Types of Phishing Attacks You Should Know About

Phishing is one of the most common threats online. Scammers impersonate trusted organizations or people to either steal your money or trick you into revealing sensitive information. Understanding the different types of phishing can help you spot the warning signs before it is too late.

TL;DR

Phishing attacks come in many forms. Recognizing them and understanding how they work makes it easier to avoid them and protect yourself.

Redamp.io | Types of Phishing Attacks You Should Know About

Email phishing

Email phishing typically targets a broad audience rather than a single individual. Attackers create a legitimately looking email that seems to be from a trustworthy company or organization. The most common method used is to include links in the email that redirect you to a website where you are asked to fill in a login form. The links itself might look like official website, but it is not.

More about email phishing

Redamp.io | Types of Phishing Attacks You Should Know About

Spear phishing

Spear phishing targets specific person or organisation. While some of your personal information cannot be used, for example, to steal your money, attackers may use it to make themselves seem more trustworthy. If they know some of your personal information, you are more likely to give out more.

More about spear phishing

Redamp.io | Types of Phishing Attacks You Should Know About

SMS phishing (smishing)

Smishing uses text messages instead of emails. These messages often appear to come from delivery companies, banks, or service providers and usually claim there is a problem that needs immediate attention. Since SMS messages feel more personal and urgent, many people act without checking the validity of the sender.

More about smishing

Redamp.io | Types of Phishing Attacks You Should Know About

Voice phishing (vishing)

Vishing happens over phone calls. Attackers may pretend to be bank employees or from technical support. What makes this effective is that the victims usually believe that because the call is happening at the moment, there is no time to check whether the caller is who they claim to be.

More about vishing

Page hijacking

Page hijacking involves redirecting users from a legitimate website to a malicious one without their knowledge. This can happen through compromised websites or malicious ads.

More about

Redamp.io | Types of Phishing Attacks You Should Know About

QR code phishing (quishing)

Quishing uses QR codes to hide malicious links. Because QR codes cannot be visually inspected like URLs, it is harder to judge whether they are safe.

Ad-based phishing

Ad-based phishing delivers attacks through paid advertisements on search engines or social media platforms.

More about

Redamp.io | Types of Phishing Attacks You Should Know About

Scams selling counterfeit tickets or goods with prepayment requests.

How to protect yourself from phishing

Final Recommendations for Your Safety

Stay informed! Read our blog  and follow alerts in the app about the latest threats we’re monitoring for you.