igforum.bio / what-is-whaling - 116184
N
% What Is 'Whaling?' GA
S
REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO Internet, Networking, & Security &gt; Antivirus 63 63 people found this article helpful <h1>
What Is Whaling?</h1>
<h2>
This sophisticated phishing technique angles for the big fish</h2> By Paul Gil Paul Gil Writer Paul Gil, a former Lifewire writer who is also known for his dynamic internet and database courses and has been active in technology fields for over two decades.
% What Is 'Whaling?' GA S REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO Internet, Networking, & Security > Antivirus 63 63 people found this article helpful

What Is Whaling?

This sophisticated phishing technique angles for the big fish

By Paul Gil Paul Gil Writer Paul Gil, a former Lifewire writer who is also known for his dynamic internet and database courses and has been active in technology fields for over two decades.
thumb_up Like (7)
comment Reply (1)
share Share
visibility 143 views
thumb_up 7 likes
comment 1 replies
E
Evelyn Zhang 1 minutes ago
lifewire's editorial guidelines Updated on April 5, 2020 Tweet Share Email Tweet Share Email

In...

K
lifewire's editorial guidelines Updated on April 5, 2020 Tweet Share Email Tweet Share Email <h3>
In This Article</h3> Expand Jump to a Section The Objective of Whaling Whaling Scams Overview Whaling vs. Phishing Scams How to Protect Yourself Real-life Whaling "Whaling" is a specific form of phishing that targets high-profile business executives, managers, and the like.
lifewire's editorial guidelines Updated on April 5, 2020 Tweet Share Email Tweet Share Email

In This Article

Expand Jump to a Section The Objective of Whaling Whaling Scams Overview Whaling vs. Phishing Scams How to Protect Yourself Real-life Whaling "Whaling" is a specific form of phishing that targets high-profile business executives, managers, and the like.
thumb_up Like (33)
comment Reply (2)
thumb_up 33 likes
comment 2 replies
E
Ella Rodriguez 6 minutes ago
It's different from ordinary phishing in that with whaling, the emails or web pages serving the scam...
C
Chloe Santos 8 minutes ago
In those cases, the phishing email/site looks pretty standard, whereas, in whaling, the page design ...
C
It's different from ordinary phishing in that with whaling, the emails or web pages serving the scam take on a more severe or formal look and are usually targeting someone in particular. For perspective, regular non-whaling phishing is usually an attempt to get someone&#39;s login information to a social media site or bank.
It's different from ordinary phishing in that with whaling, the emails or web pages serving the scam take on a more severe or formal look and are usually targeting someone in particular. For perspective, regular non-whaling phishing is usually an attempt to get someone's login information to a social media site or bank.
thumb_up Like (4)
comment Reply (0)
thumb_up 4 likes
M
In those cases, the phishing email/site looks pretty standard, whereas, in whaling, the page design addresses the manager/executive under attack explicitly. <h2> What Is the Objective of Whaling  </h2> The point is to swindle someone in upper management into divulging confidential company information.
In those cases, the phishing email/site looks pretty standard, whereas, in whaling, the page design addresses the manager/executive under attack explicitly.

What Is the Objective of Whaling

The point is to swindle someone in upper management into divulging confidential company information.
thumb_up Like (38)
comment Reply (0)
thumb_up 38 likes
H
This usually comes in the form of a password to a sensitive account, which the attacker can then access to gain more data. The end-game in all phishing attacks like whaling is to scare the recipient, to convince them that they need to take action to proceed, like to avoid legal fees, to prevent from getting fired, to stop the company from bankruptcy, etc.
This usually comes in the form of a password to a sensitive account, which the attacker can then access to gain more data. The end-game in all phishing attacks like whaling is to scare the recipient, to convince them that they need to take action to proceed, like to avoid legal fees, to prevent from getting fired, to stop the company from bankruptcy, etc.
thumb_up Like (27)
comment Reply (3)
thumb_up 27 likes
comment 3 replies
L
Lily Watson 8 minutes ago

What Does a Whaling Scam Look Like

Whaling, like any phishing con game, involves a web p...
D
David Cohen 14 minutes ago
It probably asks for your login information just like you'd expect. However, if you're not c...
C
<h2> What Does a Whaling Scam Look Like  </h2> Whaling, like any phishing con game, involves a web page or email that masquerades as one that's legitimate and urgent. Scammers design them to look like a critical business email or something from someone with authority, either externally or even internally, from the company itself. The whaling attempt might look like a link to a regular website with which you&#39;re familiar.

