News
Print Article

ASK MAT – I have been asked whether my firm has WHALING ATTACK protocols set up. What does this all mean?

07/04/2025

ASK MAT – I have been asked whether my firm has WHALING ATTACK protocols set up. What does this all mean?

MAT SAYS – Thank you for such a great question and a good reminder that, in business, we are juggling many risks. And phishing attacks are one way our IT systems and valuable data are compromised.

Part 1 - PHISHING ATTACK

A whaling attack is a type of PHISHING ATTACK that specifically targets high-profile individuals within an organisation, such as executives or senior managers (see next section – part 2)

Phishing is a type of cybercrime where attackers deceive individuals into revealing sensitive information or installing malware. This is typically done through fraudulent emails, websites, or messages that appear to be from a trusted source.

Here are some key points about phishing:

  • Deceptive Communication: Phishing messages often mimic legitimate institutions like banks or government agencies to trick recipients into providing personal data, such as passwords, credit card details, or Social Security numbers
  • Common Tactics: These messages may include urgent requests, enticing offers, or fake links that lead to malicious websites designed to steal information
  • Variety of Forms: Phishing can occur via email (email phishing), phone calls (vishing), text messages (smishing), and even social media

To protect yourself from phishing attacks, it's essential to exercise caution with unsolicited communications, verify the sender's identity, and refrain from clicking on suspicious links or opening attachments. (part 3)

Part 2 - WHALING ATTACKS

A whaling attack is a type of phishing attack that targets explicitly high-profile individuals within an organisation, such as executives or senior managers. These attacks are designed to trick the target into revealing sensitive information or transferring money by masquerading as legitimate communication from a trusted source.

Here are some key points about whaling attacks:

  • Targeted Approach: Unlike general phishing attacks, whaling attacks are highly targeted and personalised, often using information gathered from social media or other public sources to make the communication seem more credible
  • High Stakes: Because they target individuals with significant access and authority, the potential damage from a successful whaling attack can be substantial, including financial loss and data breaches
  • Sophisticated Tactics: Attackers may use email spoofing, fake websites, and other sophisticated methods to deceive their targets. They often spend considerable time researching their victims to craft convincing messages

To protect against whaling attacks, organisations must educate their employees about these threats and implement robust security measures.

Part 3 - EMAIL AUTHENTICATION PROTOCOLS TO STOP WHALING ATTACKS

Email authentication protocols like SPF, DKIM, and DMARC play crucial roles in preventing WHALING ATTACKS, which are highly targeted phishing attacks aimed at high-profile individuals within an organisation.

  1. SPF (Sender Policy Framework): This protocol allows domain owners to specify which mail servers are authorised to send emails on their behalf. By publishing an SPF record in the DNS, receiving mail servers can verify if an email is coming from an authorised server. This helps prevent attackers from spoofing the sender's domain
  2. DKIM (DomainKeys Identified Mail): DKIM adds a digital signature to the email's header, which is created using a private key. The receiving server can verify this signature using the public key published in the sender's DNS records. This ensures that the email content has not been tampered with during transit and confirms the legitimacy of the sender's domain
  3. DMARC (Domain-based Message Authentication, Reporting, and Conformance): DMARC builds on SPF and DKIM by providing instructions to receiving mail servers on how to handle emails that fail SPF or DKIM checks. It allows domain owners to specify whether such emails should be quarantined, rejected, or delivered. DMARC also provides reporting capabilities, enabling domain owners to monitor and improve their email authentication practices

Together, these protocols help prevent unauthorised parties from sending emails on behalf of a domain, thereby reducing the risk of whaling attacks and other email-based threats.

References

ASK MAT

The Team

Meet the team of industry experts behind Comsure

Find out more

Latest News

Keep up to date with the very latest news from Comsure

Find out more

Gallery

View our latest imagery from our news and work

Find out more

Contact

Think we can help you and your business? Chat to us today

Get In Touch

News Disclaimer

As well as owning and publishing Comsure's copyrighted works, Comsure wishes to use the copyright-protected works of others. To do so, Comsure is applying for exemptions in the UK copyright law. There are certain very specific situations where Comsure is permitted to do so without seeking permission from the owner. These exemptions are in the copyright sections of the Copyright, Designs and Patents Act 1988 (as amended)[www.gov.UK/government/publications/copyright-acts-and-related-laws]. Many situations allow for Comsure to apply for exemptions. These include 1] Non-commercial research and private study, 2] Criticism, review and reporting of current events, 3] the copying of works in any medium as long as the use is to illustrate a point. 4] no posting is for commercial purposes [payment]. (for a full list of exemptions, please read here www.gov.uk/guidance/exceptions-to-copyright]. Concerning the exceptions, Comsure will acknowledge the work of the source author by providing a link to the source material. Comsure claims no ownership of non-Comsure content. The non-Comsure articles posted on the Comsure website are deemed important, relevant, and newsworthy to a Comsure audience (e.g. regulated financial services and professional firms [DNFSBs]). Comsure does not wish to take any credit for the publication, and the publication can be read in full in its original form if you click the articles link that always accompanies the news item. Also, Comsure does not seek any payment for highlighting these important articles. If you want any article removed, Comsure will automatically do so on a reasonable request if you email info@comsuregroup.com.