A targeted phishing method aimed at specific individuals or organizations.
Techniques:
Finance
Healthcare
Government sectors
A common phishing method where attackers impersonate a legitimate company to steal personal data.
Techniques:
A phishing attack targeting high-level executives to steal sensitive information.
Techniques:
Finance
Technology
Government
Voice phishing that uses phone calls to trick victims into revealing personal information.
Techniques:
SMS phishing that uses text messages to deceive victims into revealing sensitive data.
Techniques:
Finance
E-commerce
Telecommunications
A phishing attack where a legitimate email is cloned and altered to include malicious content.
Techniques:
Finance
Technology
Healthcare
A cyberattack that redirects users from legitimate websites to fraudulent ones.
Techniques:
Finance
E-commerce
Government
A phishing attack where a fake Wi-Fi network mimics a legitimate one to intercept data.
Techniques:
Finance
Hospitality
Public Spaces
A phishing technique that uses HTTPS to trick users into trusting fraudulent websites.
Techniques:
Finance
E-commerce
Social Media
A phishing method that uses fake pop-up windows to trick users into providing information.
Techniques:
Finance
E-commerce
Technology
A phishing scam where attackers impersonate a CEO to authorize fraudulent transactions.
Techniques:
Finance
Manufacturing
Retail
An attack where hackers infect websites commonly visited by a target group.
Techniques:
Search Engine Phishing
Medium
A phishing method where fake websites are indexed by search engines to attract victims.
Techniques:
Social Media Phishing
Medium
Phishing attacks conducted via social media platforms to steal information.
Techniques:
Finance
Technology
Education
A phishing technique where attackers impersonate customer service accounts on social media.
Techniques:
A phishing technique that changes inactive browser tabs to mimic login pages.
Techniques:
Finance
Email services
Social Media