The goal of Phishing

Phishing attacks are a significant cybersecurity threat driven by two primary objectives: unauthorized access to systems and financial theft. Attackers employ various tactics to achieve these goals, targeting sensitive data, login credentials, and financial information. The consequences of successful phishing attacks can be severe, leading to data theft, financial loss, reputational damage, and operational disruptions for individuals and organizations alike. Moreover, nation-state actors often leverage phishing for geopolitical objectives, including intellectual property theft, espionage, and critical infrastructure sabotage. Understanding the multifaceted nature of phishing attacks is essential for recognizing their dangers and implementing effective defenses against them.
Written by
Joshua Crumbaugh
Published on
September 10, 2024

7.1 The Dual Goals of Phishing: Access and Money

Phishing attacks are primarily driven by two main goals: gaining unauthorized access to systems and stealing money. While the methods and tactics may vary, the underlying objective is almost always to obtain either sensitive data or direct financial gain. Understanding these dual goals is key to recognizing the danger posed by phishing attempts. Here’s how attackers target both:


  • Access: Phishers often seek to gain access to systems, accounts, or networks by stealing login credentials, security tokens, or other sensitive data. Once inside, they can move laterally through networks, steal additional data, or install malware and ransomware. Access is often the first step in more complex attacks, where criminals can use your credentials to bypass security measures and compromise larger systems.
  • Financial Gain: Many phishing attacks are designed to directly steal money from individuals or organizations. Attackers may attempt to trick you into providing credit card details, wire transfer information, or access to financial accounts. Business email compromise (BEC) schemes, for instance, frequently involve phishers posing as executives to authorize fraudulent wire transfers or purchases. In other cases, attackers may demand a ransom in exchange for releasing locked data or systems.
  • Data Harvesting for Future Exploits: In some cases, phishers are looking to gather data for future attacks, either on the victim or on third parties. Personal information, company secrets, or sensitive client data can be sold on the dark web or used for blackmail, identity theft, or spear phishing in subsequent attacks.
  • Identity Theft: Phishers often steal personal information to commit identity theft. Once they obtain sensitive details such as your Social Security number, bank account information, or passwords, they can assume your identity, taking out loans or committing fraud in your name.
  • Credential Stuffing: Attackers who gain access to usernames and passwords may use them for credential stuffing, a technique where they test stolen credentials across various websites or services, taking advantage of individuals who reuse the same passwords for multiple accounts. This can lead to a broader breach of personal or organizational systems.
  • Ransomware Deployment: Phishing emails are a common delivery method for ransomware. By tricking users into downloading malicious attachments or clicking on infected links, attackers can install ransomware that encrypts data, rendering it inaccessible until a ransom is paid. This often leads to both financial loss and operational downtime.
  • Business Disruption: Beyond direct financial theft, phishers sometimes aim to cause disruption to business operations. This can be through the installation of malware that halts production, locks critical data, or damages reputations by exposing sensitive information. The goal is to weaken the target’s ability to function, often while holding their data or systems hostage.
  • Espionage and Surveillance: Phishing isn’t always about money. In some cases, attackers aim to gain access to confidential data for espionage or surveillance. State-sponsored attacks, corporate espionage, or insider threats may use phishing to infiltrate networks, gather intelligence, or spy on internal communications.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

7.2 Information Gathering Tactics Used by Phishers

Phishers often rely on gathering detailed information about their targets before launching an attack. By using various tactics to learn about individuals and organizations, they can craft more convincing and personalized phishing messages. Social media platforms like LinkedIn, in particular, provide a wealth of information that attackers can use to build a profile of their target. Here are some key information-gathering tactics used by phishers:


  • Social Media Profiling: Platforms like LinkedIn, Facebook, and Twitter are treasure troves of personal and professional details. Phishers can collect information such as job titles, work history, connections, and interests, which they can then use to create targeted phishing emails or messages. For example, by knowing your job role and colleagues, an attacker can send a spear phishing email that looks like it’s from a co-worker or company executive.
  • LinkedIn Harvesting: LinkedIn is especially valuable for phishers looking to target specific industries or companies. Attackers can scrape LinkedIn profiles to gather details on employees, their roles, and organizational structure. This information allows them to craft highly targeted spear phishing emails that mimic internal communications, making them more believable. They may even pose as recruiters, sending fake job offers to lure in unsuspecting victims.
  • Public Data Mining: Phishers use publicly available data, such as business filings, company websites, or news articles, to gather additional details about an organization’s operations, key personnel, and projects. This can help them craft phishing emails that align with recent company activities or industry news, increasing the chances of success.
  • Business Email Compromise (BEC) Setup: Attackers often use LinkedIn and other sources to identify high-ranking executives or financial officers within a company. By understanding the internal hierarchy, phishers can send convincing BEC emails that appear to come from a CEO or CFO, requesting urgent payments or sensitive financial information. They may even time the attack around travel schedules or busy periods to increase its effectiveness.
  • Data Scraping from Forums and Discussion Boards: Attackers often scrape forums, discussion boards, or online communities where professionals discuss industry-specific topics. This allows them to gather insights into common challenges, terminology, or insider knowledge that can be leveraged to make phishing messages more convincing.
  • Reconnaissance through Online Tools: Phishers use tools like WHOIS lookups or company databases to gather information about domain registrations, employee contact information, and server details. This data can help them craft emails that appear to come from trusted sources within the organization, such as IT departments or support teams.
  • Phishing Surveys: Some phishers gather information by creating fake surveys or questionnaires that appear legitimate. These surveys ask for details like job title, department, or business operations, providing the attacker with valuable data to fine-tune their future phishing attempts.
  • Email Harvesting from Breached Databases: Phishers often use email addresses and other contact details from previously breached databases. Combining these with publicly available data, they can send targeted emails to individuals whose credentials may already be compromised, adding another layer of believability to their phishing attempts.
  • Information from Job Postings: Phishers analyze job postings to understand company operations, the software used, and internal hierarchies. This allows them to create realistic phishing emails that appear to address common company needs, such as software updates or training schedules, making the attack seem relevant to the target’s role.
  • Targeting New Employees: New employees are often prime targets for phishers, as they are still familiarizing themselves with company procedures. Attackers may gather information about recent hires through LinkedIn or company announcements and send phishing emails that impersonate HR or IT, asking for login credentials or personal details under the guise of onboarding procedures.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

7.3 The Consequences of Compromised Access

The consequences of compromised access in a phishing attack can be severe and far-reaching, affecting not only the individual victim but also the entire organization. Once attackers gain access to sensitive systems or data, the damage can escalate quickly. Below are some of the most significant consequences:


  • Data Theft: One of the primary goals of phishing attacks is to steal sensitive data. This can include personal information, financial data, intellectual property, or confidential business documents. Once stolen, this data can be sold on the dark web, used for identity theft, or leveraged for future attacks.
  • Financial Loss: Phishing often leads to direct financial loss. Attackers may gain access to bank accounts, credit card information, or financial systems, draining funds or making unauthorized transactions. In business email compromise (BEC) attacks, phishers may trick employees into making fraudulent wire transfers, resulting in significant financial losses for companies.
  • Credential Compromise: Once phishers steal login credentials, they can use them to access systems, networks, or cloud services. With these credentials, attackers can escalate privileges, access sensitive data, or impersonate employees. Credential stuffing, where stolen passwords are used across multiple platforms, can lead to broader breaches if users recycle passwords across services.
  • Ransomware Deployment: Phishing is often the entry point for ransomware attacks. Once attackers gain access through a phishing email, they can deploy ransomware to encrypt files and hold them hostage, demanding a ransom for decryption keys. This can halt operations, cost organizations large sums in ransom payments, and lead to long-term business disruption.
  • Reputational Damage: A phishing breach can severely damage an organization’s reputation. Customers, clients, and partners may lose trust in the company’s ability to protect sensitive data, leading to lost business and a tarnished brand image. Rebuilding trust after a data breach can take years and may involve costly PR campaigns and legal fees.
  • Regulatory Fines and Legal Action: Organizations that fail to protect sensitive data may face regulatory fines under laws such as GDPR, CCPA, or HIPAA. If customer or employee data is compromised, companies may also face lawsuits, further compounding the financial and reputational damage of the breach.
  • Operational Disruption: In addition to financial losses, compromised access can lead to significant operational disruptions. Attackers may disable systems, disrupt communications, or sabotage operations, causing downtime and loss of productivity. Recovery from such disruptions can take weeks or even months, depending on the extent of the damage.
  • Internal Fraud: If attackers gain access to internal communications or systems, they can impersonate employees, executives, or departments to commit fraud. This may involve directing payments to fraudulent accounts or approving fake purchase orders, causing additional financial harm.
  • Network Lateral Movement: After gaining access, attackers may move laterally through the network to identify and exploit additional vulnerabilities. They can escalate their privileges, take control of critical systems, or access other valuable targets within the organization, such as databases or cloud infrastructure.
  • Loss of Competitive Advantage: If intellectual property or trade secrets are stolen during a phishing attack, the company could lose its competitive edge. Competitors may gain access to proprietary information, research, or strategies, undermining the victim's market position and long-term business plans.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

7.4 Financial Exploitation: The Endgame of Phishing

Phishing attacks are often designed with one ultimate goal in mind: financial exploitation. While the methods and tactics may vary, the endgame for most phishing schemes is to extract money from individuals or organizations. Attackers use a range of strategies to achieve this, whether through direct theft, fraud, or ransom. In some cases, phishing is also leveraged by nation-states and hacktivist groups, whose goals may extend beyond financial gain, but still lead to severe economic consequences. Here are the key ways in which phishers seek financial gain:


  • Direct Financial Theft: Many phishing attacks target bank accounts, credit cards, or payment systems. By stealing login credentials, attackers can directly access funds, initiate unauthorized transactions, or transfer money to their own accounts. Once they gain access, they can drain accounts within minutes.
  • Business Email Compromise (BEC): Phishers often target businesses in sophisticated BEC scams. They impersonate high-level executives or financial officers to instruct employees to wire large sums of money to fraudulent accounts. These attacks can result in massive financial losses, as businesses may not realize they’ve been duped until it’s too late.
  • Ransomware Demands: Phishing emails are a common method for delivering ransomware. Once deployed, the ransomware locks down critical systems or encrypts files, rendering them unusable. The attackers then demand a ransom, usually in cryptocurrency, in exchange for the decryption key. Paying the ransom doesn’t guarantee recovery, but the threat of permanent data loss pushes many victims to comply.
  • Fraudulent Invoices and Payments: Phishers may intercept legitimate business communications and alter invoices or payment details. By posing as a supplier or vendor, they can trick companies into paying fraudulent invoices, redirecting funds to their own accounts. This type of attack can go unnoticed for weeks or months, leading to significant financial loss.
  • Nation-State Attacks: Some phishing campaigns are driven by nation-states seeking to weaken foreign economies or steal intellectual property. These attacks may target financial institutions, government agencies, or critical infrastructure to cause widespread disruption. While financial gain may not always be the direct goal, the economic fallout from such attacks can be significant, as industries suffer operational shutdowns, loss of competitive advantage, or exposure of sensitive government data.
  • Hacktivist Financial Exploitation: Hacktivist groups often use phishing attacks to draw attention to political or social causes, but these campaigns can also result in financial exploitation. By exposing financial information or compromising the assets of targeted organizations, hacktivists can cause reputational damage and financial loss. Their motivations may be ideological, but the end result can still be monetary exploitation through sabotage or ransom demands.
  • Identity Theft for Financial Gain: Attackers often steal personal information such as Social Security numbers, credit card details, or bank account numbers through phishing emails. Once they have this data, they can use it to open fraudulent accounts, apply for loans, or make unauthorized purchases in the victim’s name, leaving the individual or organization to deal with the financial fallout.
  • Cryptocurrency Fraud: Phishers increasingly target cryptocurrency wallets and exchanges. By tricking individuals into providing private keys or credentials, attackers can gain access to crypto assets, which can be stolen and transferred in ways that are difficult to trace. Once stolen, cryptocurrency is almost impossible to recover.
  • Data Breach and Sale: In some cases, the goal of phishing isn’t to steal money directly but to steal valuable data that can be sold on the dark web. Personal information, corporate data, and login credentials can fetch high prices in underground markets. The stolen data is often used in further financial exploitation, including identity theft, fraud, or targeted attacks.
  • Extortion and Blackmail: Phishers may gather compromising information about individuals or businesses and use it for blackmail. This can range from threatening to release sensitive data to using embarrassing personal details as leverage. In exchange for keeping the information private, the attacker demands a financial payoff, typically through untraceable means like cryptocurrency.
  • Overpayment Scams: In an overpayment scam, attackers send a phishing email posing as a client or customer, overpaying for a product or service. They then ask for a refund of the overpaid amount, which is sent before the victim realizes the original payment was fraudulent. This leads to financial losses and potential chargebacks.
  • Financial Market Manipulation: In some cases, phishers may use the information they gain to manipulate stock prices or engage in insider trading. By accessing confidential information about mergers, acquisitions, or earnings reports, attackers can trade on that information for financial gain, all while leaving the targeted company to deal with the legal and financial consequences.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

7.5 Key Goals in Nation State Attacks

Nation-state phishing attacks differ from financially motivated phishing attempts because they often focus on broader geopolitical objectives, seeking to compromise national security, steal intellectual property, or disrupt critical infrastructure. These attacks are typically well-funded, sophisticated, and carefully targeted. Here are some of the key goals behind nation-state phishing attacks:


  • Intellectual Property Theft: One of the primary objectives of nation-state attackers is to steal intellectual property, including trade secrets, patented technologies, research data, and military designs. These are often taken from private companies, government contractors, or academic institutions. The stolen data can provide the attacking nation with an economic advantage or help accelerate their own technological developments.
  • Espionage and Surveillance: Phishing is frequently used as a tool for espionage. Nation-state attackers often seek access to sensitive government communications, diplomatic strategies, or military plans. By compromising the email accounts or systems of key government officials, diplomats, or military personnel, they can gather intelligence, spy on negotiations, or monitor military activities.
  • Critical Infrastructure Sabotage: Some nation-state attacks aim to disrupt or destroy critical infrastructure such as power grids, water treatment facilities, transportation systems, or financial networks. By targeting these systems through phishing campaigns, attackers can introduce malware, cause service outages, or even trigger physical damage, leading to widespread disruption and chaos.
  • Political Influence: Phishing can also be used as a tool for political influence, such as during election interference. By hacking political campaign officials or media outlets, attackers can leak damaging information, spread disinformation, or alter public perception. These efforts are often intended to sway election results or cause political instability in the targeted nation.
  • Supply Chain Attacks: In nation-state attacks, the goal is often to compromise third-party suppliers or vendors to gain access to the target organization. By sending phishing emails to employees at a vendor or partner company, attackers can gain a foothold within a supply chain, using it as a backdoor to reach their ultimate target.
  • Disruption of Economic Stability: Nation-state attacks can also aim to undermine the economic stability of a rival country. By targeting financial institutions, stock markets, or large corporations through phishing, attackers may cause financial panic or disrupt important economic activities, leading to long-term economic damage.
  • Sabotage of National Defense: Phishing attacks against defense contractors, military personnel, and government officials are often designed to sabotage national defense operations. By gaining access to classified information or weapons systems, nation-state attackers can compromise national security, disrupt military operations, or weaken a nation’s defense capabilities.
  • Diplomatic Disruption: In some cases, nation-state attackers aim to disrupt diplomatic relationships between rival nations. By leaking confidential communications or planting false information through phishing, attackers can create tensions, misunderstandings, or even diplomatic crises between countries.
  • Cyber Warfare Preparation: Nation-state actors may use phishing attacks as part of a larger cyber warfare strategy. These attacks often focus on weakening the target nation's cyber defenses, infiltrating critical systems, and laying the groundwork for future large-scale attacks, potentially coinciding with physical military action.
  • Ransomware for Economic and Political Pressure: Nation-state attackers may deploy ransomware to cripple vital industries or governmental departments, creating pressure for political or economic concessions. Unlike traditional ransomware attacks motivated purely by financial gain, these campaigns often have larger strategic goals aimed at undermining rival states.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon
Meet The Social Engineer

Joshua Crumbaugh

Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon