Lancaster University has had the personal data of students and applicants stolen in a ‘sophisticated and malicious’ phishing attack.
Hackers managed to access the names, addresses, phone numbers and emails of students who had applied to join the university in 2019 and 2020.
Phishing emails are designed to look like legitimate emails persuading you to carry out some function to give the attacked access to either data or funds. In this case the data was used to send fraudulent invoices to some undergraduate applicants.
Businesses are very susceptible to phishing attacks as they very closely emulate the type of language that the actual sender would use and also use the same graphics and fonts which can make phishing emails very difficult to detect.
How does a phishing email work?
This attack mechanism is becoming very common – we have worked with clients that have received phishing emails; asking for the recipient to click on a link to verify or update their login details. The attacker then gains access to their emails, internal systems or they could infect the network with malware.
An employee of one of our clients fell for a phishing email where they updated their email login details; from that the attacker was able to access their account and see the contact information of their clients and the invoices that had been sent to them.
The attacker went on to harvest the contact details, modify an existing invoice, so they could use the official letter head design, and email the list of clients with new payment instructions. The company went on to lose £45k the following month.
This simple yet very effective attack vector has certain characteristics which can indicate that the email is coming from a malicious source, training can help employees identify these traits, however they are becoming more difficult to spot. Technology can help to bridge that gap, by notifying you if any of the characteristics are found within an email.
RiskView can ensure that phishing emails are found and even traced if they are forwarded around the organisation. Find out how RiskView can protect your business from information risk.View More Articles
- 22nd November 2019Why Aren’t HR Managers Prioritising Employee Data Security?
- 14th November 2019Thousands Of Drivers’ Social Security Numbers Exposed In Data Breach
- 11th November 2019Multinational Cyber Security And Defence Company Suffers Insider Data Breach
- 14th October 2019Data: Defining or Divisive
- 12th September 20192019 on track to be the “worst year on record” for data breach activity
- 10th September 2019Leaving the EU: Brexit and GDPR
- 9th September 2019Data Breaches: Did you know?
- 5th September 2019What should you do if your data has been breached?
- 3rd September 2019GDPR was just the beginning
- 14th August 2019The dangers of Subject Access Requests