Phishing Attack - Explained



Phishing Attack is considered to be the most dangerous attack nowadays. This is happening because people are not enough educated on this specific topic. The jealous mindset of every people opens the gateway for this kind of attacks.

Phishing attacks comes under Social Engineering attacks. Phishing attack is simply defined as a fraudulent communication that appears to be coming from a legit source. The goal of this attack is to steal many confidential data like credit card details, passwords or to install malware etc.

How Phishing attack works

Phishing attack will always works through email. Yes, everytime you received mail saying "You won 10,000 bucks, free iphone, free gadgets, free coupon code etc" don't open this kind of mails. No one in this hell world going to give you like this. They may occur legit or looks like they are from legit website, but it is not. Whenever you open that mail and enter in to the link they sent, you will be asked to enter your confidential information such as bank details, card details, passwords etc. When you entered those details Boom! finished thats all. Your account will be easily hacked with your help. This is how phishing attack works.

Types of Phishing attacks

1. Deceptive Phishing :


Deceptive phishing is a most common type of phishing attack. This attack will occur in mail. This will appears as it comes from trusted bank. It will ask for your bank details and it will try to steal your money.

2. Spear Phishing
     

Spear phishing attack will target specific person instead of  a group. In this type, people will reach the victim through social media and other websites. They will appear to be more authentic. This attack will be the first phase in order to take control of the company's defense.  

3. Whaling :



When attackers targets a big fish like CEO of the company or any other important role of the company, then it is known as whaling. These kind of attackers will spend most time on the targets and steal their login details. It is a particular concern because high level authorities can be able access company's information.

4. Pharming :

Similar to phishing, Pharming will send the user to a fake website, which appears to be legit. In this type, the user don't even want to click the link, but they will automatically redirected to the fake website even if they enter the correct URL. Their DNS will be hacked by the attackers.

How to avoid

  • Stop opening spam mails.
  • Stop downloading suspicious mobile apps, mail.
  • Avoid clicking suspicious links.
  • Avoid providing confidential details in suspicious website.
  • Avoid buying things on non legit websites
These are some steps which will help you to avoid from phishing attack.



Important :

This is a basic introduction to the phishing attack and its types and also about the precaution. Subscribe to our blog to know more like this. Feel free to comment your opinions.


 

Comments

Popular Posts