Thursday, March 23, 2023

thumbnail

Different types of Phishing email

Phishing emails are fraudulent emails designed to trick people into providing personal or sensitive information, downloading malware, or clicking on a malicious link. 

In my previous blog, we learned about phishing attack. Here are some common types of phishing emails that you should be aware of:

Deceptive phishing: This is the most common type of phishing email. It involves sending an email that appears to be from a legitimate source, such as a bank or a popular website, and asks you to click on a link to update your personal information or login credentials.

Example:


Spear phishing: This type of phishing email is targeted towards specific individuals or organizations. The attacker will research their target and personalize the email to make it appear more legitimate. For example, the email may appear to be from the recipient's boss or a trusted colleague, and will ask for sensitive information or a wire transfer.

Example: 


Whaling: Whaling is a type of spear phishing that targets high-level executives, such as CEOs or CFOs. The attacker will impersonate someone in a position of authority, such as a board member, and ask for sensitive information or a wire transfer.



Clone phishing: In clone phishing, the attacker creates a nearly identical copy of a legitimate email, but with a malicious link or attachment. The email may appear to be from a trusted source, such as a bank, and will ask you to click on a link to update your information



Pharming: This type of phishing attack involves redirecting users to a fake website that looks like a legitimate one, such as a bank or e-commerce site. The attacker will then collect personal information or login credentials from the user.



It's important to be aware of these types of phishing emails and to take steps to protect yourself. Always be cautious of emails that ask for personal or sensitive information, and never click on links or download attachments from unknown sources. If you're unsure about the legitimacy of an email, contact the supposed sender directly to confirm.

Reference: 

https://mysudo.com/2020/03/what-is-whale-phishing/

https://www.msp360.com/resources/blog/clone-phishing/

https://www.valimail.com/guide-to-phishing/phishing-vs-pharming/

https://ciso.uw.edu/education/phishing-examples/

https://www.tessian.com/blog/5-real-world-examples-of-phishing-attacks/

No Comments