Tricks and tactics used in phishing !!!!

in cybersecurity •  2 years ago 

تنزيل (16).jpeg

Reliance on technology is increasing in our daily lives and the Internet is increasingly used to accomplish many vital tasks, but with increasing reliance on the Internet, so does the risk of phishing. Phishing is one of the most dangerous types of cybercrime, through which attackers try to seize personal and sensitive information, such as passwords, bank account data, and other vital information.
Therefore, phishing, or what is known as "phishing", is one of the most malicious methods which cybercriminals use to extract personal and financial information from victims. To achieve their goals, attackers use many malicious tricks and tactics that we must be aware of to avoid falling into their trap. In this article, we will review some of these malicious tricks and tactics, including:

images (17).jpeg

1- Fake email phishing: Fake email is one of the most commonly used phishing tricks. An attacker creates an email representing a trusted organization or a known person and asks you to click on a fake link or download a mined file with malicious programs and viruses. This type of attack is based on phishing, where the fake email appears realistically and the fake link or mined file can have a name similar to the real link or the correct file, making it difficult to verify.

images (16).jpeg

2- Phishing with a fake identity: Attackers sometimes use a fake identity to gain access to your personal information. An attacker can contact you via phone, email or even via social media, He claims to work for a company, government agency or official bank and needs certain information from you to confirm and activate your account in that institution. Therefore, you must make sure of the identity of the person who is talking to you before providing any personal information, and you must not send any personal information to any party, as the official and trusted authorities do not ask you for such information.

images (18).jpeg

3- Malware: Malware is one of the most common tactics used by attackers in phishing. This software is software that is installed on your computer without your knowledge .They are used to steal your personal data or destroy your data. Malicious software varies from simple spyware to viruses that destroy your operating system, and such programs are usually integrated into links, files or applications mined by these malicious programs and when clicked, they are installed in the victim's device.

images (13).jpeg

4- Fake text messages: Fake text messages are one of the latest tactics used by attackers in phishing. These messages are text messages that try to convince you to click on a fake link or enter personal information. Attackers sometimes use "hybrid phishing," using fake text messages to persuade you to download a mined app on your mobile phone.

images (15).jpeg

5- Social phishing attacks: These attacks consist in using social networks to access your personal information. Attackers typically use users' information on social networks, such as photos, favorite sites, and personal information, to design a targeted and effective attack. Attackers can use this information to camouflage, mislead, manipulate victims, and obtain more sensitive information.

تنزيل (17).jpeg

6- Create a fake website similar to a trusted site: This phishing is to send an email in which the attacker claims to belong to a trusted institution and asks the user to update the account information or enter the website to perform a certain operation, and when you click on the link in the e-mail, the user is directed to a fake web page and when the victim types his personal information such as the username and password on this fake site, this personal information is stolen and then logged in. To the victim's account and withdraw his money balance if it is a bank account.

Conclusion , to protect yourself from these tricks and tactics, you should take some preventive steps. For example,

  1. you should enable two-step verification for all your online accounts,
  2. avoid clicking on suspicious links and validate them before clicking on them,
  3. install antivirus and antivirus software on your computer.
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!