What Does a Whaling Scam Look Like

Whaling, like any phishing con game, involves a web page or email that masquerades as one that's legitimate and urgent. Scammers design them to look like a critical business email or something from someone with authority, either externally or even internally, from the company itself. The whaling attempt might look like a link to a regular website with which you're familiar.
thumb_up Like (9)
comment Reply (3)
thumb_up 9 likes
comment 3 replies
B
Brandon Kumar 8 minutes ago
It probably asks for your login information just like you'd expect. However, if you're not c...
L
Lily Watson 10 minutes ago
No harm was done, right? You just entered your password incorrectly — that's the scam, though!...
N
It probably asks for your login information just like you&#39;d expect. However, if you&#39;re not careful, what happens next is the problem. When you try to submit your information into the login fields, a notification appears stating that the information was incorrect and that you should try again.
It probably asks for your login information just like you'd expect. However, if you're not careful, what happens next is the problem. When you try to submit your information into the login fields, a notification appears stating that the information was incorrect and that you should try again.
thumb_up Like (44)
comment Reply (0)
thumb_up 44 likes
S
No harm was done, right? You just entered your password incorrectly — that&#39;s the scam, though!
No harm was done, right? You just entered your password incorrectly — that's the scam, though!
thumb_up Like (34)
comment Reply (3)
thumb_up 34 likes
comment 3 replies
C
Chloe Santos 31 minutes ago
What happens behind the scenes is that when you enter your information into the fake site (which can...
O
Oliver Taylor 15 minutes ago
At this point, you have no idea that the page was fake and that someone just stole your password. Ho...
A
What happens behind the scenes is that when you enter your information into the fake site (which can&#39;t log you in because it isn&#39;t real), the information you entered is sent to the attacker, and then you&#39;re redirected to the real website. You try your password again, and it works out just fine.
What happens behind the scenes is that when you enter your information into the fake site (which can't log you in because it isn't real), the information you entered is sent to the attacker, and then you're redirected to the real website. You try your password again, and it works out just fine.
thumb_up Like (2)
comment Reply (3)
thumb_up 2 likes
comment 3 replies
A
Amelia Singh 24 minutes ago
At this point, you have no idea that the page was fake and that someone just stole your password. Ho...
A
Ava White 32 minutes ago
The program, whether real or not, has a malicious undertone to track everything you type or delete t...
S
At this point, you have no idea that the page was fake and that someone just stole your password. However, the attacker now has your username and password to the website to which you thought you logged in. Instead of a link, the phishing scam might have you download a program to view a document or image.
At this point, you have no idea that the page was fake and that someone just stole your password. However, the attacker now has your username and password to the website to which you thought you logged in. Instead of a link, the phishing scam might have you download a program to view a document or image.
thumb_up Like (35)
comment Reply (2)
thumb_up 35 likes
comment 2 replies
D
David Cohen 8 minutes ago
The program, whether real or not, has a malicious undertone to track everything you type or delete t...
A
Alexander Wang 1 minutes ago
The faked page might frighten the target with claims that their account has been charged or attacked...
A
The program, whether real or not, has a malicious undertone to track everything you type or delete things from your computer. <h2> How Whaling Is Different From Other Phishing Scams </h2> In a regular phishing scam, the web page/email might be a faked warning from your bank or PayPal.
The program, whether real or not, has a malicious undertone to track everything you type or delete things from your computer.

