Resources

Phishing: Ultimate Guide 2024 | How to Recognize and Prevent Attacks

Phishing is a vast subject, we’ve seen all sorts of information about it, from facts to fiction. We’ve published this page to deep dive into the subject and provide you with a complete view and understanding of what is phishing.

Arsen Team
7 minutes read
What is vishing?

What is phishing?

Phishing is a type of cyberattack where attackers attempt to deceive individuals into providing sensitive information, such as usernames, passwords, credit card numbers, or other personal data.

In some cases, they also attempt to make their targets open and execute attachments containing malwares.

These attacks often involve masquerading as a trustworthy entity or person in electronic communications.

History and evolution

Phishing evolves just like email marketing: at first, undifferentiated emails were mass sent to email addresses. Then, personalization and segmentation came in and now we’re starting the generative AI era, with a more conversational, multi-stage approach.

Let’s look at the evolution of phishing.

Phishing started in the 1990s with the rise of the Internet. It was usually simple scams tricking people into revealing personal information.

The 2000s saw a more widespread adoption of emails and with it, an increase of email-based phishing attacks.

In the 2010s, phishing techniques evolved with more targeted attacks (spear phishing), on high value targets (whaling) and using different vectors such as SMS (smishing).

At the moment, we’re seeing an evolution with an increased usage of generative AI in attacks.

Types, techniques and tactics used in phishing

Because “phishing” is used very broadly, we’ll talk about different types of phishing attacks.

Email Phishing

“Phishing” is usually used to describe email phishing: ending fraudulent emails that appear to come from legitimate sources, such as banks, social media platforms, or trusted companies.

It uses:

  • Links or attachments: designed to compromise the target by stealing information or gaining access to its computer.
  • Social engineering tactics: designed to create a reaction and deceive the target.

Spear Phishing

Spear phishing is a targeted phishing attack aimed at a specific individual or organization. The attacker customizes the email content based on information they have gathered about the target.

It uses:

  • Personalization: The email often includes the recipient's name, position, and other personal details to make it more convincing.
  • Research: Attackers research their targets to craft a more believable message.
  • Attachments and Links: Similar to email phishing, these emails may contain malicious attachments or links.
  • Social engineering: just like regular phishing

Whaling

Whaling is a type of spear phishing that targets high-profile individuals within an organization, such as executives or senior management.

It uses most of the spear phishing tactics but most often also adds impersonation to the mix, to make it seem like it comes from a person of authority, with an existing relationship with the target.

Smishing

Smishing involves sending fraudulent SMS (text) messages to trick recipients into providing personal information or downloading malware.

Vishing

Vishing (voice phishing) involves making phone calls to deceive individuals into revealing sensitive information.

Pharming

Pharming is closely related to phishing but is quite different from the previous types of attacks.

Pharming redirects users from legitimate websites to fraudulent ones without their knowledge. This is often done by exploiting vulnerabilities in DNS (Domain Name System) servers.

Recognizing phishing attacks

Recognizing phishing attacks involves being aware of the various signs that typically indicate fraudulent activity. Here are some common indicators to look out for.

Suspicious Sender Addresses

There are two types of suspicious sender addresses: misspelled or slightly altered domains are the most suspicious as they are often used to impersonate people or brands, but you should also be wary of generic email addresses from Gmail, Yahoo and Outlook, especially if it doesn’t align with who they pretend to be.

Generic Greetings and Messages

Mass-phishing often uses vague language and lacks personalization.

Spelling and Grammar Errors

While attackers can use generative AI and spelling correctors, we still find phishing emails with spelling and grammatical errors, usually due to the fact that attackers might not natively speak your language.

Pressure mechanisms: Urgency and Threats

Phishing relies on pressure mechanisms to create a quick emotional reaction and deceive people. Train yourself to detect this feeling and see it as a warning sign.

Emails with unexpected attachments or links can be potential phishing emails, treat them carefully.

Mismatch Between Display Name and Email Address

If the display name might appear legitimate, but the actual email address may not match the claimed sender, this is an impersonation attempt and a big red flag.

Prevention and Protection

Phishing prevention and protection is a combination of human training and technological measures to reduce exposition and the amount of threats actually connecting with their targets.

Awareness Training

Employees should be trained to detect and report phishing attempts.

Effective training should consist of theoretical knowledge and practical training, using phishing simulations.

