Phishing

BeckyStrause

Sea spearfishing (phishing) isn’t what it used to be.  In our recent past, spearfishing was simply an ancient method of fishing that was used throughout the world.  But now the phrase hangs like a warning sign on the door of the internet.

The SEA (Syrian Electronic Army), a hacker group that is aligned with President Bashar al-Assad, has recently been targeting phishing attacks against various domains.  Those domains include: The New York Times, Twitter, The Huffington Post, and Melbourne IT.  They have also hacked into websites or Twitter accounts of various media organizations, including the Financial Times, the Associated Press, The Guardian, BBC, NPR, and Al Jazeera.  The Onion was also targeted, and shared an honest response on how it happened.

The technique they are using in these attacks is one of the most simple and oldest ones in the book.  They send out an email, or several emails, saying something to the effect of, “you should see this article,” with a link in it.  The unsuspecting person clicks the link, is redirected to a URL asking for his email credentials to continue, which he enters, and now the hacker has his account info including password.  And POW!  The hacker has all the info he needs to access that person’s email, and send an email out to all his contacts.  When the rest of the company gets an email with another phishing link in it, they’re more likely to open it because it’s from a colleague.  That’s when things can really get crazy.

Here’s a bit of The Onion’s story from when they were attacked:

Once the attackers had access to one Onion employee’s account, they used that account to send the same email to more Onion staff at about 2:30 AM on Monday, May 6. Coming from a trusted address, many staff members clicked the link, but most refrained from entering their login credentials. Two staff members did enter their credentials, one of whom had access to all of our social media accounts.

After discovering that at least one account had been compromised, we sent a company-wide email to change email passwords immediately. The attacker used their access to a different, undiscovered compromised account to send a duplicate email which included a link to the phishing page disguised as a password-reset link. This dupe email was not sent to any member of the tech or IT teams, so it went undetected. This third and final phishing attack compromised at least 2 more accounts. One of these accounts was used to continue owning our Twitter account.

The lesson here is: don’t click any links you may be unsure of .

Things with phishing aren’t quite what they used to be.  There was a day when an email would say something like, “Click here to verify your information or your account will be terminated.”  They would often be comprised of bad grammar and spelling, and if you took a second you could see that things looked fishy.  It seems that perhaps cyber criminals are getting smarter, and learning to spell, because it’s not so easy anymore.

The best thing to do is:  don’t click on any links you may be unsure of.

A few sources have articles on ways to tell if an email may be a phishing email.  Microsoft gives info on recognizing phishing in emails, links and even phone calls.  The Return Path blog has some tips, as does wikiHow.  However, if there’s ever any question whether or not a email you receive is not legitimate, the easiest way may be to contact the person who sent it and ask them directly.

The last bit of advice is: don’t click on any links you may be unsure of.

Sorry for being repetitious, but it bears repeating.  And please consider this a warning sign, please heighten your security, question any suspicious emails, and when in doubt don’t click the link!

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers