Phishing Recognition
Phishing Recognition
Phishing is an attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information. Phishing attempts are often generic mass messages, but the message appears to be legitimate and from a trusted source (e.g. from a bank, courier company).
Methods
Spear
phishing: A personalized attack that targets you
specifically. The message may include personal details about you, such as your
interests, recent online activities, or purchases.
Whaling: A
personalized attack that targets a big “phish” (e.g. CEO, executive). A scammer
chooses these targets because of their level of authority and possible access
to more sensitive information.
SMiShing: A
phishing attack using SMS (texts). A scammer may impersonate someone you know
or pose as a service you use (e.g. Internet or mobile provider) to request or
offer an update or payment.
Phishing Attack Breakdown
Step 1: The Bait
Tailored Messages: Scammers create emails or messages that appear to be from legitimate sources (e.g., banks, popular services).
Information Gathering: They gather details about the target from social media or public profiles to personalize the message.
Vishing: In voice phishing, scammers use robocalls to deliver fraudulent messages.
Step 2: The Hook
Urgency and Trust: The message often claims there’s an urgent issue requiring immediate action, enticing the victim to respond.
Fake Websites: If the victim clicks a link, they’re directed to a counterfeit site to input sensitive information.
Malicious Attachments: Opening attachments can execute malware on the victim's device.
Phone Interaction: In vishing, pressing a number may connect the victim to the scammer directly.
Step 3: The Attack
Stolen Credentials: Once scammers access the victim's accounts, they can send phishing emails to contacts or exploit privileged access if the victim is in IT.
Malware Installation: Scammers may install malicious software to control devices, steal data, or hold files for ransom (ransomware).

Comments
Post a Comment