Types of Phishing Attacks

Phishing attacks have evolved significantly since their inception, with email phishing remaining a prevalent threat despite the emergence of newer tactics. At its core, email phishing involves fraudulent messages disguised as legitimate communications from trusted entities, aimed at tricking recipients into revealing sensitive information or clicking on harmful links. As attackers have become more sophisticated, their methods have included techniques such as email spoofing, creating a sense of urgency, and crafting highly personalized messages. Beyond traditional email phishing, targeted attacks like spear phishing and whaling focus on specific individuals or high-level executives, exploiting trust and familiarity to bypass security measures. Additionally, phishing has expanded into less common mediums, including voice phishing (vishing), social media phishing, fax phishing, and even in-app messaging. As cybercriminals adapt to new communication channels, it is crucial for individuals and organizations to remain vigilant, recognize the signs of phishing, and verify the authenticity of unsolicited requests across all platforms.
Written by
Joshua Crumbaugh
Published on
September 10, 2024

3.1 Email Phishing: The Classic Approach

Email phishing is where it all began, and despite the rise of newer attack methods, it remains one of the most enduring and widely used forms of phishing. In its simplest form, email phishing involves sending fraudulent messages that appear to come from legitimate sources, such as a bank, online retailer, or government agency. The goal is to trick recipients into providing sensitive information—such as passwords, credit card numbers, or Social Security numbers—or to click on a malicious link or attachment.

What makes email phishing so effective is its combination of social engineering and digital deception. Attackers take advantage of the trust that people place in familiar brands, institutions, and services. An email may look like a routine request from a bank or an alert from a trusted online store, but the reality is that it’s a carefully crafted trap.

Phishing emails often create a sense of urgency. They might tell the recipient that their account has been compromised, that they must verify their information immediately, or that they are due a refund but need to log in to claim it. This urgency plays on human emotions—fear, curiosity, or excitement—and pushes victims to act quickly, without taking the time to think critically about the legitimacy of the message.

In the early days, phishing emails were often easy to spot due to spelling mistakes, awkward language, or poor design. However, as cybercriminals have grown more sophisticated, so too have their phishing emails. Today’s phishing messages can be virtually indistinguishable from legitimate communications, complete with official logos, branding, and professional design. Attackers have learned to mimic the tone and style of real companies, making these emails harder to detect.

Despite its simplicity, email phishing continues to evolve. Attackers now use techniques like email spoofing—where they forge the sender’s email address to appear as if the message comes from a trusted source—and more complex methods like embedding malware in seemingly innocent attachments. Phishing emails have also become more personalized, targeting individuals with specific information about their lives or work.

As long as email remains a primary form of communication, email phishing will continue to be a prevalent threat. Its staying power lies in the balance between technical trickery and psychological manipulation, exploiting both the digital and human vulnerabilities that persist in today’s connected world.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

3.2 Spear Phishing, Whaling, and Other Targeted Attacks

While email phishing casts a wide net in the hopes that a few victims will take the bait, targeted attacks like spear phishing and whaling take a more refined approach. These types of phishing aren’t about reaching as many people as possible—they’re about precision, using tailored messages to deceive specific individuals or organizations.


Spear Phishing is a more sophisticated form of phishing where attackers target a specific individual or group within an organization. Unlike generic phishing emails, spear-phishing messages are highly personalized, often using the target’s name, job title, or details about their role within the company. The attacker may have done research on the individual via social media, company websites, or past data breaches to gather information that will make the email seem legitimate. These emails often appear to come from someone the target trusts, such as a colleague, boss, or a familiar service provider.


For example, an attacker might send a spear-phishing email to an employee, pretending to be the company’s IT department, asking them to reset their password. Because the email uses the employee’s name and details about their job, it seems authentic. The employee, believing the request is legitimate, follows the instructions, unknowingly providing the attacker with access to the company’s network.


