locate an office

Cybersecurity 4 minutes

Recognizing email threats and social engineering

Hackers take advantage of our trust and natural willingness to be helpful by employing social engineering techniques to break our usual cybersecurity practices. Fraudsters can trick you into performing actions or divulging confidential information via email, text messages, phone calls, social media and other interactions, which could lead to a compromise of your data or assets.

In the past few years, the sophistication of tactics used to commit cyber and fraud attacks has significantly evolved. Historically, fraudsters have hacked into email accounts and attempted to guess online banking passwords. Recently, attempts have included actions such as porting victims’ mobile phone numbers to cellular devices the fraudsters control, and gaining entry into computers via remote access scams, which exposes all of a victim’s confidential data, not just banking details. And with the rise of artificial intelligence (AI), attacks are becoming more complex, covert and difficult to detect.

Recognize the types of social engineering email threats:

  1. Email phishing: Fraudsters attempt to trick individuals into replying to or clicking a link in an email that may appear to be legitimate. Phishing emails can contain malicious software (malware) or attempts to convince the recipient to divulge sensitive information such as confidential data or account credentials. Spear phishing, a more targeted form of phishing, can use information collected online or via social media to make the email, and request within it, appear more credible.
  2. Email spoofing: Fraudsters mimic or spoof an email to convince targets that the email they are receiving is from a known and trusted source. This can be done by modifying the header in a malicious email to pose as a trusted sender—for example, @deancoLLC.com can appear similar to a known vendor @cleancoLLC.com. Similarly, a fraudster can copy a logo from a known company to trick their target into thinking it’s a credible email.
  3. Email account compromise: Fraudsters use a victim’s legitimate username and password to gain access to the person’s account to send, receive and view their target’s email. Through an email account compromise, they are looking to capture information such as details on upcoming financial transactions or to manipulate a wire transfer into their accounts.
  4. Voice phishing (Vishing): Fraudsters spoof or mask the caller ID to make the call seem as if it is coming from a known or legitimate contact to make it appear authentic. Through Vishing, they will voice phish individuals into providing their personal or financial information.
  5. Text phishing (SMiShing): Fraudsters spoof or mask the phone number of the sender to make the message seem as if it is coming from a known or legitimate contact to make it appear authentic. Through SMiShing, they will phish individuals using SMS text messages to trick individuals into clicking on a link or calling the phone number provided, and disclosing personal or financial information.


What you can do

For individuals

Recognize phishing email warning signs, such as poor grammar and spelling, urgent language, hyperlinks or attachments, fake logos, a vague email address and no or vague contact information.

  1. Do not assume a request is genuine just because the requester knows information about you or your company.
  2. Do not call unknown numbers. Always use the telephone numbers that appear on your statement or on the company’s website.
  3. Confirm the identity of the requester via an alternate, verified method, and check the email address: Scammers often use spoofed email addresses to send what seem to be legitimate requests.
  4. Be cautious of clicking on any links or attachments sent to you in emails or text messages.
  5. Limit the information you post on social media. Every account is a venue for a hacker to gain intelligence on you.
  6. Create strong and complex passwords, change them frequently, and never share them. Leverage multi-factor authentication for additional security.
  7. Update operating systems and anti-virus software on computers and mobile devices to the latest versions as soon as they become available.
  8. Encrypt sensitive information such as account numbers, tax information or other personal information before emailing it.


For businesses

  1. Educate your employees about threats in the fraud landscape and how they can mitigate risk. Consider implementing a fraud awareness education program. 
  2. Implement a social media policy for employees to ensure critical information about staff with privileged responsibilities and their roles is not available to the public.
  3. Employ additional spam reduction solutions or filters, if needed, to help reduce the risk of malicious emails reaching employees’ inboxes.
  4. Implement the email authentication protocols Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM) and Domain-Based Message Authentications, Reporting and Conformance (DMARC) to greatly enhance the authenticity of the emails your organization sends and receives.
  5. Use a proxy internet filtering service to help block employees from visiting potentially malicious web pages and links found in spam email.

 

If you believe you have been targeted by a social engineering attack, or your login credentials have been compromised, please contact your J.P. Morgan team immediately. 

EXPERIENCE THE FULL POSSIBILITY OF YOUR WEALTH

We can help you navigate a complex financial landscape. Reach out today to learn how.

Contact us

Important Information

This article is provided for educational and informational purposes only and is not intended, nor should it be relied upon, to address every aspect of the subject discussed herein. The information provided in this article is intended to help clients protect themselves from cyber fraud. It does not provide a comprehensive listing of all types of cyber fraud activities and it does not identify all types of cybersecurity best practices. You, your company or organization is responsible for determining how to best protect itself against cyber fraud activities and for selecting the cybersecurity best practices that are most appropriate to your needs. Any reproduction, retransmission, dissemination or other unauthorized use of this article or the information contained herein by any person or entity is strictly prohibited.

Key Risks

This material is for informational purposes only, and may inform you of certain products and services offered by private banking businesses, part of JPMorgan Chase & Co. (“JPM”). Products and services described, as well as associated fees, charges and interest rates, are subject to change in accordance with the applicable account agreements and may differ among geographic locations. Not all products and services are offered at all locations. If you are a person with a disability and need additional support accessing this material, please contact your J.P. Morgan team or email us at accessibility.support@jpmorgan.com for assistance. Please read all Important Information.

LEARN MORE About Our Firm and Investment Professionals Through FINRA BrokerCheck

 

To learn more about J.P. Morgan’s investment business, including our accounts, products and services, as well as our relationship with you, please review our J.P. Morgan Securities LLC Form CRS and Guide to Investment Services and Brokerage Products

 

JPMorgan Chase Bank, N.A. and its affiliates (collectively "JPMCB") offer investment products, which may include bank-managed accounts and custody, as part of its trust and fiduciary services. Other investment products and services, such as brokerage and advisory accounts, are offered through J.P. Morgan Securities LLC ("JPMS"), a member of FINRA and SIPC. Insurance products are made available through Chase Insurance Agency, Inc. (CIA), a licensed insurance agency, doing business as Chase Insurance Agency Services, Inc. in Florida. JPMCB, JPMS and CIA are affiliated companies under the common control of JPMorgan Chase & Co. Products not available in all states.

 

Please read the Legal Disclaimer for J.P. Morgan Private Bank regional affiliates and other important information in conjunction with these pages.

INVESTMENT AND INSURANCE PRODUCTS ARE: • NOT FDIC INSURED • NOT INSURED BY ANY FEDERAL GOVERNMENT AGENCY • NOT A DEPOSIT OR OTHER OBLIGATION OF, OR GUARANTEED BY, JPMORGAN CHASE BANK, N.A. OR ANY OF ITS AFFILIATES • SUBJECT TO INVESTMENT RISKS, INCLUDING POSSIBLE LOSS OF THE PRINCIPAL AMOUNT INVESTED
Bank deposit products, such as checking, savings and bank lending and related services are offered by JPMorgan Chase Bank, N.A. Member FDIC. Not a commitment to lend. All extensions of credit are subject to credit approval.