{"id":6032,"date":"2023-04-18T14:20:32","date_gmt":"2023-04-18T12:20:32","guid":{"rendered":"https:\/\/lukasbarda.cz\/?p=6032"},"modified":"2023-04-18T14:23:51","modified_gmt":"2023-04-18T12:23:51","slug":"jak-rozpoznat-phishing-a-na-koho-se-obratit","status":"publish","type":"post","link":"https:\/\/lukasbarda.cz\/english\/jak-rozpoznat-phishing-a-na-koho-se-obratit\/","title":{"rendered":"How to recognize &quot;phishing&quot; and who to contact"},"content":{"rendered":"<p>First, we should define what phishing actually is. This is a type of phishing attack on the Internet in which attackers attempt to obtain sensitive information from the user, such as passwords, credit cards, and banking information.<\/p>\n\n\n\n<p>The attack usually starts with a fraudulent email that looks like an official communication from a trusted source (bank, online store or other company). This e-mail may contain links to fake websites that look like the operator&#039;s original site to get users to enter their credentials or other sensitive information.<\/p>\n\n\n\n<p>If a user provides their sensitive information on a fake website, attackers can use it to steal money, commit fraud or other identity crimes.<\/p>\n\n\n\n<p>A phishing attack doesn&#039;t just have to come via email. There are more types of phishing. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Vishing: Unsolicited calls (Sample <strong><a href=\"https:\/\/www.seznamzpravy.cz\/clanek\/autenticka-nahravka-zlodeje-takhle-vas-okrade-o-citlive-udaje-a-penize-156431\" target=\"_blank\" rel=\"noopener\" title=\"\">here<\/a><\/strong>)<\/li><li>Smishing: Unsolicited text messages<\/li><li>Spam on social networks<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Smishing.jpg\" alt=\"\" class=\"wp-image-6202\" width=\"375\" height=\"301\" srcset=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Smishing.jpg 750w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Smishing-600x482.jpg 600w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Smishing-300x241.jpg 300w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Smishing-15x12.jpg 15w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><figcaption>demo of Smishing<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">How to recognize an attack<\/h3>\n\n\n\n<p>There are several ways to recognize a phishing attack:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Check the sender&#039;s address: Check that the email is really from the company or person it says it is. Fraudulent emails may have strikingly similar sender addresses, but have errors in them that could indicate they are fraudulent.<\/li><li>Check the links: If you find links in the email, check them carefully to make sure they lead to real websites. Try hovering over the link without clicking it to see where the link takes you.<\/li><li>Be wary of urgent requests: Phishing emails often contain urgent requests, such as changing a password or verifying an account, to get users to quickly provide their sensitive information. This is one of the most common options.<\/li><li>Check grammar and spelling: Fraudulent emails often contain errors in grammar and spelling, so it&#039;s a good idea to note any imperfections.<\/li><li>Be cautious if the email is not about you: If you receive an email that at first glance has nothing to do with you, it may be suspicious. Be careful as this could be a phishing email trying to get your sensitive information just by replying.<\/li><li>Use antivirus software: Use antivirus software and a firewall to help protect your computer from hacking and other similar threats.<\/li><\/ol>\n\n\n\n<p>Instructions on how to prevent phishing and cyberattacks in general were prepared for you by Luk\u00e1\u0161 in the previous article <a href=\"https:\/\/lukasbarda.cz\/english\/desatero-kyberneticke-bezpecnosti-uzivatele\/\">The user&#039;s cyber security ten<\/a>.<\/p>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2.jpg\" alt=\"\" class=\"wp-image-6034\" width=\"734\" height=\"587\" srcset=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2.jpg 1000w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2-600x480.jpg 600w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2-300x240.jpg 300w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2-768x614.jpg 768w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/02\/Phishing-2-15x12.jpg 15w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Example of a phishing email<\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"754\" height=\"760\" src=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek.png\" alt=\"\" class=\"wp-image-6201\" srcset=\"https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek.png 754w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek-100x100.png 100w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek-600x605.png 600w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek-298x300.png 298w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek-150x150.png 150w, https:\/\/lukasbarda.cz\/wp-content\/uploads\/2023\/04\/Wedos-phishing-ramecek-12x12.png 12w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><\/figure>\n\n\n\n<p>After receiving a similar email, I stop, think and follow the steps in the previous paragraph.