What is Whaling?

Also known as a whaling phishing attack, whaling is a type of phishing cyber crime attack that targets high-level employees in order to steal sensitive information from a company. A whaling attacker sends a legitimate-appearing email posing as a senior executive such as a CEO or CFO with the aim to manipulate the victim into either authorizing a large amount of funds to be wire transferred or clicking on an attachment or link that installs malware. The goal of whaling is to receive money and/or sensitive company information that gives the attacker access to the company’s intellectual property, data, or other information that could be sold.

Anatomy of a whaling attack

Whaling emails are typically more sophisticated than generic phishing emails because they:

  • Contain personalized information about the targeted organization or individual
  • Convey a sense of urgency
  • Are created with a general understanding of the business’s business language, tone, and purpose

Many times, indicators of a whaling email include:

  • The display or domain name differs from the trusted address
  • The email requests money in a very short and urgent amount of time
  • The domain age (how long the domain has existed since its creation) doesn’t match the domain name of the trusted company

An real-life example of a whaling attack that a number of executives across multiple industries fell victim to was an email that went out appearing to be from a United States District Court. This email had accurate details about the executives and company they worked for. The email encompassed a fake subpoena to appear before a grand jury in a civil case. It included a link to the purported subpoena, which was really malware.

How to prevent whaling attacks

Due to whaling being highly-targeted in nature, the attacks are often more difficult to detect and prevent than standard phishing attacks. However, the general advice given to prevent phishing also applies to whaling: Avoid clicking links or attachments in emails that require you to take action quickly to be successful in the supposed task. In general, don’t click on an attachment in an email unless you’re sure of both the sender and the document, verifying first if necessary, and mouseover links to make sure the text isn’t masking a malicious link, where the domain name is different from what you’d expect. Other, more specific, steps to prevent whaling include:

  • Employee awareness: Not only high-level executives  but all employees should be trained on how to identify whaling attacks. They should know what social engineering (the myriad of methods used to steal personal information) tactics to look for and be cautious about requests for funds through email.
  • Multi-Factor authentication: All funds requested through email should pass through several rounds of verification before being permitted.
  • Data protection policies: Introducing data security policies will help ensure that emails and files are monitored for suspicious activity.
  • Anti-phishing tools: Anti-phishing software will help prevent whaling and other phishing attacks by running unnoticed in the background.

 

Related Links

Abby Dykes
Abby Dykes
Abby Dykes is a newly-graduated writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Top Articles

The Complete List of Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top...

How to Create a Website Shortcut on Your Desktop

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Creating a desktop...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

Hotmail [Outlook] Email Accounts

By Vangie Beal Hotmail was one of the first public webmail services that could be accessed from any web browser. Since 2011, Hotmail, in terms...

IT Observability Definition &...

IT observability is the theory that a system's internal state should be understood...

Data Corruption Definition &...

Data corruption is the process of data becoming unreadable or invalid. It typically...

Subschema Definition & Meaning

A subschema is a database view that filters or organizes all data to...