Blog

Higher Information Group news & insights from our subject matter experts in every solutions area.

6 Minutes to Read

The 8 Most Common Types of Phishing Attacks

By Higher Information Group on January 21, 2022 | Technology Solutions

The FBI receives more than 240,000 complaints about phishing scams every year and estimates that consumers lose more than $54 million a year due to these attacks. For businesses, the losses run well into the billions of dollars.

What Is a Phishing Attack?

A phishing attack is a type of cybercrime where criminals try to trick people into falling for a scam, reveal login credentials or financial information, and launch malware. Most often, this type of cyberattack occurs through email, although it may involve spoofed websites that look real and social engineering to personalize attacks to appear legitimate.

Phishing attacks are also used to launch ransomware which can encrypt your data and prevent access unless you’re willing to pay the ransom.

The 8 Most Common Types of Phishing Attacks

Don’t be fooled by the cute names given to these attacks. They’re serious and can be devastating for victims. More than 90% of all cyberattacks start with a phishing email and account for nearly a third of all successful breaches. Here are the eight most common types of cybercriminals use:

1. Business Email Compromise

Business email compromise (BEC) accounts for the largest financial losses, accounting for more than $1.8 billion a year. While this includes several different types of scams, the most common is CEO fraud. Attackers gain access to a business email account and impersonate top executives such as the CEO and try to initiate wire transfers or payments for fake invoices.

2. Whaling

Similar to CEO attacks, cybercriminals target executives within a company to reveal sensitive information. These phishing emails often use personalized company information to appear to be legitimate. Once hackers steal the login credentials of a high-ranking company official, they take over their email accounts.

3. Spear Phishing

Spear phishing attacks are highly targeted. Rather than sending mass emails and hoping someone responds, scammers target specific people within an organization. They hunt through company reports, websites, and individuals’ social media accounts to find personal information they can use to try to trick people into falling for their scam.

4. Domain Spoofing

Another common phishing attack is lookalike websites that appear to come from a legitimate company. Cybercriminals send emails with addresses similar to official domains. When someone clicks on a link, they are sent to a replica of the official website and asked to enter login information or financial information.

5. Smishing

Smishing is when attacks occur through texting (SMS) but uses the same types of tactics. Victims may see a link that appears to be from a company they do business with offering them a coupon or discount. However, when they click, malicious code might be installed, or they are directed to enter personal information to get the offer.

6. Vishing

Vishing — voice phishing — occurs when cybercriminals call your phone. They may use a recorded message and threatening language, such as telling you that your business or personal credit card has been used fraudulently or that there is a warrant for your arrest and urging you to take immediate action.

7. Fake Websites

Sadly, the internet is full of fake websites. Many of them have purposely been designed to look like the real thing. Some of them show up on legitimate search engines, but when users visit them, the scam begins. One of the more common tactics is to clone eCommerce sites but offer ridiculously low prices. When consumers try to make a purchase, they capture bank account or credit card information which they can exploit.

8. Wi-Fi Compromise

Phishing isn’t limited to email. Besides fake websites, crooks also use fake Wi-Fi hotspots in what’s sometimes called an Evil Twin Phishing attack. They may set up nearby a legitimate business and create a hotspot with the name of the business. However, when you connect to the hotspot, you’re giving access to your device to the attackers.

Preventing Phishing Attacks

While you think about phishing attacks or security breaches affecting big companies, the truth is that cybercriminals are attacking small and mid-sized businesses in record numbers. Over the past two years, attacks on mid-size companies increased by more than 50%. Attacks against small and mid-sized companies make up 43% of all data breaches.

The most important thing you can do to protect your business from phishing attacks is to educate your employees. This includes:

  • How to recognize phishing scams
  • Beware of urgent or time-sensitive warnings
  • Verify emails and websites before providing sensitive information
  • Only open attachments from trusted sources
  • What not to share on social media

The best advice is to assume any email you receive is potentially dangerous and to be wary before clicking on a link or responding.

If you have become a victim of a phishing attack, you can file a complaint with the FBI’s Internet Crime Complaint Center (IC3).

If your business is looking for reliable protection from cybercrime or a comprehensive, proactive Managed IT solution, connect with the experts at HIG today.

No More IT Surprises & Downtime

Our proactive IT experts are ready to optimize & manage your technology for peak efficiency and peace of mind. Learn how we can help!

KEEP ON LEARNING

Recommended Reads

More Knowledge at Your Fingertips

Want to learn more about how you can leverage specific solutions for your business? Right this way!