Phishing Techniques and Methods
Email Phishing
Email phishing is the most common and widely used phishing method. Attackers send fake emails pretending to be trusted organizations such as banks, government agencies, or well-known companies. These emails often contain malicious links or attachments designed to steal personal information or infect the victim’s device.
Key characteristics:
-
Spoofed sender address
-
Urgent or threatening language
-
Fake login links
-
Malicious attachments
-
Requests for personal or financial information
This method succeeds because many users do not check email details closely and respond quickly to urgent messages.
Spear Phishing
Spear phishing is a targeted attack aimed at a specific individual or organization. Attackers gather information about the victim—such as job role, company, or personal background—to craft highly convincing messages.
Why it works:
-
Personalized details build trust
-
High-quality writing and tone
-
Targeted relevance (e.g., “HR request,” “Payment approval”)
Spear phishing is frequently used to breach organizations and steal sensitive corporate data.

Whaling (CEO Fraud)
Whaling is a special type of spear phishing that targets high-level executives like CEOs, directors, and managers. Attackers impersonate these leaders to request urgent financial transfers or confidential documents.
Common tactics:
-
Fake CEO requesting urgent payment
-
Fake legal notices
-
Fake financial department instructions
Whaling attacks often lead to significant financial losses and reputation damage.
Smishing (SMS Phishing)
Smishing is phishing through SMS or messaging apps such as WhatsApp, Messenger, or Telegram. Attackers send fake messages containing harmful links or urgent alerts.
Examples:
-
“Your package is waiting. Confirm delivery.”
-
“Your bank account is locked. Verify now.”
-
“You won a prize!”
Mobile users are more likely to trust text messages, making smishing increasingly common.
Vishing (Voice Phishing)
Vishing involves phone calls from attackers pretending to be bank officials, IT support, or government representatives. Modern vishing often uses AI-generated voices.
Common activities:
-
Fake bank verification calls
-
Fake tax department calls
-
“Technical support” scams
Attackers pressure victims to reveal passwords, PINs, or credit card information.
Clone Phishing
Clone phishing occurs when attackers duplicate a legitimate email the victim has previously received and replace the original attachment or link with a malicious one.
How it works:
-
Attacker copies a real email
-
Replaces safe content with malicious content
-
Sends it from a spoofed address
Because the email looks familiar, victims often trust it.
Business Email Compromise (BEC)
BEC is one of the costliest types of phishing. Attackers compromise a business email account or impersonate an executive to manipulate employees into transferring money or data.
Common goals:
-
Fake invoice payments
-
Payroll redirection
-
Sending confidential business information
BEC attacks have caused billions in losses globally.
Search Engine Phishing (SEO Poisoning)
Attackers create fake websites that appear in search engine results for popular keywords like “bank login,” “email login,” or “government services.” Victims click these pages, believing they are real, and enter login information.
QR Code Phishing (Quishing)
Attackers use QR codes to redirect victims to malicious websites. These codes are placed in public areas, printed on flyers, or sent digitally.
Examples:
-
Fake restaurant QR menus
-
Fake payment QR codes
-
QR stickers placed over legitimate ones
Because QR codes hide the URL, victims cannot see where they will be redirected.
Social Media Phishing
Attackers use social networks like Facebook, Instagram, LinkedIn, and TikTok to send fake messages, links, or requests.
Common methods:
-
Fake giveaways
-
Fake “security alerts”
-
Fake job offers
-
Fake friend or page requests
Social media phishing spreads fast and often reaches many victims at once.
Malware-Based Phishing
Some phishing attacks aim to install malware rather than steal login credentials.
Common malware types:
-
Keyloggers (capture keystrokes)
-
Ransomware (encrypt files)
-
Info-stealers (steal browser passwords)
-
Remote Access Trojans (full control of device)
This method gives attackers complete access to the victim’s system.

Comments
Post a Comment