{"id":5009,"date":"2016-01-06T19:36:40","date_gmt":"2016-01-06T19:36:40","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5009"},"modified":"2019-11-15T22:55:26","modified_gmt":"2019-11-15T11:55:26","slug":"whaling","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/whaling\/5009\/","title":{"rendered":"What is &#8220;whaling&#8221;, and what&#8217;s the difference from phishing"},"content":{"rendered":"<p>Late in December, the term \u201cwhaling\u201d mildly spiked in cybersecurity-related media outlets. The term isn\u2019t exactly new, but it isn\u2019t encountered as often as \u201cphishing\u201d. In fact, as many of you may have\u00a0guessed already, \u201cwhaling\u201d is a specific kind of phishing. Just how specific?<\/p>\n<p>The reason for the aforementioned \u201cspike\u201d is simple: Security experts from Mimecast firm have\u00a0<a href=\"http:\/\/www.csoonline.com\/article\/3018377\/security\/work-in-finance-or-accounting-watch-out-for-whaling-attacks.html\" target=\"_blank\" rel=\"noopener nofollow\">surveyed<\/a> several hundreds of IT professionals in December and discovered that a distinct wave of \u201cwhaling\u201d hit businesses \u2013 a kind of phishing attack specifically targeting C to top level executives. \u201cBig phish\u201d, as it is.<\/p>\n<p>Yes, cetaceans are by no means \u201cfish\u201d, but it doesn\u2019t matter much here: the difference between phishing and cyberwhaling is almost the same as with real-world fishing and whaling: one big target instead of a potentially large number of smaller ones, a \u201charpoon\u201d instead of a fishnet, etc.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>What is #whaling, and what\u2019s the difference from #phishing? #protecmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F723C&amp;text=What+is+%23whaling%2C+and+what%26%238217%3Bs+the+difference+from+%23phishing%3F+%23protecmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Big Phish<\/strong><\/p>\n<p>Targets of \u201ccyberwhaling\u201d are mostly executives, preferably top-level, such as CEOs, CFOs, and other high-level decision makers, people responsible for handling corporate data and finances.<\/p>\n<p>Chances that they would fall for a common \u201cspam-borne\u201d phishing letter aren\u2019t big, and in most cases they are hit with \u201csomething special\u201d.<\/p>\n<p><strong>Harpooning<\/strong><\/p>\n<p>Usually phishing letters are <a href=\"https:\/\/business.kaspersky.com\/spam-and-phishing-in-q3-dirty-summer-tricks\/4805\/\" target=\"_blank\" rel=\"noopener nofollow\">spammed out<\/a> \u2013 urbi et orbi \u2013 in the hopes that at least a few potential victims become actual ones. In a case of cyberwhaling, it is a narrowly-targeted, cleverly crafted spear-phishing letter made to\u00a0look believable and trustworthy to the target.<\/p>\n<p>Conjuring such a letter takes effort, of course. The possibility of doubts and reservations at the victim\u2019s side should be brought to an absolute minimum. So both the sender\u2019s and receiver\u2019s regalia \u2013 title, position, etc. \u2013 as well as other, probably personal, details must be properly specified in the \u201cwhaling\u201d e-mail.<\/p>\n<p>These details are mined from wherever possible, most likely from open and semi-open sources such as social network accounts \u2013 Facebook, LinkedIn, Twitter, etc.<\/p>\n<p>In most cases, whaling involves more social engineering than tech tricks. If there is some company-wide (non-personal) concern involved \u2013 supboenas, letters from tax authorities, etc. \u2013 it is very likely that the decision maker would fall into the trap.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Whaling: more social engineering and intelligence than tech trickery #whaling<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F723C&amp;text=Whaling%3A+more+social+engineering+and+intelligence+than+tech+trickery+%23whaling\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In their letter, attackers may request downloading some additional software in order to open the full text of the \u201csubpoena\u201d. In reality, that would be some keylogging malware, not some arcane plugin to Adobe Acrobat. And though it is very unlikely that the official documents are sent out in some exotic formats, people occasionally fall to the trick.<\/p>\n<p>There was a largely publicized phishing \u2013 or rather whaling \u2013 campaign in 2008, when literally thousands of high-ranking executives across the U.S. received official subpoenas ostensibly from the United States District Court in San Diego. Each message included the executive\u2019s name, company and phone number, and commanded the recipient to appear before a grand jury in a civil case; instead of a\u00a0copy of subpoena, however, victims <a href=\"http:\/\/www.nytimes.com\/2008\/04\/16\/technology\/16whale.html?_r=0\" target=\"_blank\" rel=\"noopener nofollow\">were served with keyloggers<\/a>.<\/p>\n<p><strong>Big phish, little difference<\/strong><\/p>\n<p>All in all, whaling is still a subset of phishing, and even though it is more related to social engineering, common countermeasures against phishing are still\u00a0effective. While nothing compares to a human\u2019s own ability to tell the scam from legitimate mail, the complementing <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_Whitepaper_Anti_phishing.pdf\" target=\"_blank\" rel=\"noopener nofollow\">technical measures and security technologies<\/a> are also extremely helpful here, allowing quick and reliable confirmation as to whether the message contains anything harmful and if the provided link is dangerous or safe to visit.<\/p>\n<p>Stay safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late in December, the term &#8220;whaling&#8221; mildly spiked in cybersecurity-related media outlets. The term isn&#8217;t exactly new, but it isn&#8217;t encountered as often as &#8220;phishing&#8221;.<\/p>\n","protected":false},"author":209,"featured_media":15323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[76,2379],"class_list":{"0":"post-5009","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-phishing","10":"tag-whaling"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/whaling\/5009\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/whaling\/8057\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/whaling\/5009\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/whaling\/10268\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/whaling\/5009\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=5009"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5009\/revisions"}],"predecessor-version":[{"id":24626,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/5009\/revisions\/24626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=5009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=5009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=5009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}