Got it

Overview of Phishing Attacks - Part-01

Latest reply: Nov 12, 2021 12:33:12 432 31 15 0 0

HI Hi, Greetings!  i_f47.gif

Today, I would like to share with you an article about the overview of phishing attacks - Part-01 and 02.


Phishing Attacks:


Phishing is a form of social engineering assault that seeks to take advantage of legitimate system users' gullibility and/or naivety.


This form of attack got its name from the fact that it uses bait, just like its homophone "fishing." Bait is frequently disguised as an appealing email in phishing attacks. Attackers go to considerable measures to make their emails look as genuine as possible. The majority of these emails link recipients to an attacker-controlled website where malware is sent, or user credentials are intercepted.

 

oo


Types of phishing attacks:


The attacks can be divided into two categories.

  1. Standard phishing attacks

  2. Spear phishing attacks


1- Standard phishing attacks:


Attacks that target a large number of people and rely on one or more victims are known as standard attacks. The attacker realizes that this is a haphazard approach. However, since the attacker only needs one successful victim to build a footing, this isn't a big deal. With universal bait, these schemes target a large audience.

 

Example:


  • An attacker impersonating a member of the IT department sends a bulk email to staff.

  • The email serves as a reminder to recipients to complete the required annual online IT security training module; nevertheless, the training module is controlled by the attacker.

  • The affected user is directed to input their employee credentials during the course, which is subsequently sent straight to the attacker.

 

A double-edged sword is a mass distribution. A larger dispersion increases the chances of enticing in at least one victim. At the same time, there's a better chance of attracting the notice of the organization's legitimate IT or security teams.

 

2- Spear phishing attacks:


This is a more targeted attack than typical phishing techniques. Because it targets fewer people through a carefully altered email, it takes more time and effort on the attacker's part. It's also customary for the attacker to spend time gaining the target's trust before instructing them to perform hostile acts. This method is more typically used to install malware on a company's internal network.

 

Example:


  • A target organization's sensitive internal project is discovered by an attacker.

  • The attacker impersonates the sender's email address.

  • The attacker sends an otherwise innocuous email with the subject line "Minutes from the last meeting" or "Action Items" to a limited recipient list.

  • The recipients receive what appears to be a real email about a recent project meeting. They are far more inclined to open the attachment since there is implicit trust.

 

Internal networks used by high-level executives in a business who are permitted to access more sensitive information have been accessed using such campaigns. The end consequence is the same as a general operation, but the compromise occurs far deeper within the company. Spear phishing is a type of phishing that seeks to extract specific information or obtain access to a company's internal network.


You are welcome to like and leave feedback in the comment area. 


Part 02 continues with the Damage and Prevent of the phishing attacks.


Link: 


Source: 

  • https://www.imperva.com/learn/application-security/phishing-attack-scam/

  • https://www.itperfection.com/network-security/phishing-attacks-cybersecurity-network-security-2fa-authentication-firewall-smishing-vishing/


M M Zaheer Hussain

Stay Safe !

tt

The post is synchronized to: Community Blog

Hi, @zaheernew
Because your series on Overview of Phishing attacks (2 parts) was very qualitative and valuable, we've decided to feature it on our Blog Collection: https://forum.huawei.com/enterprise/en/forum.php?mod=collection&action=view&ctid=431&orderby=views&order=desc
Congrats!
View more
  • x
  • convention:

zaheernew
zaheernew Created Nov 12, 2021 13:51:12 (1) (0)
No words, Thank you so much  
zaheernew
MVE Author Created Oct 17, 2021 14:16:10

  • x
  • convention:

Unicef
Unicef Created Oct 17, 2021 15:21:22 (0) (0)
 
Rumana
Rumana Reply Unicef  Created Oct 17, 2021 15:27:57 (0) (0)
 
Saqib123
Saqib123 Created Oct 17, 2021 17:08:59 (0) (0)
 
wissal
wissal Created Oct 17, 2021 17:40:27 (0) (0)
 
Well done post thanks
View more
  • x
  • convention:

Thanks for your sharing
View more
  • x
  • convention:

Thanks for your sharing
View more
  • x
  • convention:

Good content
View more
  • x
  • convention:

andersoncf1
MVE Author Created Oct 17, 2021 19:23:16

Good
View more
  • x
  • convention:

BAZ
MVE Author Created Oct 17, 2021 20:20:58

Phishing attack is one the most common
View more
  • x
  • convention:

good one
View more
  • x
  • convention:

Good post
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.