Glossary

Learn about product and technical terms, and get their definitions in our Glossary.

Phishing

Phishing is a social engineering attack where cybercriminals impersonate legitimate entities to deceive victims into providing sensitive information such as passwords, credit card numbers, or personal data, or to install malware on their systems.

What is Phishing?

Phishing is a cybercrime technique where attackers use deceptive communications—typically emails, text messages, or fake websites—to impersonate trusted entities and trick victims into revealing sensitive information or taking harmful actions. The term "phishing" comes from the analogy of "fishing" for victims using fake bait. These attacks exploit human psychology rather than technical vulnerabilities, making them particularly effective and dangerous.

How Phishing Works

A typical phishing attack follows this pattern:

  1. Target identification: Attackers select potential victims, either broadly or specifically
  2. Message creation: Crafting convincing fake communications that appear legitimate
  3. Delivery: Sending emails, SMS messages, or directing victims to malicious websites
  4. Deception: Using urgency, fear, or authority to prompt immediate action
  5. Data capture: Collecting credentials, personal information, or payment details
  6. Exploitation: Using stolen information for fraud, identity theft, or further attacks

Types of Phishing Attacks

Email Phishing

The most common form, involving mass emails appearing to come from legitimate companies, banks, or service providers requesting sensitive information.

Spear Phishing

Highly targeted attacks directed at specific individuals or organizations, using personalized information to increase credibility and success rates.

Whaling

Sophisticated spear phishing attacks specifically targeting high-profile individuals like executives, CEOs, or senior officials.

Smishing (SMS Phishing)

Phishing attacks conducted via text messages, often claiming urgent account problems or fake delivery notifications.

Vishing (Voice Phishing)

Phone-based attacks where scammers impersonate legitimate organizations to extract sensitive information verbally.

Clone Phishing

Attackers copy legitimate emails previously sent by trusted sources, replacing links or attachments with malicious versions.

Pharming

Redirecting users from legitimate websites to fake ones without their knowledge, typically by compromising DNS servers.

Business Email Compromise (BEC)

Sophisticated attacks targeting businesses by impersonating executives or vendors to authorize fraudulent transactions.

Common Phishing Tactics

Attackers use various psychological manipulation techniques:

Urgency

Creating time pressure to bypass rational thinking (e.g., "Your account will be closed in 24 hours").

Authority

Impersonating powerful entities like government agencies, banks, or company executives.

Familiarity

Using logos, branding, and language that matches legitimate organizations.

Fear

Threatening negative consequences if the victim doesn't comply immediately.

Curiosity

Enticing victims with promises of prizes, exclusive offers, or intriguing information.

Greed

Offering unrealistic financial rewards or opportunities.

Identifying Phishing Attempts

Warning signs that may indicate phishing:

  • Generic greetings: "Dear customer" instead of your name
  • Suspicious sender addresses: Slight misspellings or unusual domains
  • Urgent or threatening language: Pressure to act immediately
  • Spelling and grammar errors: Professional organizations typically have error-free communications
  • Suspicious links: URLs that don't match the claimed sender's domain
  • Unexpected attachments: Files you weren't expecting, especially executables
  • Requests for sensitive information: Legitimate companies rarely request passwords or full credit card numbers via email
  • Too good to be true offers: Unrealistic promises or prizes

Impact of Phishing Attacks

Successful phishing can lead to severe consequences:

Individual Impact

  • Identity theft and fraud
  • Financial losses from stolen credentials
  • Compromised personal accounts
  • Privacy violations
  • Emotional distress

Organizational Impact

  • Data breaches and loss of sensitive information
  • Financial losses from fraudulent transactions
  • Ransomware infections
  • Regulatory penalties and compliance violations
  • Reputation damage and loss of customer trust
  • Business disruption and downtime

Protection Against Phishing

Technical Defenses

  • Email filtering: Advanced spam and phishing detection systems
  • Web filters: Blocking known malicious websites
  • Anti-phishing software: Browser extensions and security tools
  • Multi-factor authentication: Adding extra security layers beyond passwords
  • DMARC, DKIM, SPF: Email authentication protocols
  • URL scanning: Checking links before clicking
  • Secure email gateways: Analyzing and filtering incoming messages

Best Practices

  • Verify sender identity: Contact organizations directly using official channels
  • Check URLs carefully: Hover over links before clicking
  • Be suspicious of urgency: Take time to verify unexpected requests
  • Use password managers: Avoid entering credentials on fake sites
  • Keep software updated: Ensure browsers and security tools are current
  • Enable security features: Use built-in browser and email protections
  • Report suspicious emails: Help security teams identify threats

User Education

  • Regular security awareness training
  • Simulated phishing exercises
  • Clear reporting procedures for suspicious emails
  • Updated threat intelligence sharing
  • Encouraging healthy skepticism

Phishing and Automated Attacks

Bots and automation increasingly play a role in modern phishing campaigns:

  • Mass email distribution: Bots send millions of phishing emails rapidly
  • Credential validation: Automated testing of stolen credentials
  • Website cloning: Bots scrape and replicate legitimate sites
  • Proxy services: Phishing kits that automate attack infrastructure
  • Account takeover: Bots attempt logins with phished credentials

Organizations facing bot-driven credential stuffing and account takeover attempts often discover that phishing is the initial source of stolen credentials. Comprehensive bot protection helps detect and block automated attempts to use phished credentials, adding a crucial defense layer.

prosopo-logo
Defend Against Automated Attacks
Protect your users with intelligent bot detection
Secure Accounts

Ready to ditch Google reCAPTCHA?
Start for free today. No credit card required.