Phishing
Phishing is a deceptive cyberattack technique used to trick people into revealing sensitive information or performing harmful actions.
Definition
Phishing is a form of social engineering in which attackers impersonate trusted companies, individuals, or services to obtain passwords, payment details, account credentials, or other confidential data. These attacks commonly arrive through email, SMS messages, phone calls, fake websites, social media messages, or malicious attachments. In many cases, phishing campaigns create a sense of urgency, fear, or reward to pressure victims into clicking links, downloading files, or entering personal information. In online advertising and affiliate fraud environments, phishing can also be used to steal user identities, abuse stolen payment methods, or impersonate legitimate offers in order to generate fraudulent commissions.
Pros
- Requires very little technical skill compared to other cyberattack methods.
- Can be distributed at large scale through automated email, SMS, or messaging campaigns.
- Often succeeds by exploiting human behavior rather than software vulnerabilities.
- Can be adapted for highly targeted attacks such as spear phishing or executive impersonation.
- May be combined with malware, credential theft, or financial fraud schemes.
Cons
- Modern spam filters, anti-phishing tools, and browser protections can block many attacks.
- Users are increasingly trained to recognize suspicious messages and fake websites.
- Phishing campaigns can be reported, traced, and shut down quickly.
- Attackers risk legal consequences if identified.
- Poorly designed phishing attempts are often easy to detect due to spelling mistakes, fake domains, or unusual requests.
Use Cases
- Sending fake banking emails that ask users to verify account credentials.
- Creating counterfeit login pages for business tools, cloud services, or e-commerce platforms.
- Using SMS phishing campaigns to impersonate delivery companies or payment providers.
- Conducting spear phishing attacks against company employees to steal internal access credentials.
- Impersonating legitimate affiliate programs, offers, or advertisers to collect user data and commit payment fraud.