You are on page 1of 2

5 most common Types of

Phishing Attack

1. Email phishing
The majority of phishing attacks are delivered via
email. The thief will register a bogus domain that
looks like a legitimate organization and send
thousands of generic requests. In some cases, the fraudsters create a unique
domain that includes the legitimate organization's name in the URL, such as
by placing "r" and "n" next to each other to create "rn" instead of "m."

2. Spear phishing
There are two other, more sophisticated, types of phishing involving email. The
first, spear phishing, describes malicious emails sent to a specific person.
Criminals who do this will already have some or all of the following
information about the victims:
Their name; RULES OF NETIQUETTE:
Place of employment;
Job title;

Watch Out for


Email address; and
Specific information about their job role. Phishing is a type of social engineering
3. Whaling in which an attacker sends a fraudulent
Whaling attacks are more subtle and targeted,
primarily aimed at senior executives. In this message in order to trick a person into Phishing
Scams
case, tricks like fake links and malicious URLs
are useless because criminals are
disclosing sensitive information. It can
impersonating senior staff. be used by cybercriminals to install
4. Smishing and vishing malicious software on the victim's
Smishing entails sending text messages, infrastructure, such as ransomware, or
whereas vishing entails having a phone Christine Joyce S. Dela Cruz
to steal financial and banking
conversation. Alerts from your bank alerting
you to suspicious activity are a common information.
11ABM-B
smishing pretext.
Every 20 seconds, a new phishing site is
5. Angler phishing created on the internet. Phishing attacks
Fake URLs, cloned websites, posts, and instant messaging can all be
used to trick users into disclosing sensitive information or
cause 90% of corporate security breaches.
downloading malware. Criminals, on the other hand, can create Every year, small and medium-sized
highly targeted attacks using the data that people willingly post on
social media. Criminals can use social media to trick people into
businesses lose an average of $1.6 million
clicking on links, including malicious links. while recovering from a phishing attack.

What is Phishing Scams?


How To Recognize Common Indicators of a 5. Suspicious Attachments
A common indicator of a phishing attempt is a

Phishing Phishing Attempt suspicious attachment. The bad guys often use
phishing emails to send these attachments
Scammers frequently use phishing attacks to try to steal your 1. Grammar and Spelling Errors because they know many people are curious
passwords, account numbers, or Social Security numbers. They Phishing emails are frequently written by enough to open them and click on whatever links
could gain access to your email, bank, or other accounts if they untrustworthy third parties with no proofreading or buttons they contain.These attachments may
obtain that information. Alternatively, they may sell your be a Word document or zip file, for example. But if
or editing process. The presence of grammar and
information to other scammers. Every day, scammers launch
thousands of phishing attacks. spelling errors in the email content is a common you open the attachment and it’s malicious, it
indicator of a phishing attempt. This means that could infect your computer with malware that
Four Ways To Protect their servers do not have spell check features to steals your login credentials. If you get an email
check for spelling and grammar errors. with a suspicious attachment, don’t click on it!
Yourself From Phishing 2. Unfamiliar Tone 6. The Recipient Never Started the
1. Protect your computer by using security software. Set The unfamiliar tone of an email is one indication
the software to update automatically so it will deal with
Discussion
that a phishing attempt is underway. It’s
any new security threats. Phishing attempts are often initiated by scammers
important to note that there are several ways to
2. Protect your cell phone by setting software to update or hackers who send emails to random people and
detect this, so it’s important to be aware of the
automatically. These updates could give you critical hope that someone falls for them. If you didn’t
different types of unfamiliar tones. One way to
protection against security threats. initiate the conversation, then the email may be a
spot an unfamiliar tone is by noticing that the
3. Protect your accounts by using multi-factor phishing attempt.
email feels like it’s been created by someone who
authentication. Some accounts offer extra security by
doesn’t know you very well.
requiring two or more credentials to log in to your 7. Abnormalities in Email Addresses,
account. This is called multi-factor authentication. The
extra credentials you need to log in to your account fall
3. Receiving Email at an Unusual Time Hyperlinks, and Domain Names
If you receive an email at a time that is unusual for Phishing emails are often sent from an address that
into three categories:
you to be receiving emails from the sender, this is is not consistent with the domain name or website
something you know — like a passcode, a PIN, or the
answer to a security question. another indicator. of the organization that is being impersonated. It is
something you have — like a one-time verification also a good idea to check that the originating email
passcode you get by text, email, or from an 4. Sense of Urgency addresses match previous correspondence. If there
authenticator app; or a security key Another sign that an email is malicious is if it are hyperlinks in the email, hover over each one to
something you are — like a scan of your fingerprint, threatens you or makes you feel like you have to see what URL it will take you to.
your retina, or your face act quickly. This could be a warning about your
Multi-factor authentication makes it harder for scammers account being suspended, for example, or pressure 8. Email Coded Entirely as a Hyperlink
to log in to your accounts if they do get your username to respond within 24 hours or risk compromising Email coding is a new practice among fraudsters and
and password. your security. If the message makes you feel like scammers. When an email is coded entirely as a
4. Protect your data by backing it up. Back up the data on something bad will happen if you don’t respond hyperlink, the whole email becomes clickable. This
your computer to an external hard drive or in the cloud. quickly, this may be a phishing attempt. means when a user clicks anywhere inside the email
Back up the data on your phone, too. message it takes them to the imposter page.

You might also like