{"id":33547,"date":"2019-06-17T18:57:21","date_gmt":"2019-06-17T14:57:21","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=33547"},"modified":"2024-07-30T12:02:33","modified_gmt":"2024-07-30T08:02:33","slug":"types-of-phishing","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/types-of-phishing\/","title":{"rendered":"Methods and Types of Phishing Attacks"},"content":{"rendered":"<p>The internet can be a dangerous place no matter how tech-savvy you are. Massive data breaches have become a part of the daily news cycle, mainly because of the vast number of hackers out there looking for new ways to infiltrate systems and steal private information.<!--more--><\/p>\n<p>But often the most damaging cyberattacks occur on a smaller scale through a form of hacking known as phishing. With various types of phishing attacks, the criminal sends a <a href=\"https:\/\/torquemag.io\/2018\/11\/top-5-email-scams-for-2018-gullible-people-beware\" target=\"_blank\" rel=\"noopener noreferrer\">fraudulent communication<\/a> (typically email) that claims to be from a reputable organization. These can be hard to distinguish from legitimate messages, but if you fall for it, the hacker may help themselves to your passwords, credit card numbers, or other sensitive data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-31172 size-full\" style=\"font-size: 1rem;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing-Types.png\" alt=\"Types of Phishing. How phishing works\" width=\"833\" height=\"424\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing-Types.png 833w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing-Types-300x153.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing-Types-768x391.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing-Types-624x318.png 624w\" sizes=\"auto, (max-width: 833px) 100vw, 833px\" \/><\/p>\n<p>Let\u2019s run through the different types of phishing attacks and the most common methods hackers are using to perpetuate them in the real world today.<\/p>\n<p>For more information about phishing please refer to our guide on the topic:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">Anti-Phishing Guide<\/a><\/p>\n<h2><b>Types of\u00a0Phishing<\/b><\/h2>\n<h3><b>Spear Phishing and Whaling<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-31173 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Spear-phishing-and-Whaling.png\" alt=\"Types of Phishing. Spear-phishing and Whaling\" width=\"168\" height=\"188\" \/>When a phishing attack bypasses the large, generic group target strategy, and instead pursues a specific person, organization, or company, it becomes classified as spear-phishing. Typically the message will contain the recipient's name or other identifying information to lend a flavor of credibility.<\/p>\n<p>Whaling is a specific type of spear-phishing that aims to target executive-level employees at major companies. These fraud messages look more professional and warn the recipient of issues with their technology accounts. If the upper-level person divulges a password or piece of critical information, it can put the entire operation at risk.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/spear-phishing-prevention\/\">How to Prevent Spear Phishing Attacks<\/a><\/p>\n<h3><b>Clone Phishing<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-31303 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Clone-Phishing-1.png\" alt=\"Types of Phishing. Clone phishing\" width=\"168\" height=\"188\" \/>Clone phishing is a subtype of spear-phishing that aims to replicate another email message that the recipient has previously received. For example, if the hacker can determine that a person recently received a shipment tracking email notification, then they may launch a clone phishing attack that sends a fraudulent message tailored to look like the same thing.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/clone-phishing\/\">Clone Phishing Explained<\/a><\/p>\n<p><strong><span style=\"color: #e38934;\">Check out these marketing templates that we created to help MSPs sell Microsoft 365 as a managed service:\u00a0<\/span><\/strong><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-41595\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/How-to-Sell-Microsoft-365-Backup-Services-4.png\" alt=\"MSP's Marketing Templates for Selling Microsoft 365\" width=\"252\" height=\"212\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Marketing Templates for Selling Microsoft 365<\/div>\n<div class=\"call-to-action__text\">\n<p>Download a set of free white-label templates designed to help MSPs sell Microsoft 365 as a managed service.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-264020e3-ba89-4e4a-842f-f8cf5f33a295\" data-portal=\"5442029\" data-id=\"264020e3-ba89-4e4a-842f-f8cf5f33a295\"><span class=\"hs-cta-node hs-cta-264020e3-ba89-4e4a-842f-f8cf5f33a295\" id=\"hs-cta-264020e3-ba89-4e4a-842f-f8cf5f33a295\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/264020e3-ba89-4e4a-842f-f8cf5f33a295\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-264020e3-ba89-4e4a-842f-f8cf5f33a295\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/264020e3-ba89-4e4a-842f-f8cf5f33a295.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h2><b>Phishing Methods<\/b><\/h2>\n<h3><b>Link Manipulation<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-31304 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Link-Manipulation-1.png\" alt=\"Types of Phishing. Link manipulation\" width=\"643\" height=\"275\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Link-Manipulation-1.png 643w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Link-Manipulation-1-300x128.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Link-Manipulation-1-624x267.png 624w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/p>\n<p>The most common types of phishing attacks are designed to convince users to click on a malicious link in a fraudulent email. It may redirect the person to a rogue website that will urge the person to divulge a password, credit card number, or other pieces of identifying information.<\/p>\n<p>Phishing emails can be tricky to detect because of link manipulation. Hackers will disguise their malicious URLs inside of an HTML hyperlink that will have a label that looks to be harmless.<\/p>\n<p><q>If you hover over the hyperlink in your mail application, you will be able to see the true URL hiding.<\/q><\/p>\n<h3><b>Filter Evasion<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-31175 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/table-email.png\" alt=\"Types of Phishing. Filter evasion\" width=\"168\" height=\"188\" \/>Every top email provider or client application includes a junk mail filter tool that automatically scans incoming messages and flag ones that have a high likelihood of being malicious in nature. Hackers realize this and design their phishing attacks to <a href=\"https:\/\/www.securitynewspaper.com\/2019\/02\/21\/new-url-filter-evasion-method-for-phishing-campaigns\/\" target=\"_blank\" rel=\"noopener noreferrer\">circumvent the blocks<\/a>.