Mass market email is the typical type of phishing in which the cyber criminals pretend to be someone else and try to trick the recipient into something like downloading malware or logging into a website. Cybercriminals try to make the message appears to be from an authorized person or organization.
Spear phishing is another type of phishing in which an email is sent to a specific and well-researched target pretending to be a trusted sender. The aim is to induce the victim to reveal credential information or pay money. The criminal focuses on one person or organization instead of 100 or more customers.
A whaling attack is a type of cyberattack in which the cybercriminal pretends to be a senior player at an organization and targets the senior worker at an organization. The cybercriminal aims to get access to the computer system, stealing money and sensitive information. It is also known as CEO fraud. The cyber thief uses email and website spoofing to trick a victim into performing a certain activity.
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a type of cyber attack in which cybercriminals target companies who conduct wire transfers and have suppliers abroad. The criminal compromises the publicly available email accounts of executives or high-level employees related to finance or involved with wire transfer payments through key loggers. The aim of the attack is to fraudulently transfer money or gain access to financial accounts.
Clone phishing is a common phishing attack in which the cybercriminal copies a legitimate email message sent by a trusted firm. The attacker adds or replaces a link that redirects to a fake website. They use an email address that resembles the legitimate sender, and the message looks similar to the one sent by a trusted one before. The attacker tries to swap out the attachment and links from the message. They use the updated version or latest to explain why the victim is receiving the message again.
Vishing is a phishing type in which the cybercriminal tricks the victim over a phone call or voice call and betrays them by giving sensitive information. The attacker uses automated voice simulation technology and other high technology elements to convince the victim to hand sensitive data over a phone call. The attacker creates a scenario to prey on human greed and fear. They convince the victim to hand over sensitive data, including bank account, pin codes username, or password, and much more.
Snowshoeing is another type of cyber attack in which the attacker pushes out messages through multiple domains and IP addresses. The IP address sends out low volume messages so that volume-based spam filtering technologies can’t recognize and block malicious messages right away. It helps the attacker to achieve their goal as many technologies don’t recognize it on time.