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Wedos probably won&#039;t communicate with me from the address <a href=\"mailto:support@t-online.com\">support@t-online.com<\/a>. (#1 in the picture)<\/li><li>Link <strong>Domain renewal<\/strong> leads to a strange address - I can find it by hovering the mouse without clicking. Again, there is nothing similar in the address wedos.cz (#3 in the picture)<\/li><li>The email contains pressure: Something will stop working for me if I don&#039;t react quickly. (#2 in the picture)<\/li><li>To avoid a sercis cut? That they don&#039;t know Czech in Wedos? Probably hard. (#2 in the picture)<\/li><li>This email is about me, but that doesn&#039;t mean it&#039;s not a scam.<\/li><li>My antivirus program filters out a lot of other messages that don&#039;t even get to me and I don&#039;t need to pay attention to them. And thanks for that.<\/li><\/ul>\n\n\n\n<p>Remember that most attacks are automated and untargeted. Emails are sent out by the thousands by an automatic machine. It&#039;s not about you specifically, and people reassure themselves that they&#039;re not interesting and that it can&#039;t happen to them. But every device and every person is important and interesting for an attack. Phishing is like fishing. You cast and wait to see who catches. And the fisherman also doesn&#039;t care if he catches Pepa or Tom\u00e1\u0161. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to proceed when reporting<\/h3>\n\n\n\n<p>If you believe you have been a victim, you should report it as soon as possible. You can most often contact:<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\"><li><span style=\"text-decoration: underline;\">Banks<\/span>: If this is a hack targeting your bank details, you should contact your bank immediately and inform them.<\/li><li><span style=\"text-decoration: underline;\">Companies<\/span>: If the attack targets a specific company, you should contact that company and inform them of the situation.<\/li><li><span style=\"text-decoration: underline;\">Organs<\/span>: Contact the police or another organization that deals with cybercrime. You can fill out the association form here <a href=\"https:\/\/www.stoponline.cz\/cs\/\" title=\"\">CZ.NIC<\/a>, which cooperates with the police of the Czech Republic.<\/li><li><span style=\"text-decoration: underline;\">Email service providers<\/span>: If you have received a suspicious email, you can report it to your email provider. Most providers have mechanisms for reporting spam and similar suspicious messages.<\/li><li><span style=\"text-decoration: underline;\">Reporting to databases<\/span>: There are also various databases that collect attack information and warn users. You can try to report the attack to these databases such as <a href=\"https:\/\/apwg.eu\/\" title=\"\">Anti-Phishing Working Group<\/a>.<\/li><\/ul>\n\n\n\n<p>If you decide to report a phishing attack, you should try to provide as much information as possible about the attack, such as the sender&#039;s email addresses, the URLs that redirected you, and how you were harmed. This information can help in the investigation of the attack and can also help other users to identify similar attacks in the future.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/lukasbarda.cz\/english\/it-gramotnost\/\">Is the article useful for you? Let us know or come to the course<\/a><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing is a fraudulent attack on the Internet in which attackers attempt to obtain sensitive information from a user, such as passwords, credit cards, and bank details.<\/p>","protected":false},"author":5,"featured_media":6033,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[44],"class_list":["post-6032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-navody","tag-bezpecnost"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/posts\/6032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/comments?post=6032"}],"version-history":[{"count":0,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/posts\/6032\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/media\/6033"}],"wp:attachment":[{"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/media?parent=6032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/categories?post=6032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lukasbarda.cz\/english\/wp-json\/wp\/v2\/tags?post=6032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}