Phishing
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
The information is then used to access important accounts and can result in identity theft and financial loss.
Phishing Attacks
Phishing attacks use deception to steal sensitive data or credentials.
Categories of Phishing Attacks
Email Phishing: Generic fraudulent emails impersonating trusted entities (e.g., banks, Amazon).
Spear Phishing: Highly targeted emails tailored to specific individuals or organizations.
Whaling: Targets executives (e.g., CEOs) with sophisticated scams.
Vishing (Voice Phishing): Phone calls pretending to be tech support, banks, or government agencies.
Smishing (SMS Phishing): Malicious links or requests sent via text messages.
Pharming: Redirects users to fake websites via DNS or host file manipulation.
Clone Phishing: Replicates a legitimate email but replaces attachments/links with malicious ones.
Angler Phishing: Exploits social media platforms (e.g., fake customer service accounts).
Business Email Compromise (BEC): Impersonates executives to trick employees into wire transfers.
Search Engine Phishing: Fake websites ranked in search results (e.g., fake login portals).
Top 20 Phishing Techniques
Technique
Description
1. Deceptive Links
Fake URLs mimicking legitimate sites (e.g., paypa1.com
vs. paypal.com
).
2. Attachment Malware
Emails with infected attachments (e.g., PDFs, Word docs).
3. Credential Harvesting
Fake login pages capturing usernames/passwords.
4. QR Code Phishing (Quishing)
Malicious QR codes redirecting to phishing sites.
5. Evil Twin Wi-Fi
Fake Wi-Fi networks mimicking legitimate hotspots.
6. Malvertising
Malicious ads redirecting to phishing sites.
7. Watering Hole Attacks
Compromising websites frequented by targets (e.g., industry forums).
8. Session Hijacking
Stealing browser cookies to impersonate logged-in users.
9. Ransomware Phishing
Phishing emails delivering ransomware (e.g., "Invoice attached").
10. CEO Fraud
Fake emails from "executives" requesting urgent payments.
11. Fake Invoice Scams
Bogus invoices with payment instructions to attacker accounts.
12. Gift Card Scams
Requests to purchase gift cards for "rewards" or "urgent needs."
13. Tax Fraud Phishing
Impersonating tax agencies (e.g., IRS) to steal financial data.
14. Urgency Tactics
"Account suspended" or "security alert" emails pressuring quick action.
15. Typosquatting
Registering domains with typos (e.g., facebok.com
).
16. Tabnabbing
Changing inactive browser tabs to phishing pages.
17. Deepfake Audio/Video
AI-generated fake calls/videos impersonating trusted figures.
18. Social Engineering
Manipulating victims via psychological tactics (e.g., fear, curiosity).
19. Fake Job Offers
Phishing through fraudulent recruitment portals or emails.
20. Brand Impersonation
Mimicking logos, fonts, and email templates of trusted brands (e.g., Microsoft).
Key Takeaways
Most Common: Email phishing, deceptive links, and credential harvesting.
Most Dangerous: BEC, ransomware phishing, and deepfake impersonation.
Defense Tips:
Use multi-factor authentication (MFA).
Train employees to spot phishing red flags (e.g., urgency, mismatched URLs).
Deploy email filters and DNS security tools.
Verify requests via secondary channels (e.g., phone calls). Phishing evolves constantly—stay informed about emerging tactics to mitigate risks.
MISC
Mailing Service
Phishing Frameworks & Resources
Phishing Email Templates
Email (OSINT/Recon)
Web Scraping Tools and Resources
Social Media
LinkedIn
Facebook
YouTube
Instagram
Twitter
Discord
Snapchat
Image & Photo
Phone Numbers
Files
Archives
Last updated