Whaling is a type of spear-phishing attack that targets high-level executives, often referred to as “big fish” or “whales.” These attacks are even more meticulously crafted, as the stakes are higher. Executives typically have access to sensitive corporate information, and gaining control of their accounts can lead to significant financial losses or a security breach that compromises the entire organization. Whaling emails often appear to be urgent requests from within the organization, such as an email that looks like it’s from the CEO requesting an immediate wire transfer or sensitive data.


Whaling attacks are especially dangerous because they leverage the authority and urgency associated with top executives. Employees are less likely to question requests that appear to come directly from the C-suite, making these attacks particularly effective.


Beyond spear phishing and whaling, other forms of targeted attacks include clone phishing and CEO fraud. In clone phishing, attackers duplicate a previously sent legitimate email—such as one containing an attachment or a link—and resend it with slight modifications. The email looks identical to the original, but the attachment or link has been replaced with a malicious version. Because the recipient recognizes the message as something they’ve received before, they are more likely to trust it.


CEO fraud is another variation where attackers impersonate an executive and trick employees into carrying out unauthorized financial transactions. These emails often claim that the request must be handled confidentially and urgently, giving the recipient little time to question the legitimacy of the message.


What makes these targeted attacks so effective is their ability to exploit trust and familiarity. By carefully crafting messages that appear to come from trusted sources and using details that seem legitimate, attackers can bypass traditional security measures. These personalized attacks are more likely to succeed because they avoid the red flags typically associated with generic phishing emails.


As phishing has evolved, these targeted attacks have become more frequent and more dangerous, highlighting the importance of ongoing education and vigilance within organizations. Employees at all levels must be trained to recognize the signs of spear-phishing and whaling attacks and encouraged to verify any suspicious requests, no matter who appears to be sending them.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

3.3 SMS Phishing (Smishing) and Its Rise

As mobile devices have become central to our daily lives, cybercriminals have adapted their tactics to target users through SMS phishing, commonly known as smishing. Smishing involves sending fraudulent text messages that appear to come from legitimate sources, such as banks, government agencies, or service providers. Like email phishing, the goal is to trick recipients into clicking malicious links, providing sensitive information, or downloading harmful software.


The rise of smishing can be attributed to the increasing reliance on mobile communication for both personal and professional use. Many people are more likely to respond to a text message than an email, especially if it appears to come from a trusted source. Text messages also tend to create a greater sense of urgency, given their concise format and the expectation of quick responses.


Smishing messages often claim that immediate action is required. For example, an SMS might inform the recipient that their bank account has been locked, that a package delivery has been delayed, or that they are entitled to a tax refund. These messages typically contain a link to a phishing website or prompt the user to call a fraudulent number. Once the victim engages, the attacker can steal login credentials, credit card details, or personal information.


One of the key reasons smishing has gained traction is the inherent trust people place in text messages. Unlike email, which is often filtered through spam filters or security systems, SMS messages are seen as more direct and personal. Mobile users are less likely to question the authenticity of a text message, especially if it appears to be from a familiar brand or service they use regularly.


Another factor driving the rise of smishing is the widespread use of two-factor authentication (2FA). Many companies now use SMS to send authentication codes to users as part of their login process. Cybercriminals have adapted to this trend by sending fake 2FA requests, prompting users to enter their credentials on a phishing site that mimics the legitimate service. The attacker can then intercept the login credentials and take over the victim’s account.


Smishing is particularly dangerous because mobile devices are often less secure than desktop systems. Users may not have robust antivirus software or security apps installed on their phones, and mobile operating systems can be more vulnerable to certain types of malware. Additionally, the small screen size and mobile interface can make it harder for users to spot suspicious links or recognize phishing attempts.


As smishing continues to rise, it’s essential for users to stay vigilant. Avoid clicking on links in unsolicited text messages, verify the legitimacy of any SMS that asks for personal information, and contact companies directly through official channels if you receive a suspicious message. As cybercriminals increasingly target mobile devices, understanding and defending against smishing attacks is more important than ever.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

3.4 Social Media Phishing: The New Frontier

As social media platforms have grown into essential communication tools, cybercriminals have found a new and lucrative avenue for phishing attacks: social media phishing. Social media has become the new frontier for phishing, where attackers can take advantage of the vast amount of personal information available and the inherent trust users place in their networks. Platforms like Facebook, Instagram, LinkedIn, and Twitter offer fertile ground for attackers to create convincing scams that exploit the social nature of these sites.


Social media phishing involves attackers posing as trusted connections, brands, or services to manipulate users into divulging sensitive information or clicking malicious links. These attacks are often disguised as direct messages, posts, or comments that appear legitimate and relevant to the target. With millions of daily users engaging in conversations, sharing content, and networking, social media provides ample opportunities for cybercriminals to blend in and launch their attacks.


One of the most common tactics used in social media phishing is impersonation. Attackers create fake profiles that mimic legitimate individuals, brands, or customer support accounts. They may use these profiles to send direct messages or friend requests, tricking users into thinking they are interacting with someone they know or trust. Once the connection is made, the attacker sends a message containing a malicious link, often disguised as a relevant article, a request for help, or a free giveaway. The recipient, believing the message is genuine, clicks on the link and is directed to a phishing website designed to steal their credentials or personal information.


Another tactic involves phishing links in posts or comments. Attackers can post malicious links on public social media pages or groups, where they appear as helpful resources or enticing offers. For example, a cybercriminal might post a link in the comments section of a popular post, claiming it’s a great deal or an exclusive offer. Users, trusting the content because it appears in a familiar environment, may click on the link and unknowingly fall into a phishing trap.


Social media phishing also takes advantage of social engineering techniques, such as quizzes or surveys that seem harmless but are designed to gather personal data. These quizzes often ask questions like “What’s your birth year?” or “What was the name of your first pet?”—questions that seem trivial but may actually be answers to common security questions used for account recovery. By answering these questions, users unknowingly provide attackers with valuable information that can be used in future attacks.


Cybercriminals also exploit social media platforms’ advertising tools to launch phishing ads. These ads may appear as legitimate promotions for popular products or services but direct users to fraudulent websites designed to steal personal information or payment details. Because users often trust ads from recognized brands, these phishing ads can be highly effective in luring unsuspecting victims.


One of the unique dangers of social media phishing is its ability to spread quickly through networks. If an attacker successfully compromises a user’s account, they can use that account to send phishing messages to the user’s friends and contacts. This creates a ripple effect, as each compromised account is used to target additional users. The viral nature of social media makes this form of phishing particularly insidious, as it leverages the trust between friends and connections to spread.


To defend against social media phishing, users should be cautious about accepting friend requests or messages from unknown individuals, even if they appear legitimate. They should also be wary of clicking on links in posts, comments, or direct messages, especially if they seem suspicious or too good to be true. Verifying the authenticity of accounts and offers through official channels, as well as enabling strong privacy settings, can help reduce the risk of falling victim to social media phishing.


As social media continues to play an integral role in our personal and professional lives, understanding and recognizing the tactics used in social media phishing is crucial to staying safe online.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

3.5 Voice Phishing or Vishing

Voice phishing, commonly known as vishing, takes phishing beyond email and SMS and into the realm of phone calls. Vishing involves cybercriminals using phone calls or voice messages to trick individuals into divulging sensitive information, such as login credentials, credit card numbers, or other personal details. Unlike traditional phishing, which relies on written communication, vishing leverages the spoken word, making it feel more personal and immediate.


The key to vishing is social engineering—attackers manipulate their targets by creating a sense of urgency or authority. They may pretend to be a representative from a bank, a government agency, or even a company’s IT department. The attacker often claims that the victim’s account has been compromised, a payment is overdue, or immediate action is required to prevent a serious consequence. This pressure is designed to make the victim act quickly, without stopping to question the legitimacy of the call.


