Phishing is the act of using fraudulent emails in an attempt to gain sensitive information about a victim.
A hacker sends an authentic-looking email from a trusted authority, such as a bank, that asks the recipient to download an attachment or click a link. If the victim downloads the attachment, it installs a virus on the victim’s computer (e.g., a keylogger that gains personal data). If the victim clicks on the link, the user is redirected to an authentic-looking website that asks for their credentials. Once the user clicks next, the hacker receives the information and redirects them to the actual webpage.
With the advancements in technology and the introduction of new tools, like phishing kits, these attacks are as widespread today as they were when they first emerged.
1. Email phishing scam
An attacker sends out hundreds of authentic-looking emails, as seen in the example below. These emails do not contain any personal information. The hacker believes that a handful of people will fall prey to such techniques and, therefore, their data can be gathered. The hacker spends some time trying to generate an email that mimics the original email as closely as possible. This can trick even the most careful users. The message is usually marked urgent and, therefore, the user will act immediately without confirming that the email is actually from the bank.
2. Spear Phishing
Spear phishing is similar to email phishing in that hackers send an email to the victim. These emails, however, are more targeted and may contain the name and information of that particular user. This builds credibility and, consequently, the user is more likely to fall prey.
3. Whaling
Whaling is similar to an email phishing attack except that it targets high-ranking employees (e.g., CEOs and other high-value targets). These emails claim to require immediate action and are from other corporate or government agencies, which usually ensures that a CEO will click on the attachment and become a victim.
The following image shows an example of a phishing email and the ways to identify its authenticity: