Resources

What is Phishing for Information?

Phishing for information is a reconnaissance technique in the MITRE F3 framework. Fraud actors use multi-channel social engineering (email, SMS, voice calls, and QR codes) to elicit credentials and one-time passcodes.

Arsen Team
3 minutes read
What is Phishing for Information?

Phishing for Information is classified under the reconnaissance tactic in the MITRE Fight Fraud Framework (F3). It covers any electronically delivered social engineering attack designed to extract credentials, one-time passcodes, or other sensitive data from a target.

Unlike phishing attacks aimed at getting a user to execute malicious code, Phishing for Information focuses entirely on data extraction. The technique spans four main delivery channels:

Channel Common Name Primary Goal
Email Phishing / Spear-phishing Credential harvesting at scale or targeted
SMS Smishing Click on shortened malicious link
QR code Quishing Redirect to fraudulent site
Voice / voicemail Vishing Real-time credential or OTP extraction

How do attackers execute Phishing for Information?

Fraud actors combine technical and psychological tools to make attacks convincing:

  • Pretext: Impersonating a bank, payment provider, help desk, or vendor creates a believable scenario.
  • Urgency: Account lockout or security alert messages pressure victims into acting without thinking.
  • Spoofing: Email spoofing, look-alike domains, shortened SMS links, and caller-ID spoofing make the source appear legitimate.
  • Header manipulation: Altering message headers, sender IDs, or phone numbers helps bypass security filters.

What is the difference between Phishing and Phishing for Information in F3?

In the F3 taxonomy, these are distinct techniques. Phishing targets the execution of malicious code or payloads on the victim's device. Phishing for Information targets the extraction of data (credentials, OTPs, account details) through deception, without requiring the victim to run anything.

This distinction matters for defenders: detection logic and training scenarios need to be calibrated to the goal of the attack, not just the channel.

Key takeaways

  • Phishing for Information maps to the Reconnaissance tactic in MITRE F3.
  • It covers four channels: email, SMS (smishing), QR code (quishing), and voice (vishing).
  • The goal is data extraction, not code execution; this distinguishes it from standard phishing in F3.
  • Attackers use urgency, impersonation, and technical spoofing to increase success rates.
  • Employees who handle sensitive data, credentials, or customer accounts are primary targets.

What is MITRE Fight Fraud Framework™ (F3)?

The MITRE Fight Fraud Framework (F3) is a curated knowledge base of tactics, techniques, and sub-techniques used by fraud actors in cyber-based financial fraud incidents. Developed by MITRE's Center for Threat-Informed Defense in collaboration with FS-ISAC, JPMorganChase, and Lloyds Banking Group, it provides a common language for fraud-fusion teams to describe, detect, and prevent financial fraud. F3 is modeled after MITRE ATT&CK® and focuses on banking institutions as its initial scope.


Book a demo

Discover why Arsen is the go-to platform for helping CISOs, security teams, and IT leaders protect their organizations against social engineering.

Frequently Asked Questions

Standard phishing in F3 aims to execute malicious code on the victim's device. Phishing for Information focuses solely on extracting data through deception, without requiring the target to run a payload.

The technique covers email phishing, spear-phishing, smishing (SMS), quishing (QR code), and vishing (voice calls and voicemail).

Regular multi-channel simulation (covering email, vishing, and smishing scenarios) combined with contextual training at the moment of failure is the most effective approach. Arsen's platform simulates all four channels with AI-generated, realistic scenarios.

It is a Reconnaissance technique describing fraud actors' use of email, SMS, voice calls, and QR codes to elicit sensitive information such as passwords, one-time passcodes, or account data from targets.

Continue reading

Meeting SOC 2 Type II Requirements with CSAT

Meeting SOC 2 Type II Requirements with CSAT

Thomas Le Coz
Thomas Le Coz

SOC 2 Type II has become the gold standard for demonstrating security and trustworthiness in the SaaS and technology sectors. Unlike Type I, which evaluates controls at a point in time, Type II measures how...

Meeting SOC 2 Type II Requirements with CSAT

Meeting SOC 2 Type II Requirements with CSAT

Thomas Le Coz
Thomas Le Coz

SOC 2 Type II has become the gold standard for demonstrating security and trustworthiness in the SaaS and technology sectors. Unlike Type I, which evaluates controls at a point in time, Type II measures how...