What is Clone Phishing? and How It Work?
What is Clone Phishing?
Clone phishing is a type of phishing attack where the hacker copies a valid email that is sent from a trusted organization and then the hacker adds a link to the fake website so that you people visit that fake website and enter your sensitive information By which hackers can steal your information.
In clone phishing, attackers can view victims’ previous legitimate conversation and clone them, making an almost identical copy, and then changing an attachment or linking it to something malicious. For example, hackers can clone the conversation and attach a malicious attachment, with the name of the legal file that was sent in the past. This way the recipient will not realize that it is something suspicious.
How Does Clone Phishing Look Like?
- Sent from an email address spoofed to appear to come from the original sender.
- The attachment or link within the email is replaced with a malicious version.
- It may claim to be a resend of the original or an updated version of the original.
How to Detect Clone Phishing Website?
1. These emails are harder to look exactly legitimate. The first cue is a generic address, email@example.com. You would never see this from a legitimate email.
2. If you hover your mouse over the button it wants you to press, you see that this is not talking you to an ebay.com site, but rather an external site that will more than likely try to steal your eBay credentials.
3. The fake website always incorrect the company name, Grammar, and phrases will have a mistake in the text.
How Does Clone Phishing Work?
1. Targeting all users
2. Fake but similar to a legitimate email created and attach malware
3. Email passes through the spam filter
5. A link is click or attachment opened
6. Opened website causes credentials to be stolen
7. The hacker uses a backdoor to steal information
How to protect yourself from clone phishing?
1. Always check and study the URL before giving any sensitive information to the website.
2. Check the address bar for the organization detail.
3. Check the website address isn’t a homograph.
4. Don’t give any sensitive information to the website.
5. Change the password regularly.
6. Check the secure lock.
7. Use common sense, read email very carefully and question yourself. Is this email asks me to enter my sensitive information?
I hope you liked the article. If you like it then please share it with your friends and family so that no one gets caught in such scams and attacks and do share your thoughts and experiences in the comment section below. And also check out the Phishing and Fraud series in which we discussed several types of phishing attacks and online fraud
Join GraspHack Family!
We will never spam you.
Be a part of our ever growing community.