What is phishing | Attack techniques & scam examples | Imperva (2024)

What is a phishing attack

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.

An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.

Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as anadvanced persistent threat(APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.

An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.

Phishing attack examples

The following illustrates a common phishing scam attempt:

  • A spoofed email ostensibly frommyuniversity.eduis mass-distributed to as many faculty members as possible.
  • The email claims that the user’s password is about to expire. Instructions are given to go tomyuniversity.edu/renewalto renew their password within 24 hours.

What is phishing | Attack techniques & scam examples | Imperva (1)

Several things can occur by clicking the link. For example:

  • The user is redirected tomyuniversity.edurenewal.com, a bogus page appearing exactly like the real renewal page, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on the university network.
  • The user is sent to the actual password renewal page. However, while being redirected, a malicious script activates in the background to hijack the user’s session cookie. This results in areflected XSSattack, giving the perpetrator privileged access to the university network.

Phishing techniques

Email phishing scams

Email phishing is a numbers game. An attacker sending out thousands of fraudulent messages can net significant information and sums of money, even if only a small percentage of recipients fall for the scam. As seen above, there are some techniques attackers use to increase their success rates.

For one, they will go to great lengths in designing phishing messages to mimic actual emails from a spoofed organization. Using the same phrasing, typefaces, logos, and signatures makes the messages appear legitimate.

In addition, attackers will usually try to push users into action by creating a sense of urgency. For example, as previously shown, an email could threaten account expiration and place the recipient on a timer. Applying such pressure causes the user to be less diligent and more prone to error.

Lastly, links inside messages resemble their legitimate counterparts, but typically have a misspelled domain name or extra subdomains. In the above example, themyuniversity.edu/renewalURL was changed tomyuniversity.edurenewal.com. Similarities between the two addresses offer the impression of a secure link, making the recipient less aware that an attack is taking place.

What is phishing | Attack techniques & scam examples | Imperva (2)

Spear phishing

Spear phishing targets a specific person or enterprise, as opposed to random application users. It’s a more in-depth version of phishing that requires special knowledge about an organization, including its power structure.

An attack might play out as follows:

  1. A perpetrator researches names of employees within an organization’s marketing department and gains access to the latest project invoices.
  2. Posing as the marketing director, the attacker emails a departmental project manager (PM) using a subject line that reads, Updated invoice for Q3 campaigns. The text, style, and included logo duplicate the organization’s standard email template.
  3. A link in the email redirects to a password-protected internal document, which is in actuality a spoofed version of a stolen invoice.
  4. The PM is requested to log in to view the document. The attacker steals his credentials, gaining full access to sensitive areas within the organization’s network.

By providing an attacker with valid login credentials, spear phishing is an effective method for executing the first stage of an APT.

How to prevent phishing

Phishing attack protection requires steps be taken by both users and enterprises.

For users, vigilance is key. A spoofed message often contains subtle mistakes that expose its true identity. These can include spelling mistakes or changes to domain names, as seen in the earlier URL example. Users should also stop and think about why they’re even receiving such an email.

For enterprises, a number of steps can be taken to mitigate both phishing and spear phishing attacks:

  • Two-factor authentication (2FA)is the most effective method for countering phishing attacks, as it adds an extra verification layer when logging in to sensitive applications. 2FA relies on users having two things: something they know, such as a password and user name, and something they have, such as their smartphones. Even when employees are compromised, 2FA prevents the use of their compromised credentials, since these alone are insufficient to gain entry.
  • In addition to using 2FA, organizations should enforce strict password management policies. For example, employees should be required to frequently change their passwords and to not be allowed to reuse a password for multiple applications.
  • Educational campaigns can also help diminish the threat of phishing attacks by enforcing secure practices, such as not clicking on external email links.

See how Imperva Web Application Firewall can help you with phishing attacks.

Request demo Learn more

Phishing protection from Imperva

Imperva offers a combination of access management and web application security solutions to counter phishing attempts:

  • ImpervaLogin Protectlets you deploy 2FA protection for URL addresses in your website or web application. This includes addresses having URL parameters or AJAX pages, where 2FA protection is normally harder to implement. The solution can be deployed in seconds with just a few clicks of a mouse. It doesn’t require any hardware or software installation and enables easy management of user roles and privileges directly from your Imperva dashboard.
  • Working within the cloud, ImpervaWeb Application Firewall(WAF) blocks malicious requests at the edge of your network. This includes preventing malware injection attempts by compromised insiders in addition to reflected XSS attacks deriving from a phishing episode.
What is phishing | Attack techniques & scam examples | Imperva (2024)

FAQs

What is phishing | Attack techniques & scam examples | Imperva? ›

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

What is phishing in answer? ›

What is phishing? Phishing is a type of cyberattack that uses fraudulent emails, text messages, phone calls or websites to trick people into sharing sensitive data, downloading malware or otherwise exposing themselves to cybercrime. Phishing attacks are a form of social engineering.

Which of the following is an example of a phishing attack answer? ›

A cyber criminal creates a fake Google Docs login page and then sends a phishing email to trick someone into logging into the fake website. The email might read something like, “We've updated our login credential policy.

What is the best definition of phishing? ›

phishing • \FISH-ing\ • noun. : a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly. Examples: The widespread use of electronic banking and financial transactions has prompted the FTC to crack down on cyber crimes, such as phishing.

Which of the following are common phishing techniques? ›

Types of Phishing Techniques
  • Spear Phishing: Spear phishing attacks are targeted to a particular individual or small group. ...
  • Vishing: Vishing or “voice phishing” is a phishing attack performed over the phone. ...
  • Smishing: Smishing is a phishing attack performed using SMS text messages.

What is the phishing technique? ›

What is a phishing attack. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

What is a real life example of a phishing attack? ›

Crelan bank in Belgium was the victim of a business email compromise (BEC) scam, which resulted in damage of more than $75 million. In this type of attack, phishers compromise the accounts of senior corporate executives and instruct employees to send money to accounts controlled by the attackers.

What happens when you get phished? ›

With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel.

What does phishing look like? ›

Here are some ways to recognize a phishing email: Urgent call to action or threats - Be suspicious of emails and Teams messages that claim you must click, call, or open an attachment immediately. Often, they'll claim you have to act now to claim a reward or avoid a penalty.

What is phishing simple words? ›

Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.

Is phishing good or bad? ›

Phishing is when attackers send scam emails (or text messages) that contain links to malicious websites. The websites may contain malware (such as ransomware) which can sabotage systems and organisations.

How do you spot a phishing email? ›

4 tips on how to spot phishing techniques
  1. Look for inconsistencies in links, addresses and domains. ...
  2. Watch out for bad spelling and grammar an unfamiliar language. ...
  3. Be suspicious of demands for urgent action. ...
  4. Be wary of attachments.

Which one of the following is an example of phishing? ›

1) Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows. Explanation: Phishing assaults occur when a person sends a fake message that appears to come from a trusted source. Email is the most used method of communication.

Who is most vulnerable to phishing? ›

Young adults and adults over 75 are the most vulnerable to fraud attacks.

What is phishing in very short? ›

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.

What is phishing in a sentence? ›

Examples from Collins dictionaries

All major banks have fraud departments which are engaged in a constant war against phishing.

Top Articles
How to Port Forward Minecraft In Simple Steps | Minecraft Port Forwarding
Grocery | CLiQQ
Maxtrack Live
Kevin Cox Picks
7 Verification of Employment Letter Templates - HR University
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Restaurer Triple Vitrage
Lamb Funeral Home Obituaries Columbus Ga
Kaydengodly
New Slayer Boss - The Araxyte
America Cuevas Desnuda
Kristine Leahy Spouse
Jonathan Freeman : "Double homicide in Rowan County leads to arrest" - Bgrnd Search
J Prince Steps Over Takeoff
Walgreens On Nacogdoches And O'connor
What Was D-Day Weegy
Housework 2 Jab
How Much Is Tj Maxx Starting Pay
Luna Lola: The Moon Wolf book by Park Kara
Google Flights Missoula
Marine Forecast Sandy Hook To Manasquan Inlet
Universal Stone Llc - Slab Warehouse & Fabrication
Laveen Modern Dentistry And Orthodontics Laveen Village Az
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
Craigslist St. Cloud Minnesota
Ontdek Pearson support voor digitaal testen en scoren
How do you get noble pursuit?
TJ Maxx‘s Top 12 Competitors: An Expert Analysis - Marketing Scoop
Craigslist Boerne Tx
Lawrence Ks Police Scanner
Craigslist Central Il
Mg Char Grill
Kokomo Mugshots Busted
Lowell Car Accident Lawyer Kiley Law Group
Uhaul Park Merced
آدرس جدید بند موویز
Jennifer Reimold Ex Husband Scott Porter
Agematch Com Member Login
Asian Grocery Williamsburg Va
42 Manufacturing jobs in Grayling
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
8005607994
Walgreens Agrees to Pay $106.8M to Resolve Allegations It Billed the Government for Prescriptions Never Dispensed
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
Final Fantasy 7 Remake Nexus
Todd Gutner Salary
Sea Guini Dress Code
Graduation Requirements
What your eye doctor knows about your health
Marion City Wide Garage Sale 2023
Shad Base Elevator
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 5880

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.