Because phishing, like all social engineering attacks, relies on deception and creating emotional reactions, it’s important to adopt a learn-by-doing approach to create new behavior, rather than focusing solely on knowledge acquisition.

Training should focus on:

  • Detection reflexes and heuristics: be wary when emails use pressure mechanisms to create a reaction
  • Reporting procedure to alert relevant parties to potential threats

Technological measures

A succession of tools and configurations should help reduce the amount of phishing directly connecting with employees.

Amongst them:

  • Secure Email Gateways should help filter and prevent phishing emails from being delivered
  • Multi-Factor Authentication should complexify phishing-based credential harvesting attacks, especially if the authentication factor is based on FIDO2 or similar phishing resistant protocols
  • Email Authentication Protocols like SPF, DKIM and DMARC also help prevent phishing attacks
  • Deploy Security Awareness Training platforms with strong automation capabilities to provide relevant training on autopilot

Responding to phishing attacks

If you think you received a phishing email, here are steps to follow. You can also share this process with your employees, if you don’t already have a process in place.

  1. Do not interact with the phishing email: do not answer, click links or execute attachments
  2. Report the phishing attempt to the relevant parties, using a report button if applicable
  3. If you’ve interacted with the phishing email and its content, explain what you’ve done to the relevant parties so they can trace and potentially remediate to any leak or vulnerability introduces

Phishing keeps evolving. From criminals getting more and more specialized to new technologies and developments, let’s have a quick look at the future of phishing.

Conversational phishing

More and more phishing attacks are now based on conversations, creating rapport and sender reputation, rather than being a one-way email with links or attachments, that constitutes obvious red flags.

With the proliferation of generative AI, these attacks can now scale and will continue to evolve.

Deep fakes

With the recent improvements in synthetic media generation, deep fakes can be used to reinforce impersonation attempts in phishing operations.

Detection is harder with these technologies and the likelihood of success for the attacker is greater.

Emerging communication platforms

New communications platforms are new ways for the attacker to connect with their victims.

New social media platforms, ticketing and support systems, etc. bring new opportunities to deliver malicious content and attack attempts.

One common trait

One interesting thing to note is that despite a lot of developments on the technological side, the key social engineering techniques are still the same, no matter the attack vector.

This is why proper awareness training, based on behavior training, still represents a very adaptable and cost efficient defense system.

Book a demo

Learn what makes Arsen the go-to platform to help CISOs, cyber experts, and IT teams protect their organizations against social engineering.

Frenquently Asked Questions

Phishing attacks typically work by sending fraudulent messages that appear to come from legitimate sources. These messages often contain malicious links or attachments designed to steal personal information or install malware on the victim’s device.

Common signs of a phishing email include:

  • Suspicious sender addresses that may be misspelled or slightly altered.
  • Generic greetings like “Dear Customer” instead of your name.
  • Urgent or threatening language prompting immediate action.
  • Poor spelling and grammar.
  • Unsolicited attachments or links.
  • Mismatched URLs when hovering over links.

If you receive a suspicious email or message:

  • Do not click on any links or open any attachments.
  • Verify the sender’s identity by contacting them through a known and trusted method.
  • Report the email to your email provider using their phishing report feature.
  • Delete the suspicious email or message.

To protect yourself from phishing attacks:

  • Be cautious of unsolicited communications.
  • Verify the source of messages before responding or clicking links.
  • Use strong, unique passwords for each account.
  • Enable multi-factor authentication (MFA) on your accounts.
  • Keep your software and systems updated.
  • Use reputable antivirus and anti-malware software.
  • Educate yourself on common phishing tactics and stay informed about new threats.

Phishing attacks continue to occur because they are effective and relatively easy to execute. Despite advances in technology and security measures, human error and the constant evolution of phishing tactics keep these attacks prevalent.

Continue reading

Classification of the difficulty level of phishing

Classification of the difficulty level of phishing

Lïa Desmousseaux de Givré
Lïa Desmousseaux de Givré

Not all phishing emails are equal. When I ask someone what they think of a "phishing email," the descriptions are very varied. Among these descriptions, the level of difficulty, that is to say, how difficult it is to detect the fraud, also...

What is phishing? Cyberattack's most popular initial access vector

What is phishing? Cyberattack's most popular initial access vector

Lïa Desmousseaux de Givré
Lïa Desmousseaux de Givré

Whether it's clicking on a malicious link or sending confidential data to a fake third party, if the threat is always external, 90% of effective cyber attacks involve an error resulting from human exploitation. It is based on this fact...