Phishing Attack Database | AntiPhish.AI

Phishing Attack Database

Spear Phishing

Spear Phishing

High

A targeted phishing method aimed at specific individuals or organizations.

Corporate Users
Critical
Techniques:
Finance
Healthcare
Government sectors
5
Deceptive Phishing

Deceptive Phishing

Medium

A common phishing method where attackers impersonate a legitimate company to steal personal data.

General Users
High
Techniques:
Finance
Retail
Healthcare
1
Whaling

Whaling

High

A phishing attack targeting high-level executives to steal sensitive information.

Corporate Executives
Critical
Techniques:
Finance
Technology
Government
3
Vishing

Vishing

Medium

Voice phishing that uses phone calls to trick victims into revealing personal information.

General Users
High
Techniques:
Finance
Healthcare
Retail
7
Smishing

Smishing

Medium

SMS phishing that uses text messages to deceive victims into revealing sensitive data.

Mobile Users
High
Techniques:
Finance
E-commerce
Telecommunications
8
Clone Phishing

Clone Phishing

High

A phishing attack where a legitimate email is cloned and altered to include malicious content.

Corporate Users
Critical
Techniques:
Finance
Technology
Healthcare
6
Pharming

Pharming

High

A cyberattack that redirects users from legitimate websites to fraudulent ones.

General Users
Critical
Techniques:
Finance
E-commerce
Government
9
Evil Twin Phishing

Evil Twin Phishing

High

A phishing attack where a fake Wi-Fi network mimics a legitimate one to intercept data.

Mobile and Remote Users
Critical
Techniques:
Finance
Hospitality
Public Spaces
10
HTTPS Phishing

HTTPS Phishing

Medium

A phishing technique that uses HTTPS to trick users into trusting fraudulent websites.

General Users
High
Techniques:
Finance
E-commerce
Social Media
11
Pop-up Phishing

Pop-up Phishing

Medium

A phishing method that uses fake pop-up windows to trick users into providing information.

Web Users
Moderate
Techniques:
Finance
E-commerce
Technology
12
CEO Fraud

CEO Fraud

High

A phishing scam where attackers impersonate a CEO to authorize fraudulent transactions.

Corporate Employees
Critical
Techniques:
Finance
Manufacturing
Retail
4
Watering Hole Attack

Watering Hole Attack

High

An attack where hackers infect websites commonly visited by a target group.

Specific Organizations
Critical
Techniques:
Finance
Defense
Energy
13
Search Engine Phishing

Search Engine Phishing

Medium

A phishing method where fake websites are indexed by search engines to attract victims.

Web Users
High
Techniques:
Finance
E-commerce
Travel
14
Social Media Phishing

Social Media Phishing

Medium

Phishing attacks conducted via social media platforms to steal information.

Social Media Users
High
Techniques:
Finance
Technology
Education
15
Angler Phishing

Angler Phishing

Medium

A phishing technique where attackers impersonate customer service accounts on social media.

Social Media Users
High
Techniques:
Finance
Retail
Technology
16
Tabnabbing

Tabnabbing

Medium

A phishing technique that changes inactive browser tabs to mimic login pages.

Web Users
High
Techniques:
Finance
Email services
Social Media
17