Phishing is a cyberattack where scammers impersonate trusted entities, such as banks, companies, or individuals, to trick people into revealing sensitive information. This is often done through fake emails, messages, or websites designed to look legitimate. Phishing attacks aim to steal personal details like passwords, credit card numbers, or account information, often leading to identity theft or financial loss.
A successful phishing attack can allow hackers to install malware (such as ransomware), sabotage systems, or steal intellectual property or personal information, which can lead to identity theft and loss of money (yours or the state’s). It can also result in unauthorized access to confidential files or file locking.
Phishing emails are a common tactic used by cybercriminals to deceive individuals into revealing sensitive information, such as passwords, credit card details, or personal data. These emails often appear to come from trusted organizations, such as banks or well-known companies, and use urgent language or enticing offers to manipulate recipients into clicking malicious links or downloading harmful attachments. Every day, people around the world fall victim to these scams, highlighting the importance of staying vigilant, recognizing red flags, and understanding how to protect oneself from such threats.
Don’t trust the display name. A favorite phishing tactic among cybercriminals is to fake the “From” name in an email to try to fool you.
Check for spelling mistakes. Legitimate messages from companies should not have major spelling mistakes or poor grammar.
Beware of urgent or threatening language in the subject line. Invoking a sense of urgency or fear is a common phishing tactic. Always be suspicious of subject lines claiming your “account has been suspended” or your account had an “unauthorized login attempt.”
Don’t open attachments. Phishing emails often include attachments that contain viruses and malicious software, known as malware. Attackers can use malware to damage files on your computer, spy on you, steal your passwords, and more. Don’t open any email attachments you aren’t expecting.
Don’t click on links. Phishers often embed innocent-looking but malicious links in emails, text messages, or social media. A quick way to determine if a link is legitimate is to hover over (not click on!) the link for a few seconds so its true destination is revealed. Even then, proceed with caution, as a fraudulent email may contain a mixture of malicious and legitimate links.
If you receive a suspicious email, report it! Find detailed instructions here:
If you receive a suspicious phone call, hang up immediately; you would be surprised to know what an attacker can gain while they have you on the phone.
What should I do if I click on a link or attachment or think I gave an attacker my information?
If you clicked on a suspicious link and/or have given up state or your personal information, there are some steps you can take:
If credit card information was entered into a phishing site, call your bank to have them issue you a new card.
If highly personal information was given (e.g., Social Security Number, birthdate, etc.), you should sign up for an identity monitoring service (e.g., LifeLock, ID Watchdog, Identity Force, etc.).
Change passwords to your important accounts, and if you can, to all of your accounts.
Enable multifactor authentication wherever possible.
Report scams to the Colorado Attorney General, FCC (fcc.gov), and the FBI (ic3.gov)
If using a state-issued computer, contact your IT Service Desk.
If using your computer (not state-issued) run antivirus and anti-malware scans.