PhishingBox: Exceptional Support and Success Teams
A look at how PhishingBox’s tailored solutions and dedicated support teams fortify your defense.
The types of phishing are defined in this post. This list defines phishing, spear-phishing, clone phishing, and whaling.
If you’re reading this blog you probably already know a good bit about security. But for those of you who are just getting started in this field, or those who want to learn a little more about the types of phishing, we’ve pulled to a list of some of the various phishing techniques currently in use today.
Phishing: Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Spear Phishing: Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.
Clone Phishing: A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a re-send of the original or an updated version to the original.
This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.
Whaling: Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.