• Email phishing: We’ve already covered a situation where an attacker sends fake emails that look like messages from a trusted organization. The email asks you to provide sensitive information, click on a link or download an attachment. The goal is to lure the victim into providing their personal information.
  • Web phishing: This type of phishing involves creating a fake website that looks almost identical to a page of a well-known organization. In doing so, cyberattackers use sophisticated techniques to mimic the design and appearance of the original page, convincing users to enter their login credentials, payment information, or other sensitive information.
  • IM phishing on social networks: This type of phishing targets users of social networks and chat applications that allow you to communicate with friends, send various files, links, etc. Attackers create fake profiles or abuse existing profiles to gain users‘ trust. They then send messages with links to fraudulent sites or ask for sensitive information. „IM“ is an abbreviation of „instant messaging“.
  • Spear phishing: Think of this type of cyberattack as very sophisticated phishing. While e-mails translated by a translator into a language only remotely resembling our mother tongue look suspicious at first glance, attackers are much more sophisticated in spear phishing. They monitor you for some time – they check your social networks, your movement on the Internet, find out information about your employment, etc. This allows them to „charge and target“ much more accurately. It will create a personalized attack based on, for example, finding out that your boss is on vacation, so you might not find it strange to log in to the company app via a link and do something for him.