Home>
Whaling
01
The term ‘whaling’ originates from world of cybercrime where highly influential people are referred to as ‘big fish.’ Thus, when whaling, hackers target c-level positions (CEO, CFO, and other high-level executives) with broad authority and access to highly confidential information. When hackers pose as c-level executives themselves, this is known as a CEO scam or Business Email Compromise (BEC). According to the FBI, in 2019 BEC caused $1.7 billion in financial damage in the U.S. alone.
Unlike standard phishing targeting a wide audience, and spear phishing employing fake messages and websites tailored to a small group of people, whaling uses more personalized and highly crafted emails and websites.
They often contain the victim’s name and position, as well as other personal details gathered from a variety of sources, in order to appear authentic in both form and content. This makes a whaling attack much harder to identify than a normal phishing attack.
Whaling is the pinnacle of phishing because it requires the most effort and often lengthy preparation, but also holds the highest and most lucrative prospects for success. Successful attackers stand to gain vast sums of money and valuable information (e.g., intellectual property, business processes, financial data, customer information, compromising emails), which they can then either sell or use for blackmail attempts.
04
Technical defense measures
Technical measures are only of limited suitability for warding off social engineering attacks such as whaling. Methods such as SPF, DKIM, and DMARC (Sender Policy Framework, DomainKeys Identified Mail, and Domain-based Message Authentication, Reporting and Conformance), email encryption or the automatic flagging of external emails in the inbox can help to identify forged sender addresses, but scam artists are always able to find a way around technical protection measures.
Awareness training
A lack of awareness is the most frequently exploited factor in social engineering attacks. If you want to effectively protect your company against whaling and other phishing variants, you must ensure that your management and employees receive awareness training. They should develop a healthy level of distrust and carefully check email senders to identify scam emails as such in good time. To raise awareness among top management, the IT department can also conduct simulated whaling attacks.
Multi-factor authentication
Especially for requests regarding confidential data or financial transactions, it is advisable to establish a multi-factor authentication process and codes of conduct. In case of doubt, employees should, for example, check by telephone to have instructions received by email confirmed by the purported sender.
Be careful what you disclose on social media
Both management and employees should be careful about the scope and extent of information they publish on social media channels. This is because content posted there is often used by scam artists as the basis for whaling and phishing attacks.