One common vishing scenario involves an attacker posing as a bank employee, claiming there’s suspicious activity on the victim’s account. The caller may ask the victim to verify their account details, such as their bank account number, PIN, or Social Security number. By creating a sense of urgency and using the authority of a trusted institution, the attacker can convince the victim to provide the requested information. Once the attacker has this data, they can access the victim’s account and potentially steal money or personal information.


Another common vishing tactic is caller ID spoofing. Attackers can manipulate the caller ID to make it appear as though the call is coming from a legitimate source, such as a bank or a government office. This makes the call seem more credible, increasing the likelihood that the victim will believe the story being presented and comply with the attacker’s requests. Caller ID spoofing adds a layer of deception that makes vishing particularly dangerous.


Vishing has also been used in corporate attacks, often referred to as CEO fraud or Business Email Compromise (BEC) over the phone. In these scenarios, attackers impersonate high-ranking executives and pressure employees into making unauthorized wire transfers or sharing sensitive company information. The attackers typically target employees in finance or administration, presenting the request as urgent and confidential. Because the request appears to come directly from an executive, employees may be hesitant to question the authenticity of the call.


Voicemail phishing is another variation of vishing, where attackers leave automated or pre-recorded voice messages for their targets. These messages often sound official, claiming to be from a bank, government office, or tech support team, and they instruct the recipient to call back a provided number. When the victim calls the number, they are connected to an attacker who continues the scam, collecting personal information or convincing the victim to install malicious software.


Vishing is particularly effective because people are generally more trusting of voice communication than they are of written messages. Hearing a human voice—especially one that sounds professional or urgent—can lead individuals to let their guard down and take actions they wouldn’t normally take. Attackers also benefit from the immediacy of a phone call, which doesn’t give the victim time to carefully think through their actions or consult with others.


In recent years, AI-generated voice technology has raised concerns about the future of vishing. Attackers can now use AI to create convincing voice recordings of real individuals, including executives or family members. These synthetic voices can be used in vishing attacks to trick victims into believing they are talking to someone they know or trust, further complicating efforts to detect and prevent these scams.


To protect against vishing, individuals and businesses should be cautious about sharing personal or financial information over the phone, especially if the call is unsolicited. It’s important to verify the legitimacy of any request by contacting the organization directly through official channels, rather than relying on the information provided in the call. Businesses should also train employees to recognize the signs of vishing and establish protocols for verifying unusual or urgent requests made over the phone.


As vishing continues to evolve, awareness and education remain key to preventing this form of phishing. Recognizing the tactics used in voice phishing and maintaining a healthy skepticism during phone-based interactions can help mitigate the risks associated with vishing.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

3.6 Less Common Phishing Mediums: Fax, Support Chat, and More

While email, SMS, and phone calls dominate the phishing landscape, cybercriminals have adapted their tactics to use less common mediums, exploiting any channel where communication takes place. These unconventional phishing methods, such as phishing through fax, support chat, and even in-app messaging, may not be as widespread, but they can be just as dangerous because they target channels that users and organizations often overlook.


1. Fax Phishing


It might seem surprising in the digital age, but fax machines are still used by many businesses, especially in industries like healthcare, law, and finance. Attackers have adapted to this by sending fake faxes that appear to come from trusted entities. A phishing fax might contain an urgent request for payment, a fraudulent invoice, or instructions to visit a malicious website by typing a URL into a browser.


Fax phishing works because many people assume that a fax is inherently more trustworthy than email. Fax machines often bypass modern security tools like spam filters, making it easier for phishing faxes to go unnoticed until it’s too late. Additionally, businesses with older infrastructure may rely heavily on fax communications, making them more susceptible to this form of attack.


2. Support Chat Phishing


With the rise of online customer support through chat services, attackers have found new opportunities to target users. Many companies now offer live chat support on their websites, and cybercriminals have begun impersonating support agents to steal information.


For example, an attacker might use social engineering to convince a customer to share login details, account numbers, or personal information under the guise of helping them resolve an issue. In some cases, attackers may even intercept legitimate support chat conversations or hijack live chats by injecting themselves into the communication.


Because support chat is typically trusted as a secure way to resolve issues, users may be more likely to follow instructions without questioning the authenticity of the interaction. Attackers take advantage of this by creating fake support chat portals or using social engineering techniques to gain access to sensitive data.


3. In-App Phishing


Many apps, especially financial, e-commerce, and social media platforms, include in-app messaging systems where users can communicate with customer support or receive updates. Attackers exploit these systems by sending fraudulent messages that appear to be official notifications from the app.


For example, a user might receive an in-app message claiming their account has been compromised and prompting them to click a link to “verify” their information. These messages often mimic the look and feel of legitimate communications from the app, making them difficult to spot. Because users trust the security of their apps, they are more likely to fall for phishing attempts delivered through in-app messaging systems.


4. QR Code Phishing


As QR codes have become more popular, especially for contactless transactions and sharing information, attackers have started using them in phishing scams. In QR code phishing, cybercriminals send malicious QR codes via email, text, or even physical mail. Scanning the code directs the victim to a phishing site or initiates the download of malicious software.


QR code phishing can be particularly deceptive because users often don’t know where the code will take them until they scan it. Attackers might send a QR code disguised as a discount coupon, a bank promotion, or a link to claim a prize. Once scanned, the victim’s device may be compromised, or they may be prompted to enter personal information on a fake website.


5. Voicemail Phishing


Cybercriminals have also turned to voicemail as a phishing medium. In this tactic, known as vishing voicemail or voicemail phishing, attackers leave a pre-recorded message claiming to be from a trusted source—such as a bank, government agency, or tech support team. The voicemail might warn the victim of suspicious activity on their account and instruct them to call back a specific number.


When the victim calls back, they are connected to an attacker who pretends to be a legitimate representative and proceeds to gather sensitive information. Voicemail phishing is especially effective because people tend to trust voicemails, especially when they sound professional or urgent.


6. Social Engineering Through Business Platforms


Attackers have begun to target professional networking and collaboration platforms like LinkedIn, Slack, and Microsoft Teams. By impersonating colleagues, recruiters, or company representatives, cybercriminals send phishing messages directly within these platforms, asking for sensitive information or encouraging victims to click on malicious links.


On LinkedIn, attackers might pose as potential employers offering lucrative job opportunities, prompting the victim to fill out fake job applications that capture personal data. On Slack or Teams, attackers may impersonate company administrators, asking employees to reset their passwords or provide sensitive information under the guise of internal policy updates.


7. Fax-to-Email Phishing


In businesses that use fax-to-email services, phishing messages can take advantage of the seamless integration between fax and email. An attacker may send a fraudulent email that looks like a legitimate fax notification, tricking the recipient into opening an attachment or clicking on a malicious link.


Because the fax-to-email system is automated, users may trust the email as a legitimate business communication. This makes them less cautious about verifying the message’s authenticity or recognizing the signs of phishing.


These less common phishing mediums may not be as familiar as traditional email or SMS attacks, but they highlight the evolving nature of phishing tactics. Attackers will exploit any communication method to reach their targets, often finding success in underused channels where users may be less vigilant. To defend against these attacks, it’s crucial for individuals and organizations to treat all forms of communication with a healthy dose of skepticism and verify the legitimacy of any unusual or unsolicited requests, no matter the medium.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon
Learning Objectives

Identify and Differentiate Various Phishing Techniques

Recognize Social Engineering Tactics in Phishing Scenarios

Develop Effective Prevention Strategies

Sections

Author

Joshua Crumbaugh
Social Engineer
Meet The Social Engineer

Joshua Crumbaugh

Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon