Date First Published: 24th June 2022
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Difficulty: EasyDifficulty Level: 3/10
Learn more about what phishing is in this article.
Phishing is the practice of impersonating trusted companies to steal sensitive information from users. Phishing usually comes in the form of email, in which the phisher disguises the email as coming from a legitimate company. The user is then convinced to click on a link to a fake site, which tricks them into giving away their personal details, such as card numbers, usernames, and passwords. These details can then be sold to third parties or used to spend their money and buy items in the victim’s name. Phishing can also come in the form of other methods of private communication, such as text messages. This is known as smishing.
Phishers can use public sources of information to collect information about the victim's interests, name, activities, personal and work history, and contact information, such as email addresses and phone numbers to send an email that is designed to look like it has come from a legitimate company.
These signs below can indicate that a message is a phishing email.
An example of a phishing email can be seen below. Note that these are not real links or email addresses.
From: [email protected]
Dear valued customer of XYZ bank.
It has come to our attention that we need to transfer your money to a safe account.
In order to do this, we will need your:
Just click the link below:
http://sitef4389f2fa7da.com/bank/login.php
Once you have entered your details, we will happily transfer your money to a safe account.
Kind regards,
XYZ Bank
This is a clear example of a phishing email that impersonates a trusted bank. It is a phishing email for the following reasons:
If you have received a phishing email, you can follow these tips below.
If it is too late and you think that you have unintentionally fallen for a phishing scam, there are a few things you can do below.
Unfortunately, if you have given a phisher your bank details and they have spent your money, it is unlikely that you will be able to recover any of your money.
The word ‘phishing’ is a variant of the word ‘fishing’ and is associated with the deception tactics used to ‘fish’ for user’s personal information. It was introduced around 1996 by phishers using deception tactics to steal AOL account usernames and passwords.
A clear example of a phishing attack that caused issues was the ‘ILOVEYOU’ virus. Victims were sent an email message with a message saying ‘ILOVEYOU’, which pointed to an attachment letter. The attachment contained a worm that would overwrite files on the victim’s hard drive and copy itself to the user’s contact list.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection