Despite an ever-changing digital world, email remains one of the most popular forms of communication. As a result, cybercriminals have come up with new and creative ways to scam you out of personal or customer-sensitive information. Today, we’re going to cover how to prevent phishing scams and other forms of cyberattacks by tackling one of the most common ways this happens: website links.
Suspicious links are so common online that most of us are uneasy about clicking on any links in almost any situation. So how do you stay safe without suspecting your mom or business partner of a phishing scam when they send you a link to something like a new recipe or the latest Forbes article? Learn how to read URLs!
You may be thinking “surely this can’t still be happening.” Let’s take a cue from a classic resource: Dilbert.
So what can you be looking for to tell if a URL you’ve been sent is valid? Below are a few strategies to consider:
#1 – The Domain is Misspelled
Altering the spelling of domains is one of the most common ways cybercriminals implement phishing scams. Take a look at the URLs below and see how long it takes you to spot what’s wrong with them:
Number 1 – letter scramble: when letters are scrambled inside longer words, our brains can make the correction without us noticing
Number 2 – letter combos: this one isn’t as common as the others due to the wide number of fonts used today. In this case, the “r” and the “n” look a lot like the letter “m”
Number 3 – number swap: no doubt the “o” vs. “0” issue has caused problems for you in some way before. It’s also a classic method used to mask a shady URL
Number 4 – missing letters: this one doesn’t work on a number of well-known URLs, but for some longer domains, it can be very tricky to spot
#2 – Domain Jumble
This method has become much more popular over the past few years. Ultimately, you should always be looking for the top-level domain in any link before you click. To do this correctly, follow these two rules:
- If there aren’t any single forward-slash characters in the URL (/), then read the top-level domain from left to right
2. If there are single forward-slash characters in the URL (/), then locate which one is the farthest from the right. Starting from that forward slash, read the top-level domain from right to left
We are looking for single forward slashes in the URL. Therefore, the double forward slash in HTTP:// would not apply.
Test it out! Take a look at the URLs below and see if you can see what links are good and what links are bad:
Number 1 -Good: the forward slash is between login and com, so the top-level domain is facebook.com
Number 2 – Bad: the forward slash is between 8675309 and net, so the top-level domain is fblogins.net, not Facebook
Number 3 – Bad: The forward slash is between com and account, so the top-level domain is login.com, not Facebook
Number 4 – Good: the forward slash is between ads and com, so the top-level domain is facebook.com. We’ll explain the meaning of the rest of that URL towards the end.
#3 – Short Links
Short links are fairly common on social media and in some cases, in emails, for a number of reasons. Some of the most common resources for this are Bitly, Rebandly and TinyUrl. Companies and marketers use short links to reduce character counts on social media, track link clicks, etc. Because of their common usage, they have started to be leveraged in cyberattacks as well. Here’s an example of a short link: https://bit.ly/3fh8Dmo
So how do we protect ourselves? Social media platforms carefully scan linked websites for authenticity, quality, and relevance to the ad itself to ensure it’s not misleading or malicious. As for email, we need to be a bit more careful to prevent phishing scams. If the short link is being sent from a source you don’t trust quite yet, then you can copy/paste the short link into online tools that will expand it for you. Some of the most popular sites for expanding short links include:
UTMs & Tracking
Lastly, let’s talk about the mess you often see at the end of links like this:
First and foremost, if you follow the single forward slash method, then you can focus on what matters. In this case, you can see that the top-level domain is Interlaced.io, so the rest doesn’t really matter. For those of you who are curious (although we understand most marketing people are familiar with these), here’s what it all means!
Everything after the question mark – ?utm_source... – is simply for tracking purposes. It really just helps businesses understand where their website traffic is coming from. In this example, here’s the information a company would gather:
- Campaign Source: Blog
- Campaign Medium: Reading URLs
- Campaign Name: Remote IT
- Campaign Content: Reading UTMs
That’s it! UTMs can definitely be used to better mask sketchy URLs, but if you follow best practices laid out in this article, they’re completely harmless.
Put your new skills to the test – Google’s Phishing quiz challenges you to see if you can spot when you’re being phished.
Unfortunately, there are other cybercriminal methods such as “onMouseover” event triggers, Punycode DNS registrations, href attributes, data URLs and more. The larger variety of cyberattacks is why you should always layer best practices with other methods of cybersecurity.
Let us build a comprehensive security program for your business or organization. For more information, please reach out: email@example.com.