{"id":15058,"date":"2015-04-06T20:11:50","date_gmt":"2015-04-06T20:11:50","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3793"},"modified":"2020-02-26T11:01:07","modified_gmt":"2020-02-26T16:01:07","slug":"how-phishing-affects-businesses","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-phishing-affects-businesses\/15058\/","title":{"rendered":"How phishing affects businesses"},"content":{"rendered":"<p>Phishing used to be an exotic threat, but that was years ago when\u00a0malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard \u2013 especially businesses. How does it affect them?<\/p>\n<p><strong>What do they want?<\/strong><\/p>\n<p>Well, there are many ways, but there\u2019s a single purpose: to steal something. Usually it\u2019s data \u2013 preferably\u00a0financial data and credentials. Phishing is the ultimate kind of social engineering attack. Most of the original attacks leveraging \u201cweaknesses in human interfaces\u201d were one-on-one attacks \u2013 effective, but not scalable. Phishing gives the criminals scale and the ability to go after hundreds or thousands of users \u2013 all at once.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How #phishing affects businesses<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTYs1&amp;text=How+%23phishing+affects+businesses\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Cybercriminals create fake emails and websites\u2014meant to look like a popular online resource (a social network, online banking services, or online games <a href=\"https:\/\/business.kaspersky.com\/security-of-online-gaming-business-reasons-to-care\/2912\" target=\"_blank\" rel=\"noopener nofollow\">\u2013 the latter are drawing more and more interest from criminals<\/a>) and use various social engineering methods \u2013 i.e. <a href=\"https:\/\/business.kaspersky.com\/can-we-beat-social-engineering\/2363\" target=\"_blank\" rel=\"noopener nofollow\">all kinds of possible trickery<\/a> \u2013 to lure users to the website and make them fill out forms with their personal data. And if users do it, they\u2019ve got them.<\/p>\n<p>For <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/59411\/financial-cyber-threats-in-2013-part-1-phishing\/#44\" target=\"_blank\" rel=\"noopener\">years<\/a>,\u00a0phishers increasingly attacked financial services, reaching for the other people\u2019s and businesses\u2019 money, and as we reported last year, phishing in general is undergoing a sort of \u201ccommercialization\u201d: tools to commit crime are bought and sold actively, while, as our <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_KSN_report_The_Evolution_of_Phishing_Attacks_2011-2013.pdf\" target=\"_blank\" rel=\"noopener nofollow\">survey found<\/a>, \u201cthe effectiveness of phishing, combined with its profitability for criminals and the simplicity of the process, has led to a steadily rising number of these types of incidents.\u201d<\/p>\n<p style=\"text-align: center;\"><em>Trends continued in 2014. Take a look at our <a href=\"https:\/\/kas.pr\/XJu9\" target=\"_blank\" rel=\"noopener\">new study<\/a> and updated numbers on the evolution of phishing, and financial damage it inflicts.<\/em><\/p>\n<p><strong>Business-gotcha<\/strong><\/p>\n<p>Of course, commercial companies are more interesting targets, but to reach the corporate funds criminals have to phish-up certain employees, preferably high-level ones. Ideally, attackers would take on accounting\/financial officers \u2013 i.e. go the shortest route. But it\u2019s not always possible, so they just throw the net waiting hoping that someone gets caught.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>To reach the corporate funds criminals have to #phish-up employees first.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTYs1&amp;text=To+reach+the+corporate+funds+criminals+have+to+%23phish-up+employees+first.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>According to <a href=\"https:\/\/kas.pr\/XJu9\" target=\"_blank\" rel=\"noopener\">Global IT Security Risks Survey of 2014<\/a>, the typical damage of a breach (including the costs of hiring professional services, increased downtime, and lost business opportunities) was $35,000 for small-to-mid-sized business and $690,000 for enterprises.<\/p>\n<p>These figures\u00a0are quite formidable, and the risks for smaller companies are larger, since their financial stability can be undermined by <a href=\"https:\/\/business.kaspersky.com\/how-a-single-cybersecurity-incident-can-kill-your-business\/3540\" target=\"_blank\" rel=\"noopener nofollow\">just one incident<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing used to be an exotic threat, but that was years ago when\u00a0malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard \u2013 especially<\/p>\n","protected":false},"author":209,"featured_media":15715,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2297,76,422],"class_list":{"0":"post-15058","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-figures","10":"tag-phishing","11":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-phishing-affects-businesses\/15058\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-phishing-affects-businesses\/8041\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-phishing-affects-businesses\/15058\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-phishing-affects-businesses\/15058\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/figures\/","name":"figures"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15058"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15058\/revisions"}],"predecessor-version":[{"id":33497,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15058\/revisions\/33497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15715"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}