{"id":7292,"date":"2015-08-01T03:34:26","date_gmt":"2015-07-31T19:34:26","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1169"},"modified":"2015-08-01T03:34:26","modified_gmt":"2015-07-31T19:34:26","slug":"definition-whaling-attacks","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/","title":{"rendered":"Definition of the Day: Whaling Attacks"},"content":{"rendered":"

If a phishing attack casts a wide net to employees at all levels of an organization it follows that a whaling attack focuses on reeling in the big fish. In this case the \u2018whale\u2019 is a higher-level executive within the company. The goal is network access, and, ideally, access to C-suite executive information.<\/p>\n

Here the hacker takes his or her time and does initial background research on their target to be able to send the whale something relevant the C-level has a very high chance of acting upon.<\/p>\n

One example is an executive at a Fortune 500 company that sells products directly to consumers. In this case the CEO is famous for being very public about how his company offers the best customer service in the industry. Knowing this, the would be attacker sent the CEO an email containing a customer complaint that appeared to be from the Better Business Bureau. The CEO saw this in his inbox preview window and, concerned about a potential public relations problem, opened the email to read it. Only, the email was not from the Better Business Bureau and the act of opening it gave the hacker enough access to inject malware into the CEO\u2019s computer without initial detection.<\/p>\n

Another example of this type of attack happened to the VP of Human Resources at a major technology company. By researching available, public social media, the hacker learned this VP has 5 children. The hacker then sent a bogus email from a major US healthcare insurance provider touting a new, inexpensive benefits plan for families with 4 or more children. The HR professional saw this in his inbox preview window and for professional and personal reasons, opened the email and thus exposed him to malware injection.<\/p>\n

This is a particularly lucrative and growing technique helped, in part, by the explosion of public personal information available via social media and the reality that many C-suite executives are not as computer literate as middle and lower-level employees.<\/p>\n","protected":false},"excerpt":{"rendered":"

If a phishing attack casts a wide net to employees at all levels of an organization it follows that a whaling attack focuses on reeling in the big fish. In this case the \u2018whale\u2019 is a higher-level executive within the company. The goal is network access, and, ideally, access to C-suite executive information. Here the […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[64,263,236,248,366,50,164,246],"class_list":["post-7292","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-crime","tag-definition-of-the-day","tag-hacking","tag-identity-theft","tag-malware-injection","tag-phishing","tag-social-engineering","tag-whaling-attack"],"yoast_head":"\nDefinition of the Day: Whaling Attacks - BankVault<\/title>\n<meta name=\"description\" content=\"Whaling attacks are a type of cyber crime similar to phishing techniques. Find out more about what whaling attacks are and how they may affect your company!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-whaling-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Whaling Attacks - BankVault\" \/>\n<meta property=\"og:description\" content=\"Whaling attacks are a type of cyber crime similar to phishing techniques. Find out more about what whaling attacks are and how they may affect your company!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-whaling-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-31T19:34:26+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Whaling Attacks - BankVault","description":"Whaling attacks are a type of cyber crime similar to phishing techniques. Find out more about what whaling attacks are and how they may affect your company!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Whaling Attacks - BankVault","og_description":"Whaling attacks are a type of cyber crime similar to phishing techniques. Find out more about what whaling attacks are and how they may affect your company!","og_url":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-07-31T19:34:26+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Whaling Attacks","datePublished":"2015-07-31T19:34:26+00:00","dateModified":"2015-07-31T19:34:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/"},"wordCount":334,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["cyber crime","definition of the day","hacking","identity theft","malware injection","phishing","social engineering","whaling attack"],"articleSection":["Definition of the Day"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-whaling-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/","url":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/","name":"Definition of the Day: Whaling Attacks - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-07-31T19:34:26+00:00","dateModified":"2015-07-31T19:34:26+00:00","description":"Whaling attacks are a type of cyber crime similar to phishing techniques. Find out more about what whaling attacks are and how they may affect your company!","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-whaling-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-whaling-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Whaling Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=7292"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7292\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=7292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=7292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=7292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}