Does phishing really work?

You’re making a big deal about phishing and spear phishing. Does anybody fall for that?


Dear Control Engineering: I’ve seen two articles recently on your site about phishing, once in the Real World Engineering blog and Matt Luallen’s column. Does this really work? Does anybody fall for “free gas for a year?”

Phishing has grown as an attack method because it works. A case in point: If you were paying attention to the stock market, you know that the Dow Jones Industrial Average dropped very quickly earlier this week after there was a tweet from the Associated Press saying that bombs had gone off at the White House. This was because the Twitter account of one of the AP staffers had been hacked. The lesser known part of this story was that the AP staffer had fallen for a spear phishing scheme.

As SC Magazine reports, “…the intruders were able to glean the AP's Twitter login credentials thanks to a spear phishing email that targeted some staffers just prior to the compromise. Victims were directed to a sign-in form and asked to enter the username and password for the account.”

This is by no means an isolated incident. Read Matt Luallen’s column for advice on training your people so they know when the hook is in the water.

Peter Welander,

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle