6 Phishing Techniques Cyber Criminals Use

Phishing is a social engineering scam whereby intruders seek access to information or information systems by posing as a real business or organization with legitimate reason to request information or provide you with hyperlink or file attachment.  Phishing emails look real and often contain the organization’s logo and trademark.  The Uniform Resource Locator (URL) in the email can resemble the authentic URL web address; like for instance, “twitters.com” that has a very minor spelling variation from “twitter.com” that can be easily overlooked. Phishing emails or texts quite often alert you to a problem with your account and ask you to click a link and provide personal information to correct the problem.  Once the link is clicked or attachment opened, malicious software is downloaded to the device. The malicious software can contain sophisticated viruses, ransom request or data collection software.

The 6 Phishing Techniques Cyber Criminals Use

  1. Search Engine Phishing
    Some phishing scams involve search engines where the user is directed to products sites which may offer low cost products or services.  When the user tries to buy the product by entering the credit card details, it is collected by the phishing site.  There are many fake bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites.
  2. Deceptive Phishing
    Attacker attempts to obtain confidential information to steal money or to launch other attacks. A fake email from a bank asking you to click a link and verify your account details is an example of deceptive phishing
  3. Spear Phishing
    Spear phishing targets specific individuals instead of large groups of people. Attackers often research their victims on social media and create customized phishing emails based on the information they find. Spear phishing targets specific individuals instead of large groups of people. Attackers often research their victims on social media and create customized phishing emails based on the information they find.

Leave a Reply

Your email address will not be published. Required fields are marked *