Phishing emails are fraudulent emails designed to trick people into providing personal or sensitive information, downloading malware, or clicking on a malicious link.
In my previous blog, we learned about phishing attack. Here are some common types of phishing emails that you should be aware of:
Deceptive phishing: This
is the most common type of phishing email. It involves sending an email that
appears to be from a legitimate source, such as a bank or a popular website,
and asks you to click on a link to update your personal information or login
credentials.
Example:
Spear phishing: This type
of phishing email is targeted towards specific individuals or organizations.
The attacker will research their target and personalize the email to make it
appear more legitimate. For example, the email may appear to be from the
recipient's boss or a trusted colleague, and will ask for sensitive information
or a wire transfer.
Example:
Whaling: Whaling is a type
of spear phishing that targets high-level executives, such as CEOs or CFOs. The
attacker will impersonate someone in a position of authority, such as a board
member, and ask for sensitive information or a wire transfer.
Clone phishing: In clone phishing, the attacker creates a nearly identical copy of a legitimate email, but with a malicious link or attachment. The email may appear to be from a trusted source, such as a bank, and will ask you to click on a link to update your information
Pharming: This type of
phishing attack involves redirecting users to a fake website that looks like a
legitimate one, such as a bank or e-commerce site. The attacker will then
collect personal information or login credentials from the user.
It's important to be aware of
these types of phishing emails and to take steps to protect yourself. Always be
cautious of emails that ask for personal or sensitive information, and never
click on links or download attachments from unknown sources. If you're unsure
about the legitimacy of an email, contact the supposed sender directly to
confirm.
Reference:
https://mysudo.com/2020/03/what-is-whale-phishing/
https://www.msp360.com/resources/blog/clone-phishing/
https://www.valimail.com/guide-to-phishing/phishing-vs-pharming/
https://ciso.uw.edu/education/phishing-examples/
https://www.tessian.com/blog/5-real-world-examples-of-phishing-attacks/
No Comments