“Information Disorder”: Giving a Name to One of the Most Impactful Parts of Phishing Scams

Impactful Parts of Phishing ScamAt the core of every phishing scam is a combination of a bunch of lies and (sometimes) a few truths. A new focus on better defining the misuse of information provides insight into why phishing works.

We’ve long known that phishing scams are all based on the sender pretending they are someone they’re not, asking for something they don’t need, sent to someone they don’t know. Add in spear phishing and some of the “truths” begin to show up – seemingly legitimate requests being appropriately made of the right person within an organization. Add in BEC attacks and you might even see the “truth” of the phishing email coming from the sender’s actual email account.

In the world of phishing, this misuse of information is what makes these attacks so effective. But it’s tough to attack something that is more a concept. So, I loved it when I saw that the Council of Europe has provided some definitions around what they call “Information Disorder”. There are three types of information disorder, of which two apply in the work of cyber attacks:

  • Mis-information - when false information is shared, but no harm is meant.
  • Dis-information - when false information is knowingly shared to cause harm.
  • Mal-information - when genuine information is shared to cause harm, often by moving information designed to stay private into the public sphere.

In phishing, we see LOTS of disinformation; everything from the senders identity, email address, company, purpose for the email, and need for a response are all examples. In ransomware campaigns that involve a data extortion component (which most do today), we see the use of malinformation, where stolen data is posted to a publicly-accessible site.

The EU’s DisinfoLab even raises the red flag, citing disinformation as a cybersecurity threat. They point out the context established by the information disorder is a primary factor in users falling for phishing attacks.

Individuals and users within organizations need to become well-educated on how the basic factors of an email we assume to be true (e.g., sender, company, purpose, etc.) should remain under scrutiny – especially in cases when the email is unsolicited. Organizations can put employees through continual Security Awareness Training as an effective way to educate them on what to look for and how to spot a scam a mile away, helping to elevate vigilance and lower the risk of successful attack.

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Topics: Phishing

Subscribe To Our Blog

Anti-Phishing Guide ebook

Get the latest about social engineering

Subscribe to CyberheistNews