Skip to main content
Security

Phishing

Phishing is a social-engineering method where attackers try to steal sensitive data such as passwords or payment details via fake emails, websites or messages.

Phishing is the most common entry method for cyber attacks and causes billions in damage yearly. Methods are increasingly sophisticated: from mass spam to highly personalized spear-phishing against executives. Despite technical controls, humans remain the weak link – so awareness training is as important as technology. Understanding phishing helps protect yourself and your organization.

What is Phishing?

Phishing is a cyber attack where attackers pose as a trusted party to get victims to reveal sensitive information. Variants include email phishing (mass fake emails), spear-phishing (targeted at specific people), whaling (targeting executives), smishing (SMS), vishing (phone) and pharming (DNS manipulation to redirect to fake sites). Modern phishing uses AI for more convincing text and convincing copies of real sites. Goals range from credentials and payment data to installing malware.

How does Phishing work?

A typical attack starts with a fake email that appears to come from a bank, cloud provider or colleague. The email urges action – e.g. password change or account verification. A link leads to a fake site where the victim enters credentials, which go directly to the attacker. In spear-phishing the attacker researches the target and personalizes the message to build trust.

Practical Examples

1

CEO fraud: A fake email from the 'CEO' instructs accounting to make an urgent transfer to a 'new supplier account'.

2

Microsoft 365 phishing: Email warns of 'expiring password' and links to a perfect copy of the Microsoft login page that captures credentials.

3

Bank phishing: SMS or email in the bank’s name asks for 'verification' including TAN on a fake banking page.

4

Delivery phishing: Fake DHL or UPS notifications about a 'package' contain links to malware.

5

LinkedIn spear-phishing: Personalized messages to employees referring to real projects or colleagues to get them to open infected documents.

Typical Use Cases

Security awareness: Simulated phishing campaigns test and train staff to recognize phishing

Email security: SPF, DKIM and DMARC to prevent email spoofing

Incident response: A reporting process so staff can quickly report suspicious email

Multi-factor authentication: Even with a stolen password, MFA blocks unauthorized access

Advantages and Disadvantages

Advantages

  • Awareness: Understanding phishing methods is the first step to effective protection
  • Technical defence: Modern email filters detect and block most phishing automatically
  • MFA as safety net: Multi-factor authentication protects even when phishing succeeds
  • Measurable improvement: Regular phishing simulations show progress in staff awareness

Disadvantages

  • Human factor: No technical control is 100% as long as people can be tricked
  • Constantly new methods: Attackers keep developing more sophisticated techniques
  • AI-generated phishing: AI enables more convincing, personalized phishing
  • High damage cost: A single successful phishing attack can cause millions in damage

Frequently Asked Questions about Phishing

How do I recognize a phishing email?

Watch for: unusual sender addresses (e.g. support@amaz0n-secure.com), urgent calls to action ('Your account will be locked in 24 hours'), generic greetings ('Dear customer'), spelling errors, suspicious links (hover to see real URL) and unexpected attachments. When in doubt: log in only via the official website, never via a link in the email.

What should I do if I clicked a phishing link?

Change all passwords you entered on the fake site immediately. Enable MFA if not already. Report the incident to IT security. Check affected accounts for suspicious activity. Contact your bank if financial data was entered. Scan the device for malware.

How can a company protect itself from phishing?

Multi-layer approach: technically with email filters, SPF/DKIM/DMARC, MFA and web proxy filters; organizationally with regular awareness training and simulated phishing; process-wise with a defined reporting process for suspicious email and an incident response plan.

Related Terms

Want to use Phishing in your project?

We are happy to advise you on Phishing and find the optimal solution for your requirements. Benefit from our experience across over 200 projects.

Next Step

Questions about the topic? We're happy to help.

Our experts are available for in-depth conversations – no strings attached.

30 min strategy call – 100% free & non-binding

What is Phishing? Definition, Methods & Protection