<\/p>\n<p>The most common tactic in filter evasion is for the hackers to embed links or text within table cells instead of in plain HTML text. This makes it harder for the filter scans to treat the text as a regular string of characters and may allow the message to slip through the cracks.<\/p>\n<h3><b>Website Forgery<\/b><\/h3>\n<p>Links from these types of phishing emails often lead to suspicious websites that will attempt to clone pages from a reputable company, including banks and retailers. The hacker will design their website with forged content that may disguise the URL in the browser or the SSL certificate.<\/p>\n<h3><b>Covert Redirect<\/b><\/h3>\n<p>Even if you verify that a link from an email points to the proper URL, it does not mean that clicking on it is safe. Due to a vulnerability known as a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/what-is-covert-redirect\/\" target=\"_blank\" rel=\"noopener noreferrer\">covert redirect<\/a>, hackers are able to exploit an authentication method on certain websites and introduce a pop-up window that is capable of stealing your username and password.<\/p>\n<h3><b>Social Engineering<\/b><\/h3>\n<p>The concept of social engineering covers a range of scenarios where a cybercriminal tries to gain your trust in order to steal credentials or other identifying information. Such an attack usually involves psychological manipulation, or even establish real-world relationships built over time that carry over into the online space and result in the victim developing trust of the attacker.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Social Engineering Prevention&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1049089,&quot;3&quot;:{&quot;1&quot;:0},&quot;12&quot;:0,&quot;23&quot;:1}\" data-sheets-formula=\"=HYPERLINK(&quot;https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/&quot;,&quot;Social Engineering Prevention&quot;)\"><a class=\"in-cell-link\" href=\"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/\">Social Engineering Prevention<\/a><\/span><\/p>\n<h3><b>Voice Phishing<\/b><\/h3>\n<p>Voice phishing is a newer trend that is spreading across much of the world. During these types of phishing attacks, you receive a series of calls to your mobile or landline phone from a computerized or human source. The attacker will usually pose as a bank or utility company notifying you about an issue with your account. This is a scheme to gain your trust so that you will provide your credit card or social security number over the phone.<\/p>\n<h2><b>Tips for Protecting Yourself<\/b><\/h2>\n<p id=\"last\"><b>Due Diligence:<\/b> Educating yourself on the evolving particulars of different types of phishing threats and staying vigilant are the two primary ways to avoid becoming a victim. Every time you receive an email with a hyperlink, double-check the sender and verify the URL. Laziness or complacency can lead to a costly mistake.<\/p>\n<div id=\"slidebox\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" data-portal=\"5442029\" data-id=\"aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\"><span class=\"hs-cta-node hs-cta-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" id=\"hs-cta-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p><b>Secure the Connections:<\/b> If you use a public wi-fi network, be even more careful about how you connect online. Lurking near these spots, which are rarely secured, is a favorite bad guy strategy that almost guarantees access to private information. The best way to fight back is by installing a virtual private network (VPN). This service has gained recent popularity as perhaps the best anonymity and security tool at your disposal. Given the rising risk climate, consider a VPN mandatory any time you\u2019re online.<br \/>\n<b>Hidden Risk in Data Center Downtime: <\/b>You might think breach attempts on your web host servers are their problem, but the reality is that purveyors of <a href=\"https:\/\/www.zdnet.com\/article\/venom-security-flaw-millions-of-virtual-machines-datacenters\/\" target=\"_blank\" rel=\"noopener noreferrer\">malware strains like Venom<\/a> bypass connections and trick your host into going into emergency maintenance mode. During this downtime, malware is introduced that allows a hacker to take over a data center and all the websites stored on servers. It\u2019s the ultimate inside job.<\/p>\n<p>Given the preceding, it\u2019s critical to find an ISP with a defensive mindset and reliable uptime. This means they have less exposure to Venom-style attacks. As community-run research group HostingCanada.org <a href=\"https:\/\/hostingcanada.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">found in a multi-year review of popular web hosts<\/a>, the top hosting companies ranged widely in uptime - between 97.65% to 99.99%. The difference - 2.34% - is equivalent to nearly eight and a half <i>days<\/i> of downtime over the course of a year.<\/p>\n<p>That tells you how long each web host was down and vulnerable to attack.<\/p>\n<h2><b>The Bottom Line<\/b><\/h2>\n<p>Different types of phishing attacks represent a serious threat to online security for every person with a computer, tablet, or smartphone. Hackers see it as an easy way to trick people into divulging sensitive information.<\/p>\n<p>If you're not careful, you can end up on a dangerous website or open a malicious file and find yourself under a sudden virus attack. To avoid this unpleasant scenario you should understand the risks and know about various types of phishing. Hopefully, this guide helps with that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet can be a dangerous place no matter how tech-savvy you are. Massive data breaches have become a part of the daily news cycle, mainly because of the vast number of hackers out there looking for new ways to infiltrate systems and steal private information.<\/p>\n","protected":false},"author":46,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[878,888],"tags":[923],"class_list":["post-33547","post","type-post","status-publish","format-standard","hentry","category-msp-university","category-security-guides","tag-anti-phishing"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=33547"}],"version-history":[{"count":3,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33547\/revisions"}],"predecessor-version":[{"id":58134,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33547\/revisions\/58134"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=33547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=33547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=33547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}