Guide to Phishing: Techniques &  Mitigations

In Fall of 2014, Sony Picture Entertainment became the victim of a massive phishing attack. The previous fall, hackers sent phishing emails to numerous top executives. These emails, which appeared to be from Apple, contained a link to a malicious domain. When victims visited this domain, they were prompted to enter their Apple ID information into an online form.

The attackers then used these credentials to figure out employees’ login information. They also coded the credentials into the “Wiper” malware. These actions crippled the company’s network. Eventually, the criminals stole over 100 terabytes of sensitive company data. The attack cost Sony more than $100 million.

Like Sony, many other high-profile organizations have been victims of phishing scams over the past decade, including Google and Facebook in the U.S., MacEwan University in Canada, and FACC and Crelan Bank in Europe.

Phishing scams were particularly widespread in 2021, with a staggering 83% of organizations experiencing such attacks according to one report by Proofpoint. Moreover, in Q1 2022, the Anti-Phishing Working Group (APWG’s) Phishing Activity Trends Report reported over 1 million phishing scams – an all-time high in the report’s history. All these facts show that phishing is a widespread attack vector, and all organizations must protect themselves from this threat.

This guide to phishing will take an in-depth look at what phishing is, how it works, the different types of phishing, and what organizations can do to mitigate their risk of becoming a victim of a phishing attempt. 

What is Phishing?

Phishing is a form of social engineering — often carried out via email — where attackers attempt to trick legitimate users into revealing sensitive information or performing an undesirable act. 

For example, in a phishing scam, attackers may trick victims into clicking on a link that will direct them to a fake website. The website will ask them to enter sensitive information like login credentials. Other scams direct victims to download attachments that will infect their system with dangerous malware or ransomware.

Unfortunately, any domain can become the victim of a phishing attack. This is because a large number of people reuse the same username and/or password across multiple websites.

According to one 2019 Google Security Survey, 65% of people reused the same password for multiple or all accounts. Another problem is that many people – 64% according to this report – also continue using the same password, even after a breach.

These poor cyber habits allow bad guys to spoof any site and access it using a single set of stolen credentials. They don’t even have to trick a user into logging into a fake site to get their password. As long as they can get their hands on one password that’s reused across websites, they can launch a wide-scale phishing attack and cause a lot of damage.

Most phishing attacks arrive via fake email messages that pretend to be from a legitimate person or company. Attackers also use text messages, social media, or phone calls to achieve the same goal of accessing sensitive information or tricking users into downloading malware. 

And the attack vectors don’t end there. In a 2021 survey, Ironscales found that one-third of IT professionals experienced phishing attacks via platforms for video conferencing, workforce messaging, and even file-sharing.

The History of Phishing

This term “phishing” was first used in the 1990s in reference to the first publicly-available automated phishing tool, AOHell. AOHell helped attackers steal credit card information and passwords from AOL users and influenced many other automated phishing software programs.

Around this time, other attackers adopted email as their preferred attack vector. Many started launching simple “Nigerian Prince” scams via email. The criminal claimed to be royalty and promised to wire a huge amount of money to the victim. The victim simply had to share their bank account number or send a small advance payment to the attacker’s account to help cover the expense of the money transfer. 

Once the victim fell for the scam, the “Prince” would steal the money and disappear or drain the victim’s bank account. The Nigerian Prince scam continues to operate today. It resulted in losses of $2.5 billion in 2020, according to the FBI’s Internet Crime Complaint Center (IC3).

In the late 90s and early 2000s, attackers started developing more sophisticated email campaigns that claimed to be from PayPal and contained the Mimail virus. Over the years, phishing has evolved and attackers now use a wide range of attack vectors and multiple methods such as Business Email Compromise (BEC), spear phishing, domain spoofing, and whaling.

Most recently, more flavors of phishing have emerged, such as:

  • Pharming: Installing malicious code on a victim’s device
  • Evil Twin Phishing: The scammer sets up a false WiFi network that looks real
  • Angler Phishing: The use of fake social media posts to get a victim to provide login info
  • Search Engine Phishing: The attacker makes fake products that pop up on a search engine and encourages a victim to enter sensitive information to complete the purchase.

Moreover, email is not the only medium used to perpetrate modern phishing scams. Many attackers also leverage SMS and text messages – a method known as smishing. Still others author vishing (voice phishing) scams, a type of fraud perpetrated via phone calls, voice calls, or pre-recorded robocalls.

Unusual or generic greetingsUnusual greetings from a familiar sender or generic greetings from any sender
Subject lines with unusual words or phrases, odd punctuations, or spelling mistakesWords like “free”, out-of-place punctuations, spelling errors, or unexpected emojis in serious emails
Offers that seem too good to be trueUnexpected or unsolicited offers that offer something for nothing
Unusual, unknown, or public domainEmails from public domains, misspelled domains, or domains with an additional word
Urgent or threatening toneEmails that promise dire consequences if the recipient doesn’t take a specific action
Grammatical or spelling errorsEmails from legitimate senders are normally spell-checked so messages with mistakes may indicate a phishing attempt
Suspicious links or attachmentsLinks may point to a site that steals information, and the attachment may be malware
Sender origin and request typeThe email appears to come from a known celebrity or government agency and includes unexpected requests or information

How Does Phishing Work?

According to the FBI’s 2020 Internet Crime Report, phishing was the most common cyberattack type in 2020. By 2021, it had emerged as the top concern of 90% of IT professionals, according to an Ironscales report.

How phishing works
How phishing works (source).

Modern phishing attacks have come a long way since the low-level “spray-and-pray” AOHell and Nigerian Prince scams. Many of today’s attackers use sophisticated schemes to target particular individuals or companies. They use skillful social engineering tactics to manipulate victims and steal their sensitive information.

Clever scammers impersonate legitimate organizations, “spoof” their email addresses, and create emails that look as if they came from a real person from that organization. The fake emails may include a malicious attachment or link to spur activity from the victim. The link will lead to a fake site that appears legitimate and is designed to collect user credentials, financial information, or other sensitive data. In other cases, the email might include an attachment that infects the victim’s computer with malware.

Valimail logo

See if your organization is protected

Start Assessment

Why Organizations Should Worry About Phishing

According to the Verizon 2021 Data Breach Investigations Report (DBIR), phishing was responsible for 25% of data breaches in 2020. Phishing remains a popular attack method since it is easy to author, cheap, and effective. Following such scams, victim organizations often lose their data or funds, end up with costly malware or ransomware infections, or have to contend with significant regulatory fines and damaged reputations.

Another problem is that phishing scams are often the first part of an attack. Once an attacker compromises victims’ credentials, they can potentially gain unauthorized access to multiple systems to steal financial data, business secrets, and customer data. They can then sell the data on the dark web for a huge payout.

Some attacks are designed to trick a user into deploying a malware payload, which allows the attacker to launch a full-scale attack to compromise the entire enterprise network or demand a hefty ransom from the company.

Finally, advanced persistent threat (APT) actors use phishing to establish a presence on a corporate network. They then remain inside the network to escalate privileges, severely compromise the company’s IT infrastructure, or engage in corporate espionage.

Types of Phishing

The most common types of phishing attacks include:

  • Standard Email Phishing: The scammer sends numerous fake emails asking recipients to share their personal information or login credentials. These en masse attacks work very well in organizations with low phishing awareness.
  • Spear Phishing: This attack targets specific individuals. Attackers present themselves as a genuine sender and send personalized emails to the target. Since the message includes specific details, it appears authentic, so the recipient has no reason not to trust the message or the sender.
  • Whaling: A whaling attack targets the “big fish” such as C-suite executives. It involves sophisticated social engineering tactics to manipulate the victims into wiring large amounts of money into the attacker’s account.
  • Business Email Compromise (BEC): The attacker sends fraudulent emails by spoofing a genuine account owner’s email address in order to steal money from the company.
  • Malware Phishing: In a malware phishing attack, the attacker trick victims into downloading an attachment that will install malware on their devices.

In recent years, many newer types of phishing scams have emerged, such as:

  • Polymorphic Phishing Scams: Attackers make small changes to an email’s elements so signature-based email defense programs cannot detect or flag the message.
  • Browser Hijacking: The scammer poisons search engine results so a user is redirected to a malicious site, allowing the former to generate fraudulent advertising revenue, collect user data, or log user keystrokes
  • Dynamic Phishing with a Man-in-the-middle (MitM) Component: The attacker sends phishing emails with URLs pointing to an attacker-controlled server, which fools a victim into thinking they are on a legitimate company’s page.

Strategies to Avoid and Mitigate Phishing Attacks

Organizations can protect their people and information assets from phishing attempts by following these best practices:

  • Implement email security software to block known malicious domains and antivirus software to scan all emails and attachments.
  • Use training and phishing simulations to give employees a safe space to test their phishing knowledge.
  • Ensure that users always use strong passwords and multi-factor authentication (MFA) to secure their accounts and devices.
  • Discourage users from sharing or reusing passwords to minimize the possibility of credential compromise. These steps reduce the chances of credential stuffing and subsequent attacks and breaches if an account is compromised.
  • Encourage users to use a password manager to securely store their passwords.
  • Discourage users from opening emails and attachments from unknown or suspicious senders.
  • Educate users on the “red flags” that are signs of a phishing attempt. 

Valimail logo

Learn the best practices to prevent phishing

Learn More

Checkbox icon

Educate employees by sharing this guide with them

Checkbox icon

Implement email filtering tools including inbound DMARC validation

Checkbox icon

Publish a DMARC record for your domain

Learn More About Phishing

Phishing is a broad topic and we’ve only covered the tip of the iceberg. Click on the links below to learn more about the specific areas of phishing:

Chapter 1: Spear Phishing vs. Phishing

Learn how spear phishing differs from traditional phishing.

Chapter 2: Clone Phishing

In clone phishing, a malicious actor copies the look, feel, and content of a legitimate message to gain the recipient’s confidence. Learn how it works and why organizations should guard against it.

Chapter 3: What Is a Common Indicator of a Phishing Attempt

Learn to recognize phishing attempts by using common indicators. Follow a few recommendations to avoid being the target of phishing attacks.

Chapter 4: Executive Phishing: Real World Examples & Strategies

Examine how executive phishing – also known as CEO fraud – attacks work in the real world and strategies for mitigating your organization’s risk.

Chapter 5: Top 6 Phishing Prevention Best Practices

Overview of the mechanics of a phishing attempt and key phishing prevention best practices that can help you prevent threat actors from gaining a foothold in your network.

Chapter 6: URL Phishing: Real World Examples & Strategies

Malicious links are one of the primary strategies attackers use to pilfer your sensitive data. Learn how to harden your security posture for mitigation and protect your organization.

Chapter 7: Phishing vs. Pharming

Pharming requires an attacker to gain unauthorized access to a system, while phishing only requires successful social engineering. Walkthrough a real attack and how to harden your security posture for mitigation.

Chapter 8: Payment Confirmation Spam Emails

When someone reads that they have been charged for something unfamiliar – they are prone to panic. Learn the red flags and how businesses can help mitigate impersonation so their reputations are less likely to be abused.

Chapter 9: Phishing vs. Spoofing

A phishing attack fraudulently impersonates a legitimate source, while spoofing allows the attacker to mask their origin and appear to be someone or something else. Walkthrough an actual attack and mitigation tactics against these twin threats.

Chapter 10: Domain Hijacking

Recovering from the loss of trust after an attack like this is uniquely challenging. Learn how it works, its impact, and various prevention and mitigation tactics to reduce risk.

Chapter 11: What does BEC stand for

Understand BEC (Business Email Compromise) with real-world examples and explanations of the underlying mechanics.

Stay tuned. More chapters coming soon!

Like this article?

Subscribe to our LinkedIn Newsletter to receive more educational content

Subscribe now