How Whaling Is Different From Other Phishing Scams

In a regular phishing scam, the web page/email might be a faked warning from your bank or PayPal.
thumb_up Like (13)
comment Reply (2)
thumb_up 13 likes
comment 2 replies
H
Henry Schmidt 9 minutes ago
The faked page might frighten the target with claims that their account has been charged or attacked...
L
Lily Watson 9 minutes ago
The whaling email or website may come in the form of a false subpoena, a fake message from the FBI, ...
E
The faked page might frighten the target with claims that their account has been charged or attacked,&nbsp;and that they must enter their ID and password to confirm the charge or to verify their identity. In the case of whaling, the masquerading web page/email will take a more serious executive-level form. The content will target an upper manager like the CEO or even just a supervisor that might have lots of pull in the company or who might have credentials to valuable accounts.
The faked page might frighten the target with claims that their account has been charged or attacked, and that they must enter their ID and password to confirm the charge or to verify their identity. In the case of whaling, the masquerading web page/email will take a more serious executive-level form. The content will target an upper manager like the CEO or even just a supervisor that might have lots of pull in the company or who might have credentials to valuable accounts.
thumb_up Like (40)
comment Reply (1)
thumb_up 40 likes
comment 1 replies
S
Scarlett Brown 40 minutes ago
The whaling email or website may come in the form of a false subpoena, a fake message from the FBI, ...
A
The whaling email or website may come in the form of a false subpoena, a fake message from the FBI, or some sort of critical legal complaint. <h2> How Do I Protect Myself From Whaling Attacks  </h2> The easiest way to protect yourself from falling for a whaling scam is to be aware of what you click.
The whaling email or website may come in the form of a false subpoena, a fake message from the FBI, or some sort of critical legal complaint.

How Do I Protect Myself From Whaling Attacks

The easiest way to protect yourself from falling for a whaling scam is to be aware of what you click.
thumb_up Like (28)
comment Reply (3)
thumb_up 28 likes
comment 3 replies
A
Aria Nguyen 23 minutes ago
It's that simple. Since whaling occurs over emails and websites, you can avoid all malicious lin...
H
Hannah Kim 12 minutes ago
Now, it's not always possible to know what's fake. Sometimes, you get a new email from someo...
A
It&#39;s that simple. Since whaling occurs over emails and websites, you can avoid all malicious links by understanding what&#39;s real and what isn&#39;t.
It's that simple. Since whaling occurs over emails and websites, you can avoid all malicious links by understanding what's real and what isn't.
thumb_up Like (19)
comment Reply (0)
thumb_up 19 likes
S
Now, it&#39;s not always possible to know what&#39;s fake. Sometimes, you get a new email from someone that you&#39;ve never emailed before, and they might send you something that seems entirely legitimate. However, if you look at the URL in your web browser and make sure to look around the site, even briefly, for things that look a little off, you can significantly decrease your chances of being attacked in this way.
Now, it's not always possible to know what's fake. Sometimes, you get a new email from someone that you've never emailed before, and they might send you something that seems entirely legitimate. However, if you look at the URL in your web browser and make sure to look around the site, even briefly, for things that look a little off, you can significantly decrease your chances of being attacked in this way.
thumb_up Like (34)
comment Reply (0)
thumb_up 34 likes
I
<h2> Do Executives and Managers Really Fall for These Whaling Emails  </h2> Yes, unfortunately, managers often fall for whaling email scams. Take the 2008 FBI subpoena whaling scam as an example.

Do Executives and Managers Really Fall for These Whaling Emails

Yes, unfortunately, managers often fall for whaling email scams. Take the 2008 FBI subpoena whaling scam as an example.
thumb_up Like (9)
comment Reply (0)
thumb_up 9 likes
A
Scammers attacked about 20,000 corporate CEOs, and approximately 2000 of them fell for the whaling scam by clicking the link in the email. They believed it would download a&nbsp;special browser add-on to view the entire subpoena. In truth, the linked software was a keylogger that secretly recorded the CEOs passwords&nbsp;and forwarded those passwords to the con men.
Scammers attacked about 20,000 corporate CEOs, and approximately 2000 of them fell for the whaling scam by clicking the link in the email. They believed it would download a special browser add-on to view the entire subpoena. In truth, the linked software was a keylogger that secretly recorded the CEOs passwords and forwarded those passwords to the con men.
thumb_up Like (38)
comment Reply (1)
thumb_up 38 likes
comment 1 replies
S
Sebastian Silva 11 minutes ago
As a result, each of the 2000 compromised companies was hacked even further now that the attackers h...
E
As a result, each of the 2000 compromised companies was hacked even further now that the attackers had the information they needed. Was this page helpful?
As a result, each of the 2000 compromised companies was hacked even further now that the attackers had the information they needed. Was this page helpful?
thumb_up Like (36)
comment Reply (2)
thumb_up 36 likes
comment 2 replies
J
Joseph Kim 3 minutes ago
Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Othe...
A
Alexander Wang 6 minutes ago
How to Use Passkeys on iPhone, iPad, or Mac How to Remove Your Information From the Web Are iPads Re...
A
Thanks for letting us know! Get the Latest Tech News Delivered Every Day
Subscribe Tell us why! Other Not enough details Hard to understand Submit More from Lifewire The 4 Best Slack Security Tips to Keep Your Team Chats Safe What Is a 401 Unauthorized Error and How Do You Fix It?
Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Other Not enough details Hard to understand Submit More from Lifewire The 4 Best Slack Security Tips to Keep Your Team Chats Safe What Is a 401 Unauthorized Error and How Do You Fix It?
thumb_up Like (20)
comment Reply (1)
thumb_up 20 likes
comment 1 replies
N
Natalie Lopez 1 minutes ago
How to Use Passkeys on iPhone, iPad, or Mac How to Remove Your Information From the Web Are iPads Re...
S
How to Use Passkeys on iPhone, iPad, or Mac How to Remove Your Information From the Web Are iPads Really That Safe from Viruses and Malware? What Is a Windows SmartScreen Filter? DNS Servers: What Are They and Why Are They Used?
How to Use Passkeys on iPhone, iPad, or Mac How to Remove Your Information From the Web Are iPads Really That Safe from Viruses and Malware? What Is a Windows SmartScreen Filter? DNS Servers: What Are They and Why Are They Used?
thumb_up Like (28)
comment Reply (1)
thumb_up 28 likes
comment 1 replies
L
Lily Watson 40 minutes ago
What Is a Cyber Attack and How to Prevent One How to Test a Suspicious Link Without Clicking It Why ...
L
What Is a Cyber Attack and How to Prevent One How to Test a Suspicious Link Without Clicking It Why We Fall for Texting Scams (and How to Stop) How to Manage AutoComplete in Internet Explorer 11 8 Tips on Basic Computer Safety Fake IRS Letters: How to Identify Them and Protect Yourself How to Remove That Microsoft Warning Alert How to Reset or Change Your Instagram Password 9 Best Ways to Hide Your Identity Online Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookies Settings Accept All Cookies
What Is a Cyber Attack and How to Prevent One How to Test a Suspicious Link Without Clicking It Why We Fall for Texting Scams (and How to Stop) How to Manage AutoComplete in Internet Explorer 11 8 Tips on Basic Computer Safety Fake IRS Letters: How to Identify Them and Protect Yourself How to Remove That Microsoft Warning Alert How to Reset or Change Your Instagram Password 9 Best Ways to Hide Your Identity Online Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookies Settings Accept All Cookies
thumb_up Like (8)
comment Reply (3)
thumb_up 8 likes
comment 3 replies
L
Lily Watson 16 minutes ago
What Is 'Whaling?' GA S REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO Internet, ...
J
Joseph Kim 35 minutes ago
lifewire's editorial guidelines Updated on April 5, 2020 Tweet Share Email Tweet Share Email

In...

Write a Reply