Phishing

  1. Types of Phishing Attacks
    1. Communication Channel-Based Classification
      1. Email Phishing
        1. Bulk Email Campaigns
          1. Mass Distribution Techniques
            1. Common Pretexts and Themes
              1. Seasonal and Event-Based Campaigns
              2. SMS Phishing (Smishing)
                1. Text Message Lures
                  1. Mobile-Specific Vulnerabilities
                    1. SIM Swapping Integration
                    2. Voice Phishing (Vishing)
                      1. Phone Call Scams
                        1. Caller ID Spoofing
                          1. Interactive Voice Response (IVR) Exploitation
                            1. Voice Deepfake Technology
                            2. QR Code Phishing (Quishing)
                              1. Malicious QR Code Generation
                                1. Physical Distribution Methods
                                  1. Digital QR Code Placement
                                  2. Social Media Phishing
                                    1. Platform-Specific Attacks
                                      1. Impersonation Accounts
                                        1. Malicious Direct Messages
                                          1. Fake Advertisement Campaigns
                                          2. Instant Messaging Phishing
                                            1. WhatsApp Scams
                                              1. Telegram Exploitation
                                                1. Discord Server Infiltration
                                                2. In-Application Phishing
                                                  1. Push Notification Abuse
                                                    1. In-App Message Exploitation
                                                      1. Mobile App Store Impersonation
                                                    2. Targeting Strategy-Based Classification
                                                      1. Spear Phishing
                                                        1. Highly Targeted Individual Attacks
                                                          1. Extensive Personalization Techniques
                                                            1. Long-Term Reconnaissance
                                                            2. Whaling Attacks
                                                              1. Executive and C-Suite Targeting
                                                                1. High-Value Individual Focus
                                                                  1. Business Email Compromise Integration
                                                                  2. Clone Phishing
                                                                    1. Legitimate Message Replication
                                                                      1. Malicious Content Substitution
                                                                        1. Timing-Based Exploitation
                                                                        2. Angler Phishing
                                                                          1. Customer Support Impersonation
                                                                            1. Social Media Customer Service Exploitation
                                                                              1. Brand Reputation Abuse
                                                                              2. Watering Hole Attacks
                                                                                1. Compromised Website Exploitation
                                                                                  1. Industry-Specific Site Targeting
                                                                                    1. Supply Chain Integration
                                                                                  2. Technical Approach-Based Classification
                                                                                    1. Deceptive Phishing
                                                                                      1. Brand Impersonation
                                                                                        1. Trust Relationship Exploitation
                                                                                        2. Malware-Based Phishing
                                                                                          1. Payload Delivery Mechanisms
                                                                                            1. Multi-Stage Attack Chains
                                                                                            2. Man-in-the-Middle (MitM) Phishing
                                                                                              1. Session Interception
                                                                                                1. Real-Time Data Manipulation
                                                                                                  1. Certificate Spoofing
                                                                                                  2. Search Engine Phishing
                                                                                                    1. SEO Poisoning Techniques
                                                                                                      1. Malicious Site Indexing
                                                                                                        1. Search Result Manipulation
                                                                                                        2. Pharming Attacks
                                                                                                          1. DNS Hijacking
                                                                                                            1. Host File Modification
                                                                                                              1. Router Compromise