You have a message 📧

Mehmet Zeki Ă–zkaplan
5 min readSep 28, 2023

--

You received a stranger message and don’t know what to do? Don’t take the bait !!

Phishing attacks are a common cyber threat where cybercriminals try to access personal and financial information using fake emails or websites. When you experience this type of attack, it is vital that you know what to do. In this blog post, I will detail the steps you should take if you are attacked by a phishing attack.

Let’s get some information about this attack. What is a Phishing Attack ?
The word phishing is a homophone of the word fishing and describes a fraudulent attempt to obtain sensitive information such as credit card information, usernames, and passwords. Around 90% of cyber attacks are carried out through phishing emails, which often contain malicious attachments or links to fake websites or other text messages that trick the recipient into giving up sensitive information. Sometimes these websites are specifically designed to resemble a real site that they can know and trust. The only apparent difference may be a slight typo in the web page URL.
The phishing technique has been used almost since the birth of the internet. Scammers often initiate contact with potential victims by posing as a trusted entity, such as a bank, internet service provider, online stores, IT administrators, and everything in between.

These email messages can range from the proverbial carrot to the proverbial stick; it either promises wealth or threatens loss. They often imply a sense of urgency and inform the recipient that he must act quickly if he wants to collect his reward or avoid damage.

You Have Been Under Phishing Attack: Action Plan

Step 1: Review Email and Message

Many phishing emails contain false or misleading information. Review the email carefully and check the following elements:

Sender Address: Be careful if the sender’s email address looks strange or fake.
Subject and Content: If the subject and content of the e-mail contains content that worries or panics you, be cautious.
Links and Attachments: Carefully review links or attachments in email before clicking.

Step 2: Flag Suspicious Email

If an email looks suspicious, flag it and report it to your email provider. This helps you protect other users as well.

Step 3: Don’t Open the Email and Don’t Click on Links

If you think an email is suspicious, do not open it or click on any links or attachments in it. This helps prevent malware or data leakage.

Step 4: Report to Authorities

When you receive a suspicious email, notify your IT or cybersecurity team immediately. Also report the attack to your email provider.

Step 5: Check Your Computer and Devices

If you think you clicked a link or opened an attachment, scan your computer with an up-to-date antivirus program. Also check your other devices (smartphones, tablets).

Step 6: Change Passwords

If you have disclosed your passwords via a suspicious e-mail, change the passwords of your relevant accounts immediately. Be careful to use strong and unique passwords.

Step 7: Monitor Your Credit Card and Bank Accounts

If your financial information is at risk, monitor your credit card transactions and bank accounts closely. Report any suspicious activity to authorities immediately.

What Should You Do After a Phishing Attack?

1. Stay Calm:
The first step is always to stay calm. Panicking can make it harder for you to respond quickly and effectively. Pull yourself together and follow the steps to fix the problem.First, remember that racing pulse and slight despair you felt when you forgot your password. Many people have experienced this and you can immediately move on to the solution without getting bored.

2. Blocking Suspicious Access:
If attackers gained access to your account or stole your credentials, you should block this access immediately. Close or temporarily freeze the relevant accounts.

3. Cut Access:
If you have been hacked via a suspicious email or message and your account information has been stolen, immediately close or temporarily freeze the affected accounts. This helps prevent attackers from causing further damage.

Password Recovery Process
Step 1: Password reset option.

Depending on the service or platform you use, there will usually be a “Forgot My Password” or similar option. Click this option and follow the instructions.
Step 2: Security questions or verification codes.

Some platforms may require additional security steps to verify the identity of the account holder. Follow these steps carefully.
Step 3: Create a new password.

After resetting your password, remember to create a complex and strong password.

4. Enable Two-Factor Authentication (2FA):
To make your accounts more secure, enable two-factor authentication (2FA) on every account if possible. This is an additional layer of security that requires access to your account not only with a password, but also with another verification method.Use Password Managers: Use a password manager that stores your passwords securely.

5. Computer and Device Controls:
Detect and remove malware by scanning your computers and other devices with an up-to-date antivirus program. Update your security software and apply all security updates.

6. Review and Save Suspicious Email:
Review and retain any suspicious emails or messages related to a phishing attack. These messages may be important evidence for future investigation.

7. Report to Authorities:
Report the attack to the appropriate authorities. If your financial information has been affected, notify your bank or credit card company immediately. You can also help initiate an investigation by reporting the attack to the cybercrime unit or police.

8. Monitor Your Credit Card and Bank Accounts:
Check your bank and credit card transactions regularly. Report any suspicious or unauthorized activity immediately. This helps you minimize financial loss.

9. Recovering Accounts:
If you lost your accounts or had to close them temporarily, try to recover your accounts by contacting the relevant service providers. You can speed up this process with identity verification and necessary documents.

10. Security Improvements:
To increase cybersecurity, create strong passwords for all your accounts, change passwords regularly, keep your security software up to date, and monitor your account activities regularly.

Conclusion:
Anyone can face the risk of forgetting their password or being hacked. However, it is important to be aware and take the right steps to deal with such incidents and stay safe. Remember, cybersecurity is everyone’s responsibility, and acting consciously will help you stay safe.

Now you know exactly what to do when faced with a Phishing Attack !

--

--

Mehmet Zeki Ă–zkaplan

Harran University-Computer Engineering Student [ CYBER SECURÄ°TY ]