Learn about the impacts of a successful phishing attack.
- [Instructor] The cost of a successful phishing attack…can be significant, as we'll be seeing…in the following examples.…In 2011, the American company, EMC,…was a target of a spear phishing attack,…which was successful.…The attack targeted a small group of employees…with a malicious Excel file.…The file leveraged a zero-day attack…that allowed attackers to access corporate systems.…A zero-day attack is an attack…the world has not seen before.…The attackers installed a remote access toolkit,…which allowed them to steal source code…supporting their security tokens.…
EMC spent $66,000,000 in response to this attack.…In 2015, Anthem Healthcare lost 80,000,000 patient records…after suffering a spear phishing attack.…The phishing emails were sent to a handful of its employees.…The successful attack impacted customers…who made credit or debit card payments…for healthcare services.…Companies typically offer credit monitoring services…for those affected by this type of data loss.…In 2016, Leoni.com, one of Europe's biggest companies,…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures