Phishing Attacks

January 1st, 2023

by: Colin Yakely

Research Team

What is Phishing?

Phishing is a common technique used when attackers are attempting to acquire sensitive company or personal information. Phishing is used in various ways such as email, calling and texting. Attackers specifically pose as legitimate sources to lure individuals into providing said sensitive information. Attackers use various methods to try and gain access to personal accounts, modify and even compromise entire computer networks.

What to Know

Phishing is commonly used with three different sources such as email, calling and texting. The attackers will use various sources and tactics to try and gain personal information from individuals. Specifically, attackers will commonly use trust and urgency to bait their victims into giving information or clicking links attached with the attack.

Common Features to Look for

  • Sender address
  • Too good to be true
  • Urgency
  • Hyperlinks
  • Attachments
  • Unknown sender

Tactics

  • Phishing: Phishing is the tactic used specifically when going through a fake email to lure individuals into providing information.
  • Vishing: Vishing is a tactic where an attacker uses phone calls as a source to get information.
  • Smishing: Smishing is the tactic used when an attacker uses text messages to lure an individual into clicking links and gaining personal information.

How to Protect Yourself

Phishing scams will normally include links, attachments or use techniques to try and have you send attackers information. If you believe you have become a phishing target, the easiest thing is to simply ignore the call or delete the text/email. Almost everyone has received these messages, calls or emails. The below graphic will help you and your company understand and point out the common details in a phishing attack.