Phishing broadly refers to cyber attacks that exploit human psychology to lure individuals into sharing some sensitive information or actions that compromise their security. Phishing techniques, however, have evolved over the years and continue to become more sophisticated and personalized to specific targets. Here are some of the well-known phishing techniques:
- Email Phishing: A common method of phishing is through email. This occurs when someone receives a fraudulent email that appears to be from a legitimate institution, such as a bank or a reputable online service. The email typically contains an urgent message prompting the recipient to click on a malicious link or provide sensitive information like passwords or credit card numbers. Most email phishing relies on social engineering to create a sense of urgency or fear.
- Spear Phishing: With spear phishing, the hallmarks of phishing become more sophisticated and involved. Typically, this kind of phish attack targets a particular person or organization. For example, general email phishing is most commonly sent to wide groups of people; it distinguishes itself from spear phishing in that it makes use of personalized messages, based on facts and other targets are people whose information has been previously gathered-from their social media profiles or previous interactions within the organization. It makes them highly likely to trick victims using schemes of trust and familiarity into revealing very sensitive information.
- Whaling: Whaling, as a category of spear-phishing, is directed specifically to high-valued targets of an organization, such as executives or senior management, who are commonly referred to as “big fish.” Such attacks are designed as highly customized ones for the most part, and impersonation of trusted contacts or business partners often goes with it. The big whaling attacks can result to significant losses and even data breaches because of the possible access such an individual has on sensitive data within the company.
- Vishing (Voice Phishing): Vishing is the form of phishing where they do not send the emails but call up a person. The attacker impersonates a representative of an organization and tries to extract personal information using various social engineering tactics. Flushing out personal details from a victim’s head about them becomes easier with this method in much more general cases of phishing techniques, as victims feel secure with the direct voice.
- Smishing (SMS Phishing): Smishing is phishing via SMS text messages. Attackers seemingly send deceptive texts that mostly have links to fraudulent websites for harvesting personal information or installing malware on the mobile device. Smishing, phishing via mobile devices, has been gaining importance as usage increases among people.
- Clone Phishing: Clone phisher would just make a copy of the email sent legally and instead of the original links insert malicious ones. Such an attack could also indicate that an earlier email in the inbox would have had an attachment of that type because it would be assumed damaged and then “here’s a new link to the form”-leading bad websites. This will take advantage of the fact that the victim is familiar with the clear content of past communications.
- Business Email Compromise (BEC): BEC is indeed a complex fraud against businesses. It imitates an executive or trusted partner with the ultimate motive of convincing employees into transferring money or sharing the confidential information. Other major features of this scamming scheme are lengthy researches about a target organization and its personnel. Thus, the threat becomes greater.
- Social Media Phishing: The increased use of social media by perpetrators to promote phishing has meant developing fake profiles or pages that resemble a very legitimate organization and engaging such through private messages or posts, designed to extract personal information from such victims.
- Website Spoofing: Website spoofing is said to be the act of fabricating counterfeit websites which tend to look like those of others for the purpose of fooling users so that they could enter their credentials or other sensitive details. Attackers may employ similar URLs and design features that the victims do not even realize they are on such a site.
In conclusion, understanding these various techniques is crucial for both individuals and organizations in order to implement effective cyber security measures against such threats.