This page (revision-3) was last changed on 29-Nov-2024 16:16 by -jim

This page was created on 29-Nov-2024 16:16 by unknown

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
3 29-Nov-2024 16:16 5 KB -jim to previous
2 29-Nov-2024 16:16 5 KB -jim to previous | to last
1 29-Nov-2024 16:16 2 KB unknown to last

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 24 added 25 lines
!! [Spear-Phishing]
Where general email attacks use spam-like tactics to blast thousands at a time, spear phishing attacks target specific individuals within an organization. In this type of scam, hackers customize their emails with the target’s name, title, work phone number, and other information in order to trick the recipient into believing that the sender somehow knows them personally or professionally. Spear phishing is for organizations with the resources to research and implement this more sophisticated form of [attack].
!! 2. [Whaling]
Whaling is a variant of spear phishing that targets "CXOs" and other executives ("whales"). As such individuals typically have unfettered [access] to [sensitive] corporate [data], the [risk]-[reward] is dramatically higher. Whaling is for advanced criminal organizations that have the resources to execute this form of [attack].
!! 3. [BEC] (Business Email Compromise)
BEC attacks are designed to [impersonate] senior executives and trick [employees], [customers], or [vendors] into wiring payments for goods or services to alternate bank accounts. According to the FBI's 2019 Internet Crime Report,  [BEC scams were the most damaging and effective|https://www.zdnet.com/article/fbi-bec-scams-accounted-for-half-of-the-cyber-crime-losses-in-2019/]  type of cyber crime in 2019.
!! 4. [Clone Phishing]
In this type of [attack], the [scammer] creates an almost-identical replica of an authentic [email], such as an alert one might receive from one's bank, in order to trick a [victim] into sharing valuable information. The attacker swaps out what appears to be an authentic link or attachment in the original email with a malicious one. The email is often sent from an address that resembles that of the original sender, making it harder to spot.
!! 5. [Vishing]
Also known as [Voice] phishing, in [vishing], the scammer fraudulently displays the real telephone number of a well-known, trusted organization, such as a [bank] or the [IRS], on the victim’s caller ID in order to entice the recipient to answer the call. The scammer then impersonates an executive or official and uses social engineering or intimidation tactics to demand payment of money purportedly owed to that organization. [Vishing] can also include sending out voicemail messages that ask the victim to call back a number; when the victim does so, the victim is tricked into entering his or her personal information or account details.
!! 6. [Snowshoeing]
In a snowshoeing scheme, attackers attempt to circumvent traditional email spam filters. They do this by pushing out messages via multiple [DNS Domains] and [IP Address], sending out such a low volume of messages that reputation- or volume-based spam filtering technologies can’t recognize and block malicious messages right away. Some of the messages make it to the email inboxes before the filters learn to block them.
At line 54 added 2 lines
* [#2] - [What is Phishing?
|https://www.fortinet.com/resources/cyberglossary/phishing?utm_source=blog&utm_campaign=phishing|target='_blank'] - based on information obtained 2021-07-21