10 Common Types of Phishing Attack

Types of Phishing Attack that You Should Know

Phishing is a type of cyber crime in which a fraudster creates a trusted online source to get the personal information of the victim. Like username, password, credit card number, and more.

 

In this article, we are going to discuss the 10 most common Phishing attacks that you should be aware of.

 

Types of Phishing Attack

 

1. Email Phishing

Email phishing is a technique of attack used by hackers and other cybercriminals. This is one of the most common ways in which a person can be hacked. In an email phishing attack, the scammer sends multiple emails to the victim pretending to be a legitimate entity. Scammers use logos, images, signatures, etc. to make the email appear legitimate. Scammers also include links that redirect to malicious sites or download software that contains viruses. And the virus they send to your device can hack your device's sensitive information.

 

2. Spear Phishing

A spear-phishing attack is a type of attack in which an attacker targets a specific individual or organization and is attacked by sending fake emails or instant messages in the hope that something good will come from it. It differs from hacking because the latter is an attempt to trick a computer system into giving sensitive information (among other things).

 

3. CEO Fraud / Business Email Compromise

In short, CEO fraud is one in which you are told that you will be made CEO, manager, etc. of the company, particularly those who work in the accounting or finance department, to convert money or goods into an alternate bank account. This is usually done via email or phone call.

 

4. Clone Phishing

Clone phishing is a type of cyber attack in which the attacker modifies a valid email/website and replaces the original link with a fake one in order to trick the recipient into providing personal information like your email ID, password, etc.

 

5. Domain Spoofing

Domain spoofing is a common type of phishing scam, and it occurs when an attacker tries to use a company's domain name to imitate a legitimate company or one of its employees. An attacker does this by sending emails with false domain names but appear legitimate, or by setting up websites with slightly changed characters that are read as correct.

 

6. Evil Twin

Evil Twin Attack is a Phishing Attack in which a Hacker Establishes a Fake Wi-Fi Network that looks like a legitimate access point to steal victim's sensitive details. This attack can be carried out as a man-in-the-middle (MITM) attack. Most victims of such attacks are ordinary people like you and me.

 

7. Smishing

Smishing is a type of cyber attack that uses deceptive text messages to trick victims into installing malware or sharing valuable information to pay money. Basically, cyber attackers extract phone numbers of targets and send across text messages that prompt them to either call back on a number or click on a link. Once the target follows step-by-step instructions, he/she ends up revealing his sensitive information. We have discussed smishing attack in our previous article, you can check that out.

 

8. Vishing

Vishing is a form of attack that attempts to trick victims into giving sensitive information or money over the phone. During a Vishing phone call, a scammer uses social engineering to get you to share financial information. The scammer may claim to represent your bank employee that your account has been compromised or offer to help you install any software, but it is most likely malware. If you download these apps, they steal your personal information and your device can be hacked.

 

9. Pharming

Pharming, a portmanteau of the words "phishing" and "farming". Pharming is a technique, using which attackers redirect traffic from a legitimate website to a fraudulent website with the purpose of spreading malware or stealing sensitive data from the victims.

 

10. Angler Phishing

Angler phishing is the latest phishing scam fully being used by scammers on social networks like Twitter and Facebook that pose customer service representative balling up complaints victims to hand over confidential information. Sometimes they deliver fake service messages that aim to infect your PC with malware when you're seeking customer service support via Twitter. Be aware of getting caught on the hook of an angler phishing scam.

 

So these were some of our common phishing scams today. If you like the article, please share it with your friends and family and share your thoughts in the comment section below.

Leave a Reply

Also Read


Join GraspHack Family!

We will never spam you.

Be a part of our ever growing community.