Phishing is a sort of social engineering attack which endeavor to gain sensitive and secret information, for example, usernames, passwords, credit card information, and network credentials. In the cyber world, there are various kinds of phishing attacks and the attacker sends phishing emails to victim email in request to steal personal information.
Phishing Technique 1: Here, attackers make an impression on victims which appear to be one of your confided in service providers, and asking you to send personal information through an alternate portal.
Phishing Technique 2: In this technique, the victim gets an email from the hacker and the email contains a URL link. The URL is practically legitimate link or the site is legitimate yet has a genuine weakness or malware content to gather personal information which is obscure to user.
Phishing Technique: In this technique, the attacker sends an email or online messaging to the victim and includes some personal data, for example, the name of the victim, his job in the company, email address, or his contact number. The purpose behind includes this information is to gain his certainty and, therefore, obtain the information they have to compromise and access the classified data they are looking for.
Phishing Technique: Attacker utilizes the name of your Chief however an alternate email address. The attacker stunts you into transferring money to a bank account possessed by the attacker, to send private information or other sensitive information.
In the case of Chief fraud phishing, the attackers focus on a company's finance division.
Phishing Technique: The attacker sends an email to the victim and the email appears to originate from the original sender and the connection or link within the email is supplanted with a fake or malicious website.
Phishing Technique: In a pharming attack, attacker changing the hosts file on a victim's computer or its domain name system (DNS). At the point when a URL is requested, a false address is returned, and the victim is moved to a fake weak website.
Phishing Technique: This kind of attack by and large targets senior management that holds power in organizations, for example, the President, CFO, or other officials who have total access to sensitive data.
Phishing Technique: When the victim accesses these kinds of malicious sites, malware is automatically downloaded to his computer and exploiting security vulnerabilities.
Note: Having advanced security like complete security software is a good option to protect your data from all types of phishing.
Kinds of Phishing Attacks
The kinds of phishing attacks are deceptive phishing, spear phishing, clone phishing, website phishing, and President fraud, which are described as beneath:1. Deceptive Phishing
Deceptive phishing is the most widely recognized sort of phishing technique and it is otherwise called traditional phishing. In these phishing techniques, an attacker endeavors to steal the user's private information or login credentials. The most widely recognized form of deceptive phishing techniques are as per the following:Phishing Technique 1: Here, attackers make an impression on victims which appear to be one of your confided in service providers, and asking you to send personal information through an alternate portal.
Phishing Technique 2: In this technique, the victim gets an email from the hacker and the email contains a URL link. The URL is practically legitimate link or the site is legitimate yet has a genuine weakness or malware content to gather personal information which is obscure to user.
2. Spear Phishing
Spear phishing is an email spoofing attack that endeavors to unapproved access and steals sensitive information, for example, account credentials or financial information from a particular victim.Phishing Technique: In this technique, the attacker sends an email or online messaging to the victim and includes some personal data, for example, the name of the victim, his job in the company, email address, or his contact number. The purpose behind includes this information is to gain his certainty and, therefore, obtain the information they have to compromise and access the classified data they are looking for.
3. Chief Fraud
Chief Fraud or Business Email Compromise (BEC) is a sort of spear-phishing email attack in which the attacker imitates your President. The attacker goes about as a senior company official to steal assets or gain access to sensitive business data. The most widely recognized form of Chief fraud techniques are as per the following:Phishing Technique: Attacker utilizes the name of your Chief however an alternate email address. The attacker stunts you into transferring money to a bank account possessed by the attacker, to send private information or other sensitive information.
In the case of Chief fraud phishing, the attackers focus on a company's finance division.
4. Clone Phishing
Clone phishing is a sort of phishing attack where a hacker duplicates a legitimate email and recently delivered email sent from a confided in an organization that used to make a practically indistinguishable or cloned email.Phishing Technique: The attacker sends an email to the victim and the email appears to originate from the original sender and the connection or link within the email is supplanted with a fake or malicious website.
5. Pharming
Pharming is a phishing trick where an attacker installs malicious code on a personal computer or server to redirect a website's traffic to another, fake site without user assent. Its expects to gain personal information, for example, bank accounts, credit card numbers, login credential, or other important information.Phishing Technique: In a pharming attack, attacker changing the hosts file on a victim's computer or its domain name system (DNS). At the point when a URL is requested, a false address is returned, and the victim is moved to a fake weak website.
6. Whaling
A whaling phishing attack is a typical kind of phishing attack that focused endeavor to steal sensitive information from a company, for example, financial information or personal information about employees.Phishing Technique: This kind of attack by and large targets senior management that holds power in organizations, for example, the President, CFO, or other officials who have total access to sensitive data.
7. Website Phishing
A phishing website is cyber-attack which attempts to steal your sensitive information, for example, login credential or other secret information by tricking that you into believing you're on a legitimate website.8. Malware Phishing
Malware-Based Phishing alludes to scams that the attacker initiates malware's into the email account or a link directing to a malicious site.Phishing Technique: When the victim accesses these kinds of malicious sites, malware is automatically downloaded to his computer and exploiting security vulnerabilities.
Note: Having advanced security like complete security software is a good option to protect your data from all types of phishing.
No comments:
Post a Comment