The 5 most common types of Phishing Attacks

The 5 most common types of Phishing Attacks

Phishing is among the biggest cyber threats facing organizations.

In this article, we'll look at five of the most common types of phishing email to help you spot the signs of a scam.


1. Email phishing

Most phishing attacks are sent by email. The crook will register a fake domain that mimics a genuine organisation and sends thousands of generic requests. 

The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each other to create ‘rn’ instead of ‘m’. 

In other cases, the fraudsters create a unique domain that includes the legitimate organisation’s name in the URL. The example below is sent from ‘olivia@amazonsupport.com’.

The recipient might see the word ‘Amazon’ in the sender’s address and assume that it was a genuine email.

There are many ways to spot a phishing email, but as a general rule, you should always check the email address of a message that asks you to click a link or download an attachment. 

2. Spear phishing

There are two other, more sophisticated, types of phishing involving email.

The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim:

  • Their name; 
  • Place of employment; 
  • Job title; 
  • Email address; and 
  • Specific information about their job role.

You can see in the example below how much more convincing spear phishing emails are compared to standard scams.

The fraudster has the wherewithal to address the individual by name and (presumably) knows that their job role involves making bank transfers on behalf of the company.

The informality of the email also suggests that the sender is a native English speaker, and creates the sense that this is a real message rather than a template.

3. Whaling

Whaling attacks are even more targeted, taking aim at senior executives. Although the end goal of whaling is the same as any other kind of phishing attack, the technique tends to be a lot subtler. 

Tricks such as fake links and malicious URLs aren’t helpful in this instance, as criminals are attempting to imitate senior staff. 

Whaling emails also commonly use the pretext of a busy CEO who wants an employee to do them a favour.

Emails such as the above might not be as sophisticated as spear phishing emails, but they play on employees’ willingness to follow instructions from their boss. Recipients might suspect that something is amiss but are too afraid to confront the sender to suggest that they are being unprofessional.

4. Smishing and vishing

With both smishing and vishing, telephones replace emails as the method of communication.

Smishing involves criminals sending text messages (the content of which is much the same as with email phishing), and vishing involves a telephone conversation.

One of the most common smishing pretexts are messages supposedly from your bank alerting you to suspicious activity.

In this example, the message suggests that you have been the victim of fraud and tells you to follow a link to prevent further damage. However, the link directs the recipient to a website controlled by the fraudster and designed to capture your banking details.

5. Angler phishing

A relatively new attack vector, social media offers several ways for criminals to trick people. Fake URLs; cloned websites, posts, and tweets; and instant messaging (which is essentially the same as smishing) can all be used to persuade people to divulge sensitive information or download malware. 

Alternatively, criminals can use the data that people willingly post on social media to create highly targeted attacks.

As this example demonstrates, angler phishing is often made possible due to the number of people containing organizations directly on social media with complaints.

Organisations often use these as an opportunity to mitigate the damage – usually by giving the individual a refund.

However, scammers are adept at hijacking responses and asking the customer to provide their personal details. They are seemingly doing this to facilitate some form of compensation, but it is instead done to compromise their accounts.

    • Related Articles

    • Common Printer Errors and How to Fix Them

      Connecting your computer to an external printer in order to print your documents can be difficult and frustrating, especially when there are so many different types of printers, each with their own quirks, pros and cons. Here are some common issues ...
    • What is Cisco Umbrella, and why should I use it?

      There's an old saying in the IT/Cybersecurity department: "We're not happy until you're unhappy!"  With each layer of security implemented, there's a certain level of "inconvenience" associated.  Security these days is an absolute necessity.  BUT, it ...
    • Avoiding Suspicious Emails

      Emails can appear very innocent and helpful, but your inbox is a valuable tool for scammers to compromise your computer. Here's 5 ways to identify a suspicious email and stay safe. Of course, if you find a suspicious email like this, feel free to ...
    • Office 365 / Email Quarantine

      What is it quarantine? In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, quarantine is available to hold potentially dangerous or unwanted ...
    • Microsoft Bookings Setup Guide

        Setting up Microsoft Bookings in 13 Simple Steps Watch a video overview on the topic here:  https://vimeo.com/778523419/08162b4c73 How to Setup: (manual setup instructions) 1. Open MS Edge browser, then go to https://Outlook.office.com/bookings     ...