Types of phishing

Types of phishing

Types of phishing


Variants and Diverse Phishing Techniques


After a brief overview of the different types of phishing, let’s delve into these, exploring the distinctions between phishing and blagging, understanding the nuances of angler phishing, and examining real-world examples of phishing attacks. 


What is the difference between Phishing and Blagging?

First of all, it should be clear that phishing and blagging may seem similar, but they have distinctive characteristics. Phishing is a form of cyber deception that relies on tricking individuals into divulging sensitive information. On the other hand, blagging involves obtaining information through persuasion or manipulation, often in person. While phishing typically occurs through digital channels, blagging often involves face-to-face interactions, making it a more traditional approach to information theft.



Download our Basic phishing Guide for Employees and Individuals

A Comprehensive Guide to Different Types of Phishing Attacks

Taking this difference into account, let’s get deeper into the different types of phishing:


  • Angler Phishing 

This form of cyber attack involves capitalizing on the trust associated with well-known brands or services to lure unsuspecting victims into divulging sensitive information. The attackers, akin to patient anglers waiting for the perfect catch, create deceptive websites or social media profiles that appear legitimate at first glance.

Angler phishing often begins with the creation of fake websites that closely mimic the appearance of trusted platforms. These websites may feature authentic-looking logos, content, and even security indicators, making it challenging for users to discern the deception. Cybercriminals leverage social engineering techniques to lure victims to these fraudulent sites, where they are prompted to enter sensitive information, such as login credentials or financial details.

One common scenario in angler phishing involves attackers exploiting the popularity of online services, e-commerce platforms, or financial institutions. Victims may receive seemingly authentic emails or messages containing urgent requests to update their account information. Clicking on the provided links redirects users to fraudulent websites designed to harvest sensitive data, perpetuating the cycle of deception.


  • Email Phishing:

In the digital age, where communication primarily takes place through emails, the threat of email phishing looms larger than ever. 

Email-based phishing remains a prevalent method in phishing campaigns. Attackers employ social engineering tactics, crafting emails that appear legitimate to trick recipients into revealing sensitive information, creating a false sense of urgency or importance to manipulate the recipient into taking action. 

These emails may contain hyperlinks leading to fake websites designed to harvest information or malicious attachments that, when opened, compromise the recipient’s system.

Email phishing scenarios can take various forms, but some common red flags include unexpected emails urging immediate action, requests for sensitive information, or unsolicited attachments or links. Attackers often exploit social engineering techniques, using psychological manipulation to induce recipients to act hastily without questioning the legitimacy of the email.


A more targeted form of phishing, spear phishing involves personalized attacks on specific individuals or organizations, since attackers invest time in researching their victims, incorporating personal details into messages to enhance credibility and trustworthiness. Attackers meticulously gather information to craft convincing messages, making it challenging for the victim to discern the deception. 

Spear phishing extends beyond emails, utilizing phone calls, text messages, and social media to diversify its approach and increase the chances of success.


  • Whaling:

Whaling, a term derived from the magnitude of its targets, involves cybercriminals setting their sights on high-profile individuals within organizations, often executives or decision-makers. Unlike conventional phishing attacks that cast a wide net, whaling is a precision-guided tactic that seeks to compromise the most influential figures, aiming for a more substantial and potentially devastating impact.

Whaling can be seen as an evolution of spear phishing, with a focus on a specific, high-value target. These attacks often involve emails crafted to appear as legitimate correspondence, such as urgent requests for sensitive information, financial transactions, or even instructions to execute fraudulent activities. The goal is to manipulate the targeted executive into taking actions that could compromise the organization’s security or sensitive data.


In the dynamic world of cyber threats, attackers are constantly innovating to exploit vulnerabilities, and two deceptive techniques gaining prominence are “Smishing” (SMS Phishing) and “Vishing” (Voice Phishing). 

As mentioned, smishing involves phishing attacks conducted through SMS (Short Message Service) or text messages. Cybercriminals leverage text messages to trick individuals into divulging sensitive information, clicking on malicious links, or downloading harmful content. Smishing attacks typically involve sending text messages that mimic legitimate communication from banks, service providers, or other trusted sources. These messages may contain urgent requests, fake promotions, or links leading to malicious websites designed to harvest sensitive information.

Vishing, on the other hand, takes a more vocal approach. It is a form of phishing conducted over the phone, where attackers use social engineering tactics to manipulate individuals into revealing sensitive information. Vishing often involves impersonating trusted entities, such as banks or government agencies, to create a false sense of urgency and coerce victims into providing personal or financial details.The attackers employ tactics such as caller ID spoofing to make the call appear legitimate. Victims may be prompted to provide sensitive information, make unauthorized transactions, or take actions that compromise their security.


For a more detailed insight, check our publication on how does phishing work


Know how some world-real example of Phishing Attack could work:

Imagine receiving an email that appears to be from your bank, notifying you of a security breach and urging you to take immediate action to secure your account. The email seems authentic, complete with the bank’s logo, professional language, and a link that supposedly leads to a security portal where you can update your information.

Here’s a breakdown of this example of a phishing attack:

  • Email Appearance:
        • The email arrives in your inbox and bears the official logo and branding of your bank.
        • The sender’s email address is cleverly spoofed to mimic a legitimate address from the bank, making it appear genuine at first glance.


  • Urgent Message:
        • The email conveys a sense of urgency, claiming that your account is at risk due to a recent security breach. This urgency is designed to prompt quick action without much thought.


  • Social Engineering:
        • The email uses social engineering techniques to manipulate your emotions and actions. Fear of a compromised account prompts you to act swiftly without questioning the legitimacy of the communication.


  • Phishing Link:
        • To address the supposed security concerns, the email includes a link labeled as a “security portal” or a similar term. Clicking on this link takes you to a website that closely resembles your bank’s official site.


  • Fake Website:
        • The phishing website is a convincing replica of the bank’s login page. It prompts you to enter your username, password, and potentially other sensitive information such as your social security number or credit card details.


  • Data Harvesting:
        • Unbeknownst to you, once you enter your information on the fake website, the phishing attacker harvests your credentials. This information can then be used for identity theft, unauthorized access to your accounts, or other malicious activities.


Here you can learn how to protect against phishing attacks

Download our Basic phishing Guide for Employees and Individuals


Do you need a cybersecurity consulting service?

Understanding the various phishing attack variants, categories, and methods is pivotal for individuals and organizations alike. By staying informed and implementing robust cybersecurity measures, we can collectively navigate the complex tapestry of cyber deception and safeguard against the pervasive threats posed by phishing attacks.


Stay safe from any phishing attack and test your potential risks with Seifti. We offer cybersecurity consulting services that help organizations assess and improve their cybersecurity posture. 

We also provide a phishing simulation service to assess the security of your organization 


Do not miss time, attackers can strike when least expected!

No Comments

Post a Comment

Skip to content