Got it

Overview of Phishing Attacks - Part-01

Latest reply: Nov 12, 2021 12:33:12 433 31 15 0 0

HI Hi, Greetings!  i_f47.gif

Today, I would like to share with you an article about the overview of phishing attacks - Part-01 and 02.


Phishing Attacks:


Phishing is a form of social engineering assault that seeks to take advantage of legitimate system users' gullibility and/or naivety.


This form of attack got its name from the fact that it uses bait, just like its homophone "fishing." Bait is frequently disguised as an appealing email in phishing attacks. Attackers go to considerable measures to make their emails look as genuine as possible. The majority of these emails link recipients to an attacker-controlled website where malware is sent, or user credentials are intercepted.

 

oo


Types of phishing attacks:


The attacks can be divided into two categories.

  1. Standard phishing attacks

  2. Spear phishing attacks


1- Standard phishing attacks:


Attacks that target a large number of people and rely on one or more victims are known as standard attacks. The attacker realizes that this is a haphazard approach. However, since the attacker only needs one successful victim to build a footing, this isn't a big deal. With universal bait, these schemes target a large audience.

 

Example:


  • An attacker impersonating a member of the IT department sends a bulk email to staff.

  • The email serves as a reminder to recipients to complete the required annual online IT security training module; nevertheless, the training module is controlled by the attacker.

  • The affected user is directed to input their employee credentials during the course, which is subsequently sent straight to the attacker.

 

A double-edged sword is a mass distribution. A larger dispersion increases the chances of enticing in at least one victim. At the same time, there's a better chance of attracting the notice of the organization's legitimate IT or security teams.

 

2- Spear phishing attacks:


This is a more targeted attack than typical phishing techniques. Because it targets fewer people through a carefully altered email, it takes more time and effort on the attacker's part. It's also customary for the attacker to spend time gaining the target's trust before instructing them to perform hostile acts. This method is more typically used to install malware on a company's internal network.

 

Example:


  • A target organization's sensitive internal project is discovered by an attacker.

  • The attacker impersonates the sender's email address.

  • The attacker sends an otherwise innocuous email with the subject line "Minutes from the last meeting" or "Action Items" to a limited recipient list.

  • The recipients receive what appears to be a real email about a recent project meeting. They are far more inclined to open the attachment since there is implicit trust.

 

Internal networks used by high-level executives in a business who are permitted to access more sensitive information have been accessed using such campaigns. The end consequence is the same as a general operation, but the compromise occurs far deeper within the company. Spear phishing is a type of phishing that seeks to extract specific information or obtain access to a company's internal network.


You are welcome to like and leave feedback in the comment area. 


Part 02 continues with the Damage and Prevent of the phishing attacks.


Link: 


Source: 

  • https://www.imperva.com/learn/application-security/phishing-attack-scam/

  • https://www.itperfection.com/network-security/phishing-attacks-cybersecurity-network-security-2fa-authentication-firewall-smishing-vishing/


M M Zaheer Hussain

Stay Safe !

tt

The post is synchronized to: Community Blog

IndianKid
Moderator Author Created Oct 18, 2021 07:08:15

good article about phishing attacks. Thanks
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 07:13:36 (0) (0)
Thanks for your kinds word  
Quality post! Thanks for sharing!
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 10:52:44 (0) (0)
Awesome  
Good post. Thanks for sharing
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 14:49:38 (0) (0)
Thanks for your feedback  
Good overview of phishing attacks!
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 14:49:33 (0) (0)
Thanks for your feedback  
Helpful post, keep up the good work!
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 14:49:25 (0) (0)
Thanks for your feedback  
BAZ
MVE Author Created Oct 18, 2021 17:07:32

Grateful for your help
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 18, 2021 17:48:54 (0) (0)
Thanks for your feedback bro  
Excellent, thank you
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 19, 2021 04:58:00 (0) (0)
Thanks for your feedback  
nice one
View more
  • x
  • convention:

zaheernew
zaheernew Created Oct 20, 2021 05:53:38 (0) (0)
Thanks  
Hi, @zaheernew
Because your series on Overview of Phishing attacks (2 parts) was very qualitative and valuable, we've decided to feature it on our Blog Collection: https://forum.huawei.com/enterprise/en/forum.php?mod=collection&action=view&ctid=431&orderby=views&order=desc
Congrats!
View more
  • x
  • convention:

zaheernew
zaheernew Created Nov 12, 2021 13:51:12 (1) (0)
No words, Thank you so much  
12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.