Loading…

Fraud & Scam Protection

How to Recognize and Respond to Phishing Attacks Targeting Non-profits

August 18, 2024 GrantFunds Editorial Team

How to Recognize and Respond to Phishing Attacks Targeting Non-profits

Why Non-profits Are Prime Phishing Targets

Phishing attacks — deceptive communications designed to trick recipients into revealing credentials, clicking malicious links, or transferring funds — disproportionately target non-profit organizations for several reasons that organizational leaders need to understand. Non-profits typically have limited cybersecurity investment compared to corporate organizations of similar size, meaning their digital defenses are weaker. Their staff often includes people without extensive technology training who are more likely to respond to convincingly crafted phishing messages. Their financial processes — grant applications, donor payments, beneficiary disbursements — involve regular communications with external parties that create natural cover for spoofed communications. And their organizational culture of helpfulness and responsiveness to partner requests creates a social engineering vulnerability that sophisticated phishing attackers deliberately exploit. Understanding why your organization is a target is the first step toward building defenses that match the actual threat environment.

Spear Phishing: The Targeted Threat

Generic phishing attacks — mass emails claiming to be from well-known brands and asking recipients to verify account information — are well-known and increasingly filtered by email security systems. The more dangerous current threat is spear phishing: highly targeted attacks crafted to appear to come from a specific, trusted source known to the recipient, referencing real organizational details (staff names, ongoing projects, funder relationships, partner organizations) that make the communication appear completely legitimate. Attackers conducting spear phishing campaigns research their targets in advance through organizational websites, social media, LinkedIn profiles, and even press releases to construct messages that are indistinguishable from genuine communications. A message appearing to come from your executive director, referencing a specific ongoing grant application, and asking the finance officer to make an urgent wire transfer to a new vendor account is a spear phishing attack — and it succeeds because every element except the malicious request appears authentic. Training all staff to recognize this pattern — particularly the combination of urgency, financial request, and request to bypass normal authorization procedures — is one of the highest-value cybersecurity investments a non-profit can make.

Advertisement
Discover thousands of grant opportunities

Business Email Compromise in Grant Processes

Business email compromise (BEC) — a specific phishing attack vector in which attackers impersonate executive leadership or trusted financial contacts to authorize fraudulent wire transfers — has caused billions of dollars in losses across all sectors, including significant losses at non-profit organizations. In the grant context, BEC attacks commonly impersonate either non-profit executive directors directing finance staff to transfer funds urgently to a fictional vendor or emergency account, or grant funders directing non-profits to update their banking information with a fraudulent account before the next grant disbursement. Both variations exploit the trust that exists within grant funding relationships and the authority differential between the apparent sender and recipient. Defending against BEC requires: a strict policy requiring out-of-band verification (telephone confirmation using a previously known number, not a number provided in the suspicious email) for any bank transfer or change in payment instructions, regardless of the apparent seniority of the requestor; organizational culture where finance staff feel empowered to delay and verify suspicious requests even from apparent executives without fear of retaliation for raising concerns.

Technical Defenses and Staff Training

While staff training is the most important element of phishing defense, technical controls provide a valuable additional layer of protection that reduces the volume and effectiveness of phishing attacks reaching staff in the first place. Email authentication standards including SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) make it significantly harder for attackers to spoof your organization's email domain in attacks targeting your partners or funders. Email filtering services can identify and quarantine likely phishing messages before staff see them. Multi-factor authentication (MFA) for all organizational email, financial system, and cloud storage accounts significantly limits the damage from successful credential theft even when phishing attacks partially succeed. Regular phishing simulation exercises — in which the IT support team or an external cybersecurity service sends test phishing emails to staff to assess response rates — are one of the most effective training methods available, because they create realistic practice with actual consequences (a training conversation rather than a financial loss). The combination of technical controls and trained, skeptical staff creates a defense in depth that substantially reduces both the probability and the consequences of successful phishing attacks.

Found this helpful? Share it: