsletter<\/p><br><br>\r\n<br>\r\n<br>\r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/f3RrHX\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2019\/01\/cot_pie_80.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t    <a href=\"https:\/\/goo.gl\/f3RrHX\"><b><u>Get our Weekly Commitment of Traders Reports<\/u><\/b><\/a> - See where the biggest traders (Hedge Funds and Commercial Hedgers) are positioned in the futures markets on a weekly basis.<\/p><br><br>\r\n<\/div>\r\n<hr style=\"border: 1px solid #ddd;\">\r\n<br><\/div>\n<h3><strong>Notify your Information Security Officer (ISO)<\/strong><\/h3>\n<p>Using your landline or a neighbor\u2019s computer if you are in the office, notify your ISO or IT person who <a href=\"https:\/\/inspiredelearning.com\/security-awareness\/phishproof\/\" target=\"_blank\" rel=\"noopener\">handles potential phishing emails<\/a>. Be honest and forthright. I clicked a link that may have been a bad move. They will instruct you on the next steps.<\/p>\n<p>Do NOT forward the email, sms text or voice message. And, as another professional pointed out during the presentation, screenshots of the phish are quite useless as well since they do not contain necessary forensic data for your IT professionals to identify the true nature of the phishing lure.<\/p>\n<p>If your organization utilizes an Anti-Phishing Simulation tool, such as PhishProof, then you may have a \u201cphishing reporting\u201d button on your email client which automatically captures the header information and the body of the message and sends it to your ISO. For example, <em>PhishHook<\/em> is a button that conveniently sits on MsOutlook\u2019s Home ribbon so end users can report phishing attempts in real time.<\/p>\n<h3><strong>Run a full system scan using your anti-malware\/anti-virus software<\/strong><\/h3>\n<p>If you do not have an ISO, or if this is your personal device, then definitely run a full anti-malware\/anti-virus scan. Windows Defender is already built in if you are using Windows 10. Some free and available options are Avast and Malwarebytes. They also offer mobile versions for your devices through the Play Store or App store.<\/p>\n<p>At the end of the presentation, we all agreed that while following your organization\u2019s policy on phishing emails in important, we must keep in mind to first and foremost ISOLATE ourselves, then immediately REPORT it to our IT departments. To take it a step further, we can even notify the<\/p>\n<p><a href=\"https:\/\/consumercomplaints.fcc.gov\/hc\/en-us\/signin?return_to=https%3A%2F%2Fconsumercomplaints.fcc.gov%2Fhc%2Fen-us%2Farticles%2F204930920-Spam-Unwanted-Text-Messages-and-Email\">FCC\u2019s Consumer Complaint Center<\/a> to help make others aware of these particular phishing lures.<\/p>\n<p>So, let me close with this shameless plug: Begin your anti-phishing campaign today! Reach out to one of our representatives to test drive our simulation tool\u2014first in its market to offer Phishing, SMiShing, Vishing, and USB baiting campaigns that will lower your end user click rates.<\/p>\n<p class=\"description\"><strong>Article by: <\/strong>Mison Riggins &#8211; Cybersecurity Expert, Tech writer by day, slayer of cyber security ignorance by night.<\/p>\n<div class=\"col-xs-8 col-sm-10\">\n<p><strong><em>Original Article Source: <\/em><\/strong><a href=\"https:\/\/inspiredelearning.com\/blog\/what-to-do-when-phished\/\" target=\"_blank\" rel=\"noopener\"><strong><em>What to do when Phished<\/em><\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I just wanted to follow up my presentation on \u201cThe Anatomy of a Phish\u201d at last week\u2019s Data Connector event in Dallas with this blog. If you were there, thanks for the lively participation. Now, we often hear: \u201cDON\u2019T CLICK THE LINK!!\u201d in all caps and several exclamation points. But, come on. We are only [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-140509","post","type-post","status-publish","format-standard","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/140509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/comments?post=140509"}],"version-history":[{"count":3,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/140509\/revisions"}],"predecessor-version":[{"id":140558,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/140509\/revisions\/140558"}],"wp:attachment":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/media?parent=140509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/categories?post=140509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/tags?post=140509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}