The 11 Latest Phishing Types You Need To Be Aware Of

August 18, 2023

9

 Minute Read

In this article:

    Shield Icon

    Identity theft and fraud protection for your finances, personal info, and devices.

    Get Identity Guard

    Do You Know How To Spot a Phishing Attack?

    When Jenny Smith updated the payment information on her Microsoft account, she never thought that she — along with others at the small marketing agency that she runs — would get locked out of their email accounts for 22 days [*]. 

    But fraudsters posing as Microsoft support agents had tricked Jenny into giving up her email password. Then, they proceeded to send over 21,000 spam emails from her account, forcing her provider to lock her out — and grinding her business to a halt. 

    These scams — known as phishing attacks — are widespread. And they don’t just happen through emails. 

    Different types of phishing attacks across email, phone calls, social media, and SMS messages cost individuals and businesses billