Personal Phishing Threats

whaling, Smishing, and vishing, collectively known as phishing attacks, have evolved into sophisticated techniques used by cybercriminals to exploit victims' trust and personal information. Social media platforms serve as a breeding ground for phishers who impersonate friends, colleagues, and trusted contacts to craft convincing scams, while SMS phishing (smishing) leverages the inherent trust users place in text messages to create urgency and manipulate victims into revealing sensitive information. Voice phishing (vishing) takes advantage of direct phone calls, where attackers impersonate trusted organizations to extract personal details under duress. Additionally, cryptocurrency-targeted scams, like "Pig Butchering," utilize social engineering and false investment opportunities to drain victims' funds. Personal phishing scenarios further complicate detection and response due to limited access to logs and security tools, emphasizing the need for individuals to adopt stronger security practices to protect themselves from these pervasive threats.
Written by
Joshua Crumbaugh
Published on
September 10, 2024

10.1 Social Media Phishing: Manipulating Online Identities

Social media platforms have become fertile ground for phishing attacks, with attackers exploiting the vast amount of personal information users willingly share. By manipulating online identities, phishers craft convincing and personalized attacks that leverage trust and familiarity to deceive their victims.


  • Impersonating Friends or Colleagues: Attackers often impersonate a victim’s friends, colleagues, or trusted contacts on social media. They create fake profiles or hack into real accounts, sending messages that appear to be from someone the victim knows. These messages may contain malicious links, requests for sensitive information, or prompts to engage with phishing websites, all under the guise of familiar and trusted identities.
  • Cloning Real Profiles: Phishers may clone the profiles of real individuals by copying their publicly available photos, information, and posts. They then use these fake profiles to connect with the victim and build trust before launching their phishing attacks. The victim, believing they are interacting with a real acquaintance, is more likely to fall for the scam.
  • Personalized Phishing Attempts: Social media platforms provide attackers with a treasure trove of personal information, such as employment details, hobbies, and recent activities. Using this data, phishers craft highly personalized phishing messages that appear legitimate. For example, they might reference a recent vacation, job change, or family event, making their phishing messages seem authentic and tailored specifically to the victim.
  • Fake Job Offers and Opportunities: Social media platforms, particularly professional networks like LinkedIn, are often used to target individuals with fake job offers or career opportunities. Phishers may pose as recruiters or hiring managers and send messages promising lucrative job offers. These messages often include links to phishing websites designed to collect personal data, login credentials, or even financial information under the pretense of an application process.
  • Catfishing and Romance Scams: Attackers may use fake identities on social media to engage in long-term social engineering schemes, such as catfishing or romance scams. By building a relationship with the victim, the phisher gains their trust over time, eventually asking for money, access to sensitive information, or help with a “financial emergency.” These scams are often highly emotional, manipulating the victim’s feelings to achieve their goals.
  • Leveraging Influencers and Celebrities: Attackers sometimes impersonate celebrities or social media influencers to promote phishing schemes. They create fake giveaways, exclusive offers, or limited-time promotions that prompt users to click on phishing links or provide personal information. Victims, drawn in by the perceived legitimacy of the influencer, are more likely to engage with the scam.
  • Phishing Through Social Media Ads: Attackers use social media ads as a phishing vector by creating fake advertisements that appear legitimate. These ads might promote fake products, services, or exclusive offers, leading users to phishing websites where they are asked to provide personal and financial information. Since social media ads often look professionally designed, they can easily deceive unsuspecting users.
  • Exploiting Publicly Shared Information: Users often share personal milestones, locations, or travel plans on social media, inadvertently providing phishers with the context they need to craft targeted attacks. An attacker might send a phishing email pretending to be a travel agency or hotel, leveraging the victim’s recent vacation plans to make the scam more convincing.
  • Targeting Social Media Logins: Social media phishing attacks often aim to steal login credentials, giving attackers access to the victim’s entire network. Once inside the account, attackers can launch further phishing campaigns from a trusted source, spread malware, or steal additional sensitive data. Victims may also be asked to “verify” their accounts via phishing links, which trick them into providing their login information.
  • Fake Competitions and Giveaways: Attackers may set up fake social media contests or giveaways, luring users into clicking phishing links or entering personal details for a chance to win. These schemes often promise high-value rewards, making them appealing to a wide audience. Once victims enter their information, attackers can use it for identity theft, further phishing attempts, or financial exploitation.

By manipulating online identities on social media platforms, phishers can deceive victims into trusting their malicious intentions. From impersonating friends and colleagues to creating fake job opportunities and contests, social media phishing attacks leverage trust and personal connections, making it harder for users to recognize and avoid these threats.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

10.2 SMS Phishing (Smishing): To Target & Steal Your Money

SMS phishing, or smishing, is a phishing technique that uses text messages to deceive victims and steal their money or personal information. Smishing attacks are becoming increasingly common, as they exploit the trust users place in SMS communication and the urgency of mobile alerts.


  • Urgent Financial Alerts: Attackers send fake SMS messages that appear to be from a bank, credit card company, or payment service, warning the victim of suspicious activity or a problem with their account. The message often includes a link to a phishing site or a phone number to call, where the victim is tricked into providing personal or financial information.
  • Fake Delivery Notifications: Smishers commonly send fraudulent text messages posing as delivery services, informing the victim that their package has been delayed or requires further action. The message includes a malicious link, leading the victim to a phishing website where their personal details are harvested, or malware is installed on their device.
  • Prize or Reward Scams: Attackers send texts claiming that the victim has won a prize, gift card, or exclusive offer. These messages typically include a link that leads to a phishing page, asking for personal information or payment details to "claim" the reward. Victims, excited by the prospect of winning, are more likely to fall for this trap.
  • Subscription Renewal Scams: Smishing messages may warn the victim that their subscription to a service—such as Netflix, Spotify, or antivirus software—is about to expire. The message includes a link to renew the subscription, which takes the victim to a phishing website designed to steal their login credentials and financial information.
  • Impersonation of Government Agencies: Attackers often impersonate government agencies like tax authorities or health organizations, sending fraudulent texts that threaten legal action, fines, or other penalties if the victim does not respond immediately. These messages exploit fear and urgency, pushing victims to click on phishing links or call a fraudulent number to resolve the "issue."
  • Security Alert Smishing: Phishers use fake security alerts, claiming that the victim’s account has been compromised. These messages include links to fake login pages, where victims unknowingly hand over their usernames, passwords, or other sensitive information. Once attackers have access, they can empty bank accounts or commit identity theft.
  • Bank Loan or Debt Relief Offers: Some smishing campaigns target individuals with fake loan offers or debt relief options. The victim is directed to a phishing website that asks for personal financial details, such as social security numbers, bank account information, or payment details, under the pretense of offering assistance.
  • Fake Charity Appeals: Attackers may send messages pretending to be from charitable organizations, especially after natural disasters or during holiday seasons. These messages encourage victims to click on links to "donate" to the cause, but the links lead to phishing sites designed to steal their payment information or personal data.
  • Subscription Cancellations: Another common smishing tactic is to send messages stating that a subscription has been canceled or that the victim’s account will be deactivated if no action is taken. Victims, fearing the loss of service, click on the phishing link to "reactivate" their account, inadvertently giving up their personal and financial information to the attacker.
  • Fake Mobile Service Provider Alerts: Attackers impersonate mobile service providers, sending fraudulent texts claiming there’s an issue with the victim’s phone service. The message may prompt the victim to click a link or enter their credentials to "fix" the issue, but instead, it leads to a phishing site that steals their information.

Smishing is a highly effective phishing method because users tend to trust text messages and are less cautious than they might be with email. Phishers exploit this trust, using urgency and familiarity to deceive victims and steal sensitive information or money through malicious links and fake websites.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

10.3 Voice Phishing (Vishing): Exploiting Telephone Communications

Voice phishing, or "vishing," is a phishing technique where attackers use telephone calls to deceive victims into sharing sensitive information, often by impersonating trusted entities. Vishing attacks exploit the human trust in voice communication and the immediacy of phone interactions to bypass typical security measures.

     
  • Impersonating Financial Institutions: Attackers often pretend to be representatives from a bank or credit card company, calling the victim to alert them of suspicious activity on their account. They create urgency, asking the victim to "verify" personal information, such as account numbers, passwords, or PINs, which the attackers then use for fraud.
  •    
  • Tech Support Scams: Phishers impersonate technical support from well-known companies like Microsoft or Apple, calling to warn the victim about a "security issue" or "virus" on their device. The attackers then instruct the victim to install software that gives the attackers remote access to their computer, allowing them to steal personal data or install malware.
  •    
  • Government Impersonation: In these scams, vishers pretend to be from government agencies like the IRS, Social Security Administration, or local law enforcement. They may claim that the victim owes taxes, is at risk of arrest, or has an unresolved legal issue. The caller pressures the victim to provide sensitive information or make immediate payments to avoid fines or penalties.
  •    
  • Voicemail Phishing: Attackers leave voicemails instructing the victim to call back a specific number regarding an urgent matter, such as a compromised bank account or overdue payment. When the victim returns the call, they are asked to provide personal or financial details to "resolve" the issue, leading to identity theft or financial fraud.
  •    
  • Business Email Compromise (BEC) via Vishing: In this scenario, attackers call employees at a company, pretending to be high-level executives or IT staff, instructing them to transfer money or provide sensitive corporate information. The sense of authority and urgency makes the victim more likely to comply without questioning the legitimacy of the request.
  •    
  • Healthcare Impersonation: Vishing scams targeting individuals may involve callers impersonating health insurance providers or medical institutions, asking for personal information such as social security numbers, insurance details, or payment information. These scams often create fear by claiming that the victim’s healthcare coverage is about to expire or that there are unpaid medical bills.
  •    
  • Fake Charity Calls: Attackers may pose as representatives of charitable organizations, especially following a natural disaster or during the holiday season. They use the emotional appeal of helping those in need to convince victims to donate money over the phone, but instead, the funds are pocketed by the scammers.
  •    
  • Utility Company Scams: Vishers may pretend to be from utility companies, claiming that the victim’s electricity, water, or gas service is about to be cut off due to non-payment. The attacker pressures the victim to make an immediate payment over the phone to avoid service disruption, often using prepaid cards or direct transfers to steal money.
  •    
  • Fake Debt Collection: In some vishing schemes, attackers pose as debt collectors, informing the victim of an outstanding debt that needs to be settled immediately. The victim, fearing legal action or damage to their credit, provides payment or sensitive information without verifying the legitimacy of the call.
  •    
  • Employment Scams: Vishers may call victims with fake job offers, asking them to provide personal information, such as social security numbers or bank account details, under the guise of processing paperwork for a new position. These details are then used for identity theft or other fraudulent activities.

Vishing is effective because it leverages the human voice to build trust and create urgency. Attackers often impersonate trusted organizations or government bodies, pressuring victims into providing sensitive information or making financial transfers. As phone-based scams increase, it is critical to be cautious about sharing personal or financial details over the phone and to always verify the legitimacy of the caller.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

10.4 Cryptocurrency-Targeted Phishing: Pig Butchering or Sha Zhu Pan Attacks

Cryptocurrency-targeted phishing attacks, particularly known as "Pig Butchering" or "Sha Zhu Pan" attacks, are elaborate scams designed to drain victims of their cryptocurrency investments through a combination of social engineering, trust-building, and fake investment opportunities. These attacks have gained prominence with the rise of cryptocurrency trading, where anonymity and quick transactions make it easier for attackers to steal funds without detection.

     
  • Building Trust Over Time: Pig Butchering attacks often start with a social engineering approach, where the attacker contacts the victim via social media, messaging apps, or dating platforms. The attacker pretends to be friendly, striking up conversations and gradually building a relationship with the victim. They may present themselves as an investor or someone knowledgeable in cryptocurrency trading.
  •    
  • Introducing Fake Investment Opportunities: Once trust is established, the attacker begins to introduce the idea of investing in cryptocurrency, suggesting that the victim join a supposedly legitimate platform or trading group. They may share fabricated stories of their own "success" in cryptocurrency investments, enticing the victim to follow their lead.
  •    
  • Convincing the Victim to Invest: The attacker provides a link to a fake cryptocurrency exchange or investment platform. These platforms are designed to look professional and legitimate, complete with fake dashboards, balance sheets, and trading data. The victim is encouraged to make small initial deposits, which the attacker may allow to "grow" as part of the scam to further build trust.
  •    
  • The Butchering Stage: As the victim continues to invest more and sees their supposed profits increasing, the attacker eventually moves to the final phase—the "butchering." At this point, the victim is encouraged to make a large investment or withdraw their "profits." However, when they attempt to cash out, they are met with excuses, delays, or requests for additional funds to cover "fees" or "taxes." In reality, their money has already been stolen by the attacker.
  •    
  • High-Pressure Tactics: Attackers use urgency and pressure, convincing the victim that they must act quickly to take advantage of a unique opportunity. This creates a sense of fear about missing out on potential gains, pushing the victim to act without fully verifying the legitimacy of the investment platform.
  •    
  • Isolation of the Victim: Throughout the attack, the phisher may isolate the victim from other trusted sources of advice. The attacker might discourage the victim from discussing their investments with family or friends, claiming that outsiders won’t understand the opportunity or might be jealous of their success. This tactic reduces the chances that the victim will seek external verification or assistance.
  •    
  • Exploiting Cryptocurrency’s Anonymity: Attackers take advantage of cryptocurrency’s inherent features, such as anonymity and the difficulty of tracing transactions, to make it nearly impossible for the victim to recover stolen funds. Once the money is transferred to the attacker’s wallet, it is quickly moved through various anonymous wallets or converted into other cryptocurrencies, making recovery highly unlikely.
  •    
  • Fake Customer Support: If the victim becomes suspicious or tries to withdraw their funds, the attacker may set up a fake customer support channel to further deceive the victim. The "support" team may assure the victim that their funds are secure and request additional time or funds to resolve the issue, prolonging the scam and extracting even more money.
  •    
  • Targeting Vulnerable Individuals: Pig Butchering attacks often target individuals who are inexperienced in cryptocurrency trading or those who are emotionally vulnerable. Attackers exploit their lack of knowledge and eagerness to capitalize on cryptocurrency’s potential for quick profits, making them prime targets for these long-term, high-reward scams.
  •    
  • Emotional Manipulation: In some cases, attackers play on the victim’s emotions, pretending to form personal or romantic relationships. By creating a strong emotional connection, the attacker is able to manipulate the victim into making larger and riskier investments, all under the guise of helping them achieve financial freedom or security.

