The Anatomy of an Email Attack
John Iacono • May 15, 2017

May 15, 2017

Now that you know ransomware attacks are on the rise  we thought it would be useful to share some real world examples of just how sneaky these email threats can be. Below are three suprisingly common examples of how a cybercriminal can use your own email against you. Even Yahoo!  wasn’t safe from an email attack.

• A CFO gets an email from the CEO authorizing an emergency fund transfer. But the email is actually from a cybercriminal

• An employee with administrative rights to key systems receives an urgent email from IT to update their network password. They actually disclose their password to cybercriminals.

• An employee receives an email to read an important attachment about their benefits provider. When they open the attachment, they unknowingly activate hidden Trojan malware.

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’11779296554′, style=” %}

Scared? We get it. Luckily, we have summarized everything you need to know and do to protect you and your data from email threats.

How can phishing hurt your business?

Phishing emails  accounted for over 90% of all data breaches in 2018. Phishing can have several damaging effects on your business. First, when an employee at your business opens a phishing email, it makes your whole business susceptible of receiving the same phishing email. A common phishing email may ask for an employee to reset their password because it’s expiring. When the employee opens this email, clicks on the link and puts in their login credentials, the hacker can now access all the other contacts in their email and any company data. At this point, the hacker can send the same email reset email to all the employees in your business and gain full access to your business. This can lead to extreme financial loss, damage to reputation, loss of clients and more. For the individual employee that falls to phishing, it can result in unauthorized purchases, identity theft and loss of funds. For the business, company data and client data can be used as ransom to extort the business for money.

 Related Articles:

The post The Anatomy of an Email Attack appeared first on Fairdinkum.

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →