Phishing attacks are common and can be triggered from unexpected sources while being hard to track down the source.

Top 10 usually occuring phishing attacks are:

  • Deceptive phishing:

    It is a form of phishing where hackers sends you email pretending to be company or bank you are associated with and asking you for account verification and authentications.

  • Email phishing:

    The email may look real and legit on the first glance whereas the receipent is unaware of the practice they are tricked into opening the mail and responding, it which leads into compromise of critical and personal information.

  • Spear phishing:

    Spear phishing is target based attack and is specifically design for a particular group of people such as company and its employees and sending them personalized emails which may appear to have been generated from legit source.

  • Whaling:

    This type of phishing is commonly targeted at executive or decision making positions such as CEO,CFO, Directors and Managers. Successful whaling attack can reveal sensitive information such as company project details and financial assests.

  • HTTPS phishing:

    Https phishing is usually done by sending messages which may look like coming from legitmate sources and the user is tricked into clicking the links sent in the mail which takes them to a unsecured website which looks like a secure and legit website , where the user uses his personal information.

  • Pharming:

    The hackers decieves the user using malicious code and redirecting the user to a spoofed website attempting to install software or steal the information.

  • Vishing:

    Vishing is done by hackers over the phone by calling unsuspecting users pretending to be from genuine company tricking them into divulging personal and critical information.

  • Smishing:

    Hackers use the SMS services for this type of attack, Sending text messages over the phone asking for personal information or bank details. Leading to compromise accounts.

  • Clone phishing:

    The hackers copy emails from legit sources and then add malicious links in the mail and these emails are then sent out to the target groups as a legit mail coming from a company, Leading gulible users into clicking the link.

  • Evil twin phishing:

    It usually occurs on wifi networks impersonating to be real ones and when the unsuspecting user connects to such network it exposes their data , device and personal information to bad actors.

Leave a Reply

Your email address will not be published. Required fields are marked *

Index