Phishing

A central concept in cybersecurity, phishing is a type of social engineering attack where malicious actors disguise themselves as a legitimate institution or individual, typically via email, text message, or fraudulent websites. The primary objective is to deceive victims into voluntarily providing sensitive information, such as login credentials, credit card details, or other personal data. By creating a sense of urgency or trust, these attacks lure users into clicking malicious links or opening compromised attachments, ultimately leading to identity theft, financial loss, or the deployment of malware onto their system.

  1. Introduction to Phishing
    1. Defining Phishing
      1. Basic Definition
        1. Key Characteristics
          1. Distinction from Other Cyber Threats
          2. Phishing as a Form of Social Engineering
            1. Social Engineering Overview
              1. Human Vulnerabilities Exploited
                1. Comparison with Other Social Engineering Attacks
                2. Core Objectives of Phishing Attacks
                  1. Data Theft
                    1. Credential Harvesting
                      1. Usernames and Passwords
                        1. Security Questions and Answers
                          1. Multi-Factor Authentication Tokens
                          2. Financial Information Theft
                            1. Credit Card Numbers
                              1. Bank Account Details
                                1. Payment Service Credentials
                                  1. Cryptocurrency Wallet Information
                                  2. Personal Identifiable Information (PII) Collection
                                    1. Social Security Numbers
                                      1. Driver's License Information
                                        1. Passport Details
                                          1. Addresses and Phone Numbers
                                            1. Date of Birth
                                              1. Medical Information
                                            2. Malware Deployment
                                              1. Ransomware Distribution
                                                1. Keylogger Installation
                                                  1. Remote Access Trojans (RATs)
                                                    1. Spyware Deployment
                                                      1. Banking Trojans
                                                        1. Cryptominers
                                                        2. Financial Fraud
                                                          1. Unauthorized Transactions
                                                            1. Invoice and Payment Redirection
                                                              1. Business Email Compromise (BEC)
                                                                1. Wire Transfer Fraud
                                                                2. Corporate Espionage
                                                                  1. Intellectual Property Theft
                                                                    1. Trade Secret Acquisition
                                                                      1. Competitive Intelligence Gathering
                                                                      2. State-Sponsored Activities
                                                                        1. Government Intelligence Collection
                                                                          1. Critical Infrastructure Targeting
                                                                            1. Political Manipulation
                                                                          2. Historical Context and Evolution
                                                                            1. Early Phishing Incidents
                                                                              1. AOL Account Theft (1990s)
                                                                                1. First Email Phishing Campaigns
                                                                                2. Evolution of Techniques
                                                                                  1. From Simple Emails to Sophisticated Campaigns
                                                                                    1. Integration with Advanced Persistent Threats (APTs)
                                                                                    2. Notable Phishing Campaigns
                                                                                      1. Operation Phish Phry
                                                                                        1. Target Corporation Breach
                                                                                          1. Anthem Healthcare Attack