Cybercheck  >  Blog  >  Phishing explained: Understanding the digital danger
Phishing explained: Understanding the digital danger

Phishing explained: Understanding the digital danger

Phishing explained: Understanding the digital danger
Ilaria MunariMon Oct 28 20244 min read

Phishing is where cyber attackers masquerade as legitimate entities to steal information.

In a phishing attack, the victim receives a message that appears to come from someone they trust. For example, their bank. The aim is to trick them into handing over information or installing malicious software. The stolen information can then be sold on the dark web or used to break into the victims accounts or systems.

As technology advances and more of our daily activities move online, learning to recognize and avoid phishing attacks is vital for our safety.

How phishing evolved

The term phishing was coined in the mid-1990s to refer to scams thatfishedfor passwords or financial data. These early attacks were unsophisticated, relying on generic messages with broad targets.

As the publics awareness of phishing grew, attackers developed a more sophisticated approach known as spear phishing. A spear-phishing attack targets specific individuals or organizations using personalized information.

Todays phishing attacks use advanced social engineering tactics and technology. Attackers may use generative AI to write more convincing messages and use the software toolsets known as phishing kits to create and send messages faster and more efficiently. They can also use social media, and compromised personal information, to gather information about potential targets.

Integrating malicious links and attachments has also become more sophisticated, making detection more challenging.

Common types of phishing attacks

Email phishing

Email phishing is still the most prevalent form. The attacker sends an email pretending to be from a reputable company, such as a bank. Typically, the message warns the recipient about a problem they must urgently address by clicking a link. The link will take them to a fake website where theyll be prompted to enter their login credentials or other personal information.

Spear phishing

Spear phishing attacks target specific individuals or organizations. The attackers research their target to create personalized and believable messages. For example, they can send an email pretending to be from the victims colleague or their line manager.

Whaling

Whaling targets high-profile individuals, such as C-suite executives, to exploit their influence and privileged access. For example, a Chief Financial Officer receives a fake message from their organizations CEO. The message requests an urgent transfer of funds for a confidential purpose.

Clone phishing

A clone phishing attack duplicates a legitimate email that the victim has previously received. For example, a copy of the tracking email for a package theyre expecting. The copy replaces legitimate attachments or links with malicious ones.

Smishing and vishing

Smishing is phishing by SMS or text message. Vishing is phishing by voice, via a phone call or voicemail.

Smishing and vishing messages use similar tactics to phishing emails while sidestepping spam filters. They take advantage of peoples willingness to trust text messages and phone calls more readily than emails.

How to protect against phishing

The primary way to protect your organization against phishing attacks is to teach everyone how to recognize them. Introduce organization-wide training. Strive to create a security awareness culture where everyone understands that they have a role in keeping your organization safe.

Here are some key warning signs that an email may be a phishing attack:

  • An unfamiliar or external sender: Be careful with emails from senders you dont know, who dont usually contact you, or who are outside your organization.

  • Surprise: The email arrives unexpectedly with a request to provide personal information.

  • Urgency: The email pressures you to act now. For example, suspicious activity has been detected on your account so you must confirm your password immediately.

  • Generic greetings: Companies today personalize their customer communications. An email that opens with a generic greeting likeDear sir or madamcould be a scam.

  • Mistakes: If an email contains obvious spelling or grammatical mistakes or fuzzy, low-quality graphics, it could be fake. Genuine companies today dont make these kinds of errors.

  • Strange domain names or addresses: The senders address doesnt include your banks usual domain name, such as MyBank.com. Instead, it may use a lookalike domain, such as MyBaink.com. Or it may replace letters with numbers of special characters, such as MyB@nk.com. Before you click a link, hover your mouse over it to see where it leads. If anything seems wrong, dont click.

The golden rules to avoid falling for a phishing attack are:

  • Always be vigilant.

  • Always think before you click a link or open a file.

  • If in doubt, call the supposed sender at their usual number to confirm that the message is genuine.

Cybercheck can help protect your organization

Safeguarding organizations against modern forms of phishing requires a combination of awareness and technology.

At Cybercheck, we constantly monitor forums where cybercriminals buy and sell stolen personal information. If cybercriminals are trading data about you or your organization, we alert you right away so you can take immediate action to avoid being profiled and targeted by them.

Are you exposed?

Find out how much data about you and your organization's employees is exposed on the dark web — credentials, credit card records, recent data breach exposures, malware infections, and more.