Gone Phishing: What I Learned from an Attempted Hack on My Account
Lesson one: Trust your gut.

I'm going to be honest with you. I've always taken for granted the warnings laid out by cybersecurity experts when it comes to phishing attacks. In the past, I've never had trouble distinguishing a real email from one that I believed to be from someone trying to steal my identity.
Just like everyone else, I've gotten my fair share of notes from Nigerian princes looking to share their wealth, or friends stranded in remote locations with no money in need of my assistance. Naturally, I delete these feeble attempts without pause. In fact, most of the time, they don't even make it through the various filters that have been set up to protect me by my email providers.
And while I understood hackers don't worry about personalizing these attacks because they are just trying to cast a wide net, I still was always amazed when I'd hear about people getting hacked this way. Who could be so stupid to fall for these poorly-constructed scams?
Well, apparently me.
Near Miss
Maybe it was the jet lag from flying back from Chicago earlier in the day (Can you get jet lag from only losing one hour?), or maybe—more likely—it was the hangover I was still nursing from the Super Bowl, but an email that landed in my work inbox Monday afternoon caught my attention. It read as follows:
SUBJECT: New sign-in from Chrome on Mac
Several attempts to login to your account ID (dan.defrancesco@incisivemedia.com)
with incorrect login details was blocked.
You are receiving this email as you are subscribed
to office 365.
To keep your account secured, it is important you
Validate your ID.
We may temporarily limit your account if you fail
to act.
Outlook Team
Office 365
I don't know what it was about note that gave me pause, but I seriously considered hitting the hyperlink ("Validate your ID"). Granted, it only took about two minutes to recognize the formatting was all wrong and the email came from an account that wasn't linked to Outlook or my internal technology team, but there was a moment of hesitation.
Now, before all the chief information security officers (CISOs) I've dealt with over the years start crafting emails to me about how I should have been paying better attention to them during our talks, let me add that the wisdom they imparted to me actually stuck. At the end of the day, it was the golden rule of phishing that had been drilled into my head over the years that saved me: Never give out your personal information if you are at all suspicious of the email.
Changing My Tune
And although I didn't fall victim to this particular attack, it did make me recognize my own mortality when it comes to phishing attacks. For a long time, I never understood how people at financial firms who are far smarter than me could fall for stuff like this.
But then I put myself in their shoes. While I'm simply a lowly journalist, these are high-ranking executives at some of the most powerful firms in the world. They are extremely busy around the clock. I could easily see how an email—albeit crafted slightly better than the one sent to me—could lead an executive in a rush to send along the necessary information without a second thought.
I know sending out fake phishing emails is common practice among financial firms' cybersecurity teams, and now I can see why it's such a good practice. With so many email scams getting caught in my junk folder, it was nice that one got through to test out all those cybersecurity protocols that I've learned over the years.
That is, of course, assuming this was actually a phishing scam. Hopefully my email hasn't actually been comprised. If so, I swear I'm not actually in Vietnam in need of money.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: https://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Emerging Technologies
Larry Fink: ‘We need to be tokenizing all assets’
The asset manager is currently exploring tokenizing long-term investment products like iShares, with an eye on non-financial assets down the road.
Examining how adaptive intelligence can create resilient trading ecosystems
Researchers from IBM and Wipro explore how multi-agent LLMs and multi-modal trading agents can be used to build trading ecosystems that perform better under stress.
Waters Wavelength Ep. 335: Some tech talk...kinda
This week, Wei-Shen and Tony talk about some recent events making headlines.
Moody’s exploring blockchain’s impact on digital bond ratings
Blockchain and crypto were meant to eliminate conventional finance’s risks, but Risk Live North America panelists said such risks have not been reduced, and new ones have been introduced.
S&P Global partners with IBM, Eventus launches Frank AI, Tradeweb expands algo execution abilities, and more
The Waters Cooler: Arcesium makes waves with Aquata Marketplace, NYSE Cloud flows into Blue Ocean Technologies, and more in this week’s news roundup.
Is market data compliance too complex for AI?
The IMD Wrap: Reb looks at two recent studies and an article by CJC, which cast doubt on AI’s ability to manage complexity.
LSEG unveils tick history data with AI-enhanced capabilities
Tick history data with AI-enhanced capabilities and the benefits to LSEG Data & Analytics’ clients
Can AI be the solution to ESG backlash?
AI is streamlining the complexities of ESG data management, but there are still ongoing challenges.