Pig Butchering or Sha Zhu Pan attacks are highly sophisticated phishing scams that prey on the trust and emotions of victims, gradually luring them into a false sense of security before draining their cryptocurrency investments. These attacks highlight the importance of verifying the legitimacy of investment opportunities and being cautious of unsolicited financial advice, especially in the unregulated world of cryptocurrency.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

10.5 Evidence and Log Challenges in Personal Phishing Scenarios

In personal phishing scenarios, victims often face significant challenges in identifying and verifying the legitimacy of phishing attacks due to limitations in available evidence and logs. These challenges can make it harder for individuals to detect and respond to phishing attempts, increasing their vulnerability.

     
  • Limited Access to Detailed Logs: Unlike corporate environments with advanced security tools and centralized logging, individuals typically lack access to detailed logs that track their online activity or communication history. This makes it difficult for personal users to review suspicious emails, messages, or website interactions after a potential phishing attempt has occurred.
  •    
  • Inability to Verify Sender Authenticity: Personal email services and social media platforms often provide limited tools to verify the authenticity of a sender. Attackers can easily spoof email addresses, phone numbers, or social media profiles, making it difficult for individuals to distinguish between legitimate and fraudulent communications.
  •    
  • Absence of Centralized Security Alerts: In enterprise environments, centralized systems can issue security alerts when phishing attempts are detected. Personal users, however, must rely on their own vigilance or basic alerts from email providers, which may not catch every phishing attempt. This lack of centralized monitoring increases the risk of missing key warning signs.
  •    
  • Phishing Links Disguised as Legitimate URLs: Attackers often use URL shorteners or slightly altered web addresses that look legitimate but lead to phishing websites. Personal users without advanced security tools may struggle to identify these deceptive URLs, especially when the attack leverages well-known brands or services that they frequently use.
  •    
  • Incomplete or Inaccurate Incident Reporting: Personal users may not have the expertise or tools to accurately document a phishing incident. When reporting a phishing attack to authorities or service providers, the lack of detailed logs or evidence can make it challenging to trace the origin or methods used by the attacker, limiting the chances of successfully addressing the breach.
  •    
  • Overreliance on Device Logs: Some personal users attempt to rely on device logs, such as browser history or call records, to track down phishing incidents. However, these logs are often incomplete, and attackers may use techniques to erase or hide traces of their activity, making it difficult for individuals to gather conclusive evidence.
  •    
  • Challenges in Email Header Analysis: While analyzing email headers can sometimes reveal discrepancies, most personal users lack the technical knowledge to interpret this data. Attackers exploit this knowledge gap, making their phishing attempts appear legitimate at first glance, even though a closer examination of the email headers would show signs of fraud.
  •    
  • Delayed Detection and Response: Personal users often realize they've been phished only after financial loss or account compromise. By the time they recognize the attack, critical evidence such as phishing links or messages may no longer be accessible, preventing effective remediation or reporting.
  •    
  • Lack of Backup for Critical Logs: In personal phishing cases, victims may not have automated or manual backups of their communications or account activity, leading to the permanent loss of crucial evidence needed to investigate or resolve the phishing incident. This can severely hinder the ability to recover from an attack or prevent future occurrences.
  •    
  • Difficulty in Tracking Cross-Platform Phishing: Attackers often leverage multiple platforms (e.g., email, SMS, social media) in a coordinated phishing campaign. For personal users, keeping track of communication across these different channels can be challenging, especially when there’s no centralized logging system that aggregates activity from various platforms.

Personal phishing scenarios pose unique challenges due to the limited availability of logs and the lack of advanced security tools that individuals can access. These difficulties highlight the importance of adopting stronger personal security practices, such as regularly reviewing communication habits, using multi-factor authentication, and relying on security tools to detect and mitigate phishing risks.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon
Learning Objectives

Identify Phishing Techniques

Identify Personal Vulnerabilities

Develop Prevention Strategies

Sections

Author

Joshua Crumbaugh
Social Engineer
Meet The Social Engineer

Joshua Crumbaugh

Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon