Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

In an effort to further enhance our company’s cyber defenses, we want to highlight a common cyber-attack that everyone should be aware of – whaling. 

Whaling is a type of scam aimed at getting an users to transfer money or send sensitive information to a hacker acting as a trusted source via email. Whaling is extremely easy to fall for and can result in significant financial losses.

These e-mails can be difficult to catch because they appear to be harmless, and have a normal, friendly tone and no links or attachments. They will appear to come from a high-level official at yours or another company, typically the CEO or CFO, and often ask you to disclose sensitive information or initiate a wire transfer.

A few things to watch out for in a typical whaling attempt:

  • Doppelganger: Whalers may utilize fake e-mail domains that look similar to our domain. Watch out for things like: [EMAIL]@[VARIATION ON COMPANY DOMAIN]. This can include small typos that our minds often over look.
  • A hurried tone: Whalers will often ask you to send money immediately, stating that they’re busy or in a meeting, and can’t do it themselves.
  • E-mail only: Since whaling relies on impersonating an employee via a fake, yet similar email address, they will ask you not to call with questions and only reply through e-mail.

If you receive an e-mail that you suspect to be a whaling attempt, or if you are unsure of an e-mail’s legitimacy, please do not respond. Instead, forward the email to IT at Please be sure the subject reads something like "POTENTIAL WHALING  EMAIL”.

Remember, nobody from [COMPANY NAME] will ever request personal information, usernames, passwords, or money from you via email.

Thanks again for helping to keep our network, and our people, safe from these threats.

This article drafted using a free template from Focal Point.