Phishing

What is Phishing?

Phishing is a common manipulation tactic used for internet banking frauds.

It is used to steal your personal information through:

  • fake emails,
  • fake social media messages,
  • fake SMS, or
  • direct messages in video games, etc.

 

The attacker will gain your trust by pretending to be a known company, a friend, a relative, or a representative from a bank.

Try and remember

Have you ever received an email from the Coca Cola Company regarding a Lottery?  Or, From some King or Queen of Uganda or the Prince of Buenos Aries about transferring their entire wealth to you? Or Has someone from a known brand like PayTM or Amazon or from a Bank called you asking your for card details? 

Examples of phishing messages

   

Examples of phishing messages

   

What does a phishing message or email include?

Phishing messages include links that take you to harmful websites to steal your credit/debit card information, passwords, or identity.

In some cases, these links contain malware that attaches to your mobile devices, and then you’re contacted by the attacker claiming to be a “technician” who will fix the issue in return for a payment.

What are the ways in which phishing takes place?

Clone Phishing

The attacker uses a previously sent email with a link to log into a website, embeds the link with malware, and resends it intending to infect your computer.

Clone Phishing

Email Phishing

Email phishing scams often ask for immediate action to click on a link from an unsuspecting individual. Attackers make the email ID, the photograph, and the signature line of the email to look exactly like the organisation they are trying to copy so that you don’t suspect the mail at first sight.

Email Phishing

Spear Phishing

Spear Phishing is a targeted phishing attack. Here, the fraudsters have access to your personal information. They use this to make their communication sound real or believable.

Spear Phishing

Pharming

Pharming is when fraudsters override the website address. Whenever you visit the website through a Google search, you’re automatically redirected to the attacker’s site, which phishers use to collect debit card information and other personal information like passwords.

Pharming
Points to remember:

Points to remember:

Here are some key takeaways from this section that you should remember.

  • Icon

    Phishing is used to steal your personal information through an impersonating email, social media message, SMS, direct messages in video games.

  • Icon

    Common ways of phishing are clone phishing, email phishing, pharming and spear phishing.

Learn more about phishing and how to protect yourself against it in the next section. Have a safe online banking experience!

Learn more about phishing and how to protect yourself against it in the next section

Next chapter