top of page
  • Clubhouse
  • Threads
  • Whatsapp
  • X
  • Linkedin

Types of phishing

  • Writer: Ferdinent Fernandez
    Ferdinent Fernandez
  • Jun 22
  • 3 min read

Recent advancements in AI have not only refined phishing but also introduced a new threat vector: agentic AI. This evolution allows cybercriminals to conduct autonomous, self-improving attacks that adapt over time.


Key Trends and Changes in the 2024 List

1. Email Phishing (Traditional Phishing)

🔹 Attackers send fake emails pretending to be from legitimate organizations (banks, social media, or IT support).

🔹 The email contains a malicious link or attachment that steals login credentials or installs malware.


Example:📧 "Your bank account has been locked. Click here to verify your identity."

How to Avoid:

  • Check the sender’s email address carefully.

  • Never click on suspicious links; hover over them to preview the actual URL.


2. Spear Phishing

🔹 A targeted attack against an individual or organization.

🔹 Attackers use personalized details (name, job role, or company info) to make the email seem legitimate.


Example:📧 "Hey [Your Name], I need your help with a financial report. Please review the attached file. – [Fake CEO]"

How to Avoid:

  • Verify requests for sensitive information via phone or in person.

  • Look for urgent or unusual requests, especially involving money or credentials.


3. Whaling (CEO Fraud)

🔹 A form of spear phishing that targets executives, CEOs, and high-profile employees.

🔹 Attackers impersonate a senior executive and request urgent actions like wire transfers or data access.


Example:📧 "This is the CFO. Transfer $50,000 to this account immediately for an urgent deal."

How to Avoid:

  • Verify high-risk requests through another communication channel.

  • Implement financial transaction approval policies requiring multiple approvals.


4. Smishing (SMS Phishing)

🔹 Phishing through text messages (SMS) instead of emails.

🔹 Messages often contain fake security alerts, prize notifications, or delivery updates.


Example:📱 "Your package delivery failed. Click here to reschedule: [Malicious Link]"

How to Avoid:

  • Don’t click on links in unexpected texts.

  • Contact the company directly through official numbers.


5. Vishing (Voice Phishing)

🔹 Attackers use phone calls to trick victims into revealing sensitive info.

🔹 Often disguised as bank representatives, tech support, or even law enforcement.

Example:📞 "This is your bank. We detected fraud on your account. Confirm your card number now!"


How to Avoid:

  • Hang up and call the company directly using their official number.

  • Never share PINs, passwords, or OTPs over the phone.


6. Angler Phishing (Social Media Phishing)

🔹 Attackers pose as customer support agents on social media.

🔹 They trick users into sharing account details through fake help requests.


Example:💬 "Hello, this is PayPal Support. Please DM us your account details to fix the issue."

How to Avoid:

  • Only contact support through verified accounts.

  • Never share sensitive info via social media DMs.


7. Clone Phishing

🔹 Attackers copy a legitimate email and resend it with malicious links or attachments.

🔹 The sender appears familiar, making it easier to deceive victims.


Example:📧 "Here’s the updated invoice you requested" (fake email replacing a real one).

How to Avoid:

  • Always verify with the sender before clicking on new links or files.

  • Look for small changes in sender addresses or email formatting.


8. Search Engine Phishing (SEO Poisoning)

🔹 Attackers create fake websites that appear in search results.

🔹 Victims land on these sites and unknowingly enter their credentials.

Example:🌍 Fake banking website at the top of Google search results.


How to Avoid:

  • Always type the official website address manually.

  • Check for HTTPS and verify the domain name.


9. Evil Twin Attack (Wi-Fi Phishing)

🔹 Attackers create a fake Wi-Fi hotspot with a familiar name (e.g., "Starbucks Free Wi-Fi").

🔹 When users connect, the attacker steals login credentials and data.


How to Avoid:

  • Never enter passwords on public Wi-Fi.

  • Use VPNs when connecting to public networks.


10. Watering Hole Attacks

🔹 Attackers infect a trusted website that employees of a specific company or industry frequently visit.

🔹 The website delivers malware or phishing exploits to visitors.

Example:🌐 Hackers infect an industry forum that employees of a financial company frequently visit.


How to Avoid:

  • Keep your browser and plugins updated.

  • Use DNS filtering to block malicious websites.

Comments


Contact us

Address

Opening Hours

G402, Casagrand ECR14, Maya street, Kanathur, Chennai - 603112,

Tamilnadu, India

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Mon - Fri

Sat-Sun

9:00 am – 9:00 pm

9:00 am – 9:00 pm

xyztec©
@xyztec
bottom of page