{"id":1148,"date":"2022-12-06T00:00:00","date_gmt":"2022-12-05T22:00:00","guid":{"rendered":""},"modified":"2025-08-27T09:06:41","modified_gmt":"2025-08-27T07:06:41","slug":"identity-theft-via-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.domains.co.za\/blog\/identity-theft-via-phishing-attacks\/","title":{"rendered":"Identity Theft Via Phishing Attacks"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<p>As business slows down, fewer staff members are tracking and monitoring ransomware attacks too. Cybercriminals anticipate this lull in vigilance and <a alt=\"Link to Domains.co.za - Organization Validated SSL Certificates\" title=\"Domains.co.za - Organization Validated SSL Certificates\" href=\"https:\/\/www.domains.co.za\/ssl\/organization-validated-ssl-certificates\" target=\"_blank\" rel=\"noopener\">Website Security<\/a> and make the most of it, in this case, phishing attacks.<\/p>\n\n\n\n<p>It\u2019s the \u2018silly\u2019 season, and if you thought cybercriminals would be taking the holiday off \u2013 think again. Sadly, this time of the year, criminals of all kinds are upping their activities and tactics to exploit their victims at a time when many are just looking to unwind and relax.<\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h2>TABLE OF CONTENTS<\/h2><nav><ul><li><a href=\"#phishing-attacks\">Phishing Attacks on The Rise<\/a><ul><li><a href=\"#example-phishing-attack-fake-tender-proposal\">Example Phishing Attack<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"phishing-attacks\">Phishing Attacks on The Rise<\/h3>\n\n\n\n<p>Cybercrime tactics are no longer just the obvious mass &#8220;spam&#8221; approach. According to a <a href=\"https:\/\/businesstech.co.za\/news\/banking\/646251\/discovery-warns-of-these-banking-scams\/\" target=\"_blank\" rel=\"noopener\">report<\/a> from the South African Risk Information Centre (SABRIC), cybercriminals are making use of highly tailored and sophisticated social engineering tactics to successfully trick unsuspecting victims into disclosing sensitive information.<\/p>\n\n\n\n<p>Phishing attacks\u2014and variants thereof like vishing (voice phishing) and smishing (SMS phishing)\u2014are on the rise, causing considerable threats to businesses and individuals throughout the year. However, during December and January, the threat is in overdrive.<\/p>\n\n\n\n<p>In the latest State of Email Security report of March this year, Mimecast uncovered that <a href=\"https:\/\/htxt.co.za\/2022\/03\/94-of-sa-companies-targeted-in-phishing-attacks-over-the-last-year\/\" target=\"_blank\" rel=\"noopener\">94% of companies<\/a> have been targets of phishing attacks during 2021. Phishing is a type of cyber-attack that uses email to trick victims into clicking on links with the aim to deploy malware or viruses onto their devices, direct them to bad websites, or deceive recipients into sharing personal or business information.<\/p>\n\n\n\n<p>The business or personal information obtained can then later be used in more elaborate criminal schemes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"364\" src=\"https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/phishing-attacks-1-1.png\" alt=\"Strip Banner Text \u2013 Phishing Attacks On The Rise\" class=\"wp-image-2505\" title=\"Phishing Attacks On The Rise\" srcset=\"https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/phishing-attacks-1-1.png 535w, https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/phishing-attacks-1-1-300x204.png 300w, https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/phishing-attacks-1-1-345x235.png 345w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"example-phishing-attack-fake-tender-proposal\">Example Phishing Attack<\/h4>\n\n\n\n<p><em>An example of a dangerous phishing attack that took place:<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"547\" height=\"732\" src=\"https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/Phishing-Example-2.png\" alt=\"An example of a dangerous phishing attack that took place\" class=\"wp-image-2510\" title=\"alt=\" srcset=\"https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/Phishing-Example-2.png 547w, https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/Phishing-Example-2-224x300.png 224w, https:\/\/www.domains.co.za\/blog\/wp-content\/uploads\/2022\/12\/Phishing-Example-2-176x235.png 176w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/figure>\n<\/div>\n\n\n<p>Cybercriminals use clever social engineering to contact companies and offer them the opportunity to apply for tenders. Businesses apply for these seemingly legitimate tenders, submitting the personal business information requested. Companies may even be contacted for additional information after being notified that they have successfully made the shortlist.<\/p>\n\n\n\n<p>Unknowingly, businesses are sharing sensitive information with cybercriminals who can now use the information collected to clone the business\u2019 identity and successfully launch more fraudulent activities.<\/p>\n\n\n\n<p>In this example, cybercriminals are phishing for company documents to gain access to sensitive details that they can use to impersonate the company. These documents can then be used to open fake credit accounts with suppliers. With a successfully created supplier account, cybercriminals can very easily order goods to the maximum credit available.<\/p>\n\n\n\n<p>Businesses that fall victim to these types of phishing attacks might only be aware fraud has taken place once the supplier follows up with them directly to settle outstanding credit after 30, 60, or even 90 days.<\/p>\n\n\n\n<p>Be careful!<\/p>\n\n\n\n<p>This festive season, be on high alert. Cybercriminals don\u2019t take breaks! Ensure cyber security is a priority for your business even while business is winding down for the holidays.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As business slows down, fewer staff members are tracking and monitoring ransomware attacks too. Cybercriminals anticipate this lull in vigilance and Website Security and make the most of it, in this case, phishing attacks. It\u2019s the \u2018silly\u2019 season, and if you thought cybercriminals would be taking the holiday off \u2013 think again. Sadly, this time of the year, criminals of all kinds are upping their activities and tactics to exploit their victims at a time when many are just looking to unwind and relax. Phishing Attacks on The RiseExample Phishing Attack Phishing Attacks on The Rise Cybercrime tactics are no longer just the obvious mass &#8220;spam&#8221; approach. According to a report from the South African Risk Information Centre <a alt='Identity Theft Via Phishing Attacks' title='Identity Theft Via Phishing Attacks' href='https:\/\/www.domains.co.za\/blog\/identity-theft-via-phishing-attacks\/' class='moreElipsis'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":1303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1009],"tags":[1651,1654,1650,1653,1652],"class_list":["post-1148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-tips","tag-businesses-on-the-alert-for-online-scams","tag-dont-click-on-links-you-dont-know-","tag-identity-theft-via-phishing","tag-phishing-attacks-mimecast-report-2022","tag-south-african-risk-information-centre-2022-report"],"_links":{"self":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1148"}],"version-history":[{"count":8,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1148\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1148\/revisions\/3715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/media\/1303"}],"wp:attachment":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}