What is Phishing?

What is Phishing?

Phishing is a social engineering technique that tricks victims into divulging sensitive information or performing actions that may cause harm to a device or network system. Phishing is considered the most common cyber-attack vector among organisations today, which often results in reputational, financial or information loss.

Commonly associated techniques often presented in a phishing attack include:
Impersonation
  • It is a deceptive technique whereby attackers use a fake identity or mimic a known brand or company to convince victims.
Web spoofing
  • A technique that uses website pages that mimic legitimate websites to trick victims. Typically, the elements present from these pages include a look-alike domain, copying the legitimate brand logos to enhance the page’s look.
    Setting up look-alike domains is a sophisticated technique that convinces victims to think they are still accessing legitimate or related pages.
    Some of the methods used to introduce a look-alike domain include the following examples:

Malware

Malware or Malicious Software is often used to complement phishing attacks presented as attachments on emails or links embedded within attachments that directs you to download the malware. A malware, when installed on a machine, may perform different activities that benefit the attacker, such as:

 

 

 

 

 

 

 

 

 

 

Some of the common formats of malicious software include:

  • *.HTM/*.HTML – hyper markup language
  • *.JS – Java Script
  • *.EXE – Executable
  • *.VBS – Visual Basic Script
IMPORTANT: In some cases, office extensions may also be exploited and embed malicious software codes. However, our Trend Micro solution on email gateways (ApexOne) and end-point agent (Office Scan) performs malware detection and prevents it from getting delivered to your Outlook inbox.

Other Important Information