Recently, US-based IT firm’s HR manager was duped into purchasing Apple gift cards worth Rs 10 lakh by cybercriminals posing as the company’s CEO. The fraudsters, using a WhatsApp number with the CEO’s picture, instructed her to buy the cards as gifts for employees. After purchasing and sending the vouchers, it was revealed that the CEO’s identity had been falsified.
An FIR was registered, and Pune Rural police are investigating. Whale phishing attacks, like this one, focus on high-profile individuals or employees handling finances. Pune has seen around 10 such attacks since July last year, by this we can understand the importance of understanding whale phishing scam.
Phishing is a form of social engineering characterised by fraudulent attempts to acquire sensitive information, such as passwords and credit card details, by having a mask as a trustworthy person or business in an official-looking electronic communication, such as an email or an instant message. This cyberattack is designed to deceive individuals into providing confidential information, often leading to identity theft, bank account compromise, or unauthorised use of the victim’s computer for illegal activities.
The roots of phishing can be traced back to the 1990s, during the early days of the internet. A group of hackers, known as the “warez community,” impersonated America Online (AOL) employees to collect users’ personal information and login credentials. This group is credited with carrying out the first phishing attacks and are recognised as the original “phishers.”
Whale phishing, often referred to as “whaling,” is a sophisticated form of phishing that targets high-level executives, corporate officers, and other senior leaders within an organization. Unlike traditional phishing attacks, which aim at a broad audience, whale phishing focuses on those individuals who hold key decision-making authority and have access to sensitive corporate information or funds.
The attacks are typically executed through carefully crafted emails, text messages, or phone calls, designed to deceive the recipient into revealing confidential data or authorizing large financial transactions. Given its highly targeted nature and the potential for significant financial loss, whale phishing poses a particularly dangerous threat to corporations and governmental bodies.
What is Whale Phishing?
Whale phishing, or whaling, is a subtype of phishing that primarily focuses on C-level executives such as Chief Executive Officers (CEOs), Chief Financial Officers (CFOs), and Chief Operating Officers (COOs), as well as other senior leaders who are in a position to authorize financial transactions or the release of sensitive information.
The name “whaling” is derived from the concept of going after “big fish” in this case, high-profile individuals with substantial access to company assets. By targeting executives who may not be as familiar with cybersecurity practices as their IT teams, cybercriminals exploit a vulnerability that can lead to significant financial or reputational damage.
Phishing is not only a cybercrime but also a legal offense with serious consequences in many countries. Various jurisdictions have enacted laws specifically targeting phishing and similar cybercrimes.
Whale Phishing vs. Traditional Phishing and Spear Phishing
It is essential to understand the differences between whale phishing, traditional phishing, and spear phishing, as the terms are often used interchangeably but have distinct meanings in cybersecurity.
How Whale Phishing Attacks are Executed?
A typical whale phishing attack follows a detailed and well-researched plan. The attackers often spend weeks or even months gathering information on their target, such as their job title, recent projects, company email addresses, and interactions with colleagues or vendors. Much of this information is readily available through social media platforms like LinkedIn or through business publications and corporate websites.
The key steps in a whale phishing attack usually include:
Case Studies of Whale Phishing Attacks
Several high-profile cases of whale phishing have underscored the magnitude of the threat and the potential financial fallout from such attacks. For instance:
Landmark Case: National Association of Software and Service Companies v. Ajay Sood & Others
A landmark case in the history of phishing law is the 2005 judgment in National Association of Software and Service Companies (NASSCOM) v. Ajay Sood & Others. In this case, the Delhi High Court declared phishing to be illegal, awarding damages of INR 16 lakh (approximately $20,000 USD) to NASSCOM. The defendants had sent fraudulent emails under NASSCOM’s name to obtain personal data for headhunting purposes. The court’s ruling set a strong legal precedent for combating phishing in India.
Justice P. Nandrajog, noted that the internet had spawned novel methods for defrauding individuals and organisations. He described phishing as a form of internet fraud where a person pretends to be a legitimate entity such as a bank or insurance company to extract personal information from users.
Legal and Compliance Implications
The rise of whale phishing poses financial risks and legal implications for companies that fail to implement adequate cybersecurity measures. Organisations may face regulatory scrutiny and legal liability if they are found negligent in safeguarding sensitive data or failing to implement sufficient cybersecurity protocols. Several jurisdictions, including the United States and the European Union, have enacted stringent data protection laws, such as the General Data Protection Regulation (GDPR), which impose hefty fines for data breaches that result from poor cybersecurity practices.
California’s Anti-Phishing Act of 2005
California was the first state in the U.S. to pass anti-phishing legislation through the Anti-Phishing Act of 2005. This law defines phishing as any attempt to solicit, request, or induce another person to provide identifying information by representing a business without the authority or approval of that business. Under the Act, phishing victims in California are entitled to relief of either the actual cost of damages or up to $500,000.
The law specifies that it is illegal for anyone to use web pages, email messages, or other Internet-based communication to solicit sensitive information by impersonating a legitimate business.
Phishing Under Indian Law
In India, phishing is recognized as a cybercrime and falls under the penal provisions of the Information Technology Act, 2000 (IT Act). The following sections of the IT Act apply to phishing attacks:
Under Section 77B of the IT Act, phishing-related offenses are bailable. However, phishing can also be prosecuted under other provisions of the Indian Penal Code, such as Cheating (Section 415), Mischief (Section 425), Forgery (Section 464), and Abetment (Section 107). [Now replaced with BNS].
how can Whale Phishing Attacks be prevented?
While whale phishing attacks are difficult to detect and prevent, organizations can take proactive steps to reduce their risk exposure:
Conclusion
Whale phishing presents a significant threat to corporations and executives, with the potential for severe financial losses and legal repercussions. Given the targeted nature of these attacks, organisations must be proactive in implementing robust security protocols, educating their executives, and adopting advanced cybersecurity tools to mitigate the risk. While no single solution can fully prevent whale phishing, a multi-layered approach that combines human training with technological safeguards can significantly reduce the likelihood of a successful attack.
Phishing remains one of the most prevalent forms of cybercrime worldwide. According to a global survey titled “Phishing Insights 2021” by Sophos, a cybersecurity company, 83% of IT teams in Indian organizations reported an increase in phishing emails targeting their employees during 2020. This alarming trend highlights the need for stronger cybersecurity measures, both at the organizational and individual levels.
To mitigate the risk of falling prey to phishing attacks, companies must invest in robust cybersecurity training, implement advanced phishing detection tools, and enforce strict data protection policies. As phishing attacks continue to evolve, legal systems around the world must also adapt, ensuring that cybercriminals are held accountable and victims have access to justice.
Drafted by Shreyashi Chaudhary, 3rd Year, BBA LLB, Symbiosis Law School
Published on October 7, 2024
IP is designed to encourage innovation and creativity by providing creators and inventors with exclusive…
FERPA, or the Family Educational Rights and Privacy Act, is a federal law in the…
In recent years, the debate surrounding minimum wage laws has gained significant traction, with policymakers…
On September 21, 2024, Atishi, a prominent leader of the Aam Aadmi Party (AAP), took…
Caring for a loved one can be both a rewarding and challenging experience. However, the…
Overtime law in India is designed to ensure that workers are fairly compensated for hours…