Phishing
From smaller fish to whales: everybody can be lured in by just the right bait.
Phishing continues to be a serious and widespread threat in cybersecurity. It targets human behaviour, manipulates trust, and adapts rapidly, posing significant risks to individuals, businesses, and public institutions. Although efforts to raise awareness have grown in recent years, phishing remains highly effective and is still one of the most commonly used attack methods.
What is phishing?
Phishing is a social engineering attack in which cybercriminals impersonate trusted entities to trick individuals into revealing sensitive information, such as login credentials, financial details, or authentication codes. It is typically executed through deceptive emails, SMS messages (smishing), social media, fake websites, or even phone calls (vishing).
The goal is to manipulate victims into taking action: clicking on a link, downloading a file, or entering data on a fraudulent site. From there, attackers can gain unauthorized access to accounts, deploy malware, or sell stolen information on the dark web.
How phishing works
- 1Attack staging
The attacker prepares fake websites, messages, or forms, often using phishing kits purchased online. - 2Delivery
Victims are targeted through email, SMS, malicious ads, or social engineering. - 3Credential theft
Once the victim enters their data, it is harvested in real time. - 4Use
Attackers log into real services immediately; sometimes while the user is still on the phishing page.
Types of phishing
- Email phishing
The most widespread form, where attackers impersonate trusted brands or contacts via deceptive emails. - Spear Phishing
Personalised and targeted emails crafted for a specific individual or organisation. - Whaling
Whale phishing or whaling is a type of spear phishing that specifically targets high-profile individuals like CEOs or CFOs. - Smishing
SMS-based phishing, often including shortened links or fraudulent payment requests. - Vishing
Voice phishing conducted over the phone, where attackers impersonate tech support, banks, or internal personnel. - Search engine phishing
Fake ads or listings in search engine results that direct users to fraudulent websites. - Secondhand platform phishing
Scams carried out through online marketplaces (e.g., fake bank transfer links on webshops like Facebook Marketplace). - Social media phishing
Fake messages or posts shared through platforms like LinkedIn or Facebook to steal credentials or spread malware.
Why phishing remains so prevalent
- Low barrier to entry
The rise of phishing kits and Phishing-as-a-Service (PhaaS) platforms on the dark web allows even low-skilled individuals to deploy convincing phishing campaigns with little effort or expertise. These ready-made toolkits often come with templates, hosting infrastructure, and detailed instructions. - High ROI for attackers
A single successful phishing attempt can lead to unauthorised access to critical systems, stolen credentials, financial theft, or even full-blown ransomware attacks. - Real-time credential theft
Advanced phishing pages can capture and transmit login information instantly, allowing attackers to access real accounts while victims are still interacting with the phishing site. - MFA bypass capabilities
Attackers now use tools like EvilProxy to intercept and exploit multi-factor authentication flows, significantly reducing the effectiveness of even well-configured MFA setups. - Cross-platform reach
Beyond traditional email phishing, attackers leverage smishing (SMS), social media DMs, search engine ads, and secondhand marketplaces to widen their reach and catch users off guard. - AI-driven realism
One of the most transformative trends is the use of generative AI to craft highly realistic and grammatically flawless phishing emails. These AI-generated messages are often context-aware, tailored to the recipient, and free of the common red flags people are trained to spot. This makes them significantly more effective at tricking even cautious users.
Defensive measures
- Security awareness training
Ongoing training and simulations help employees identify red flags, such as suspicious links, urgent requests, and impersonation tactics. - Email authentication
Protocols like SPF, DKIM, and DMARC verify legitimate email senders and help prevent spoofing. - Real-time credential theft
Advanced phishing pages can capture and transmit login information instantly, allowing attackers to access real accounts while victims are still interacting with the phishing site. - Web filtering and isolation
Secure web gateways block access to known phishing domains and malicious links. - Endpoint and email security solutions
Behavioural-based tools detect and block suspicious files, messages, and login attempts. - Multi-factor authentication
While not infallible, MFA still makes it harder for attackers to gain access, especially when using hardware tokens or app-based authentication. - Managed Detection and Response (MDR)
An MDR partner provides 24/7 monitoring, real-time response, and in-depth threat analysis. It detects threats that bypass traditional filters and responds quickly to contain them, making it a critical layer for dealing with today’s advanced phishing campaigns.
Explore our MDR service
Looking for comprehensive cybersecurity solutions tailored to your organisation's needs? Explore our Managed Detection and Response (MDR) services. Our SOC provides scalability, cost-effectiveness, and access to specialised expertise. Our MDR services help organisations detect, analyse, and respond to cyber threats in real time, leveraging advanced threat intelligence and proactive monitoring to identify and mitigate risks like ransomware and cyber espionage. We also assist in navigating cybersecurity regulations such as NIS2, providing visibility into security telemetry and log retention. With an “assume breach” mindset, we help organisations strengthen their security posture and reduce the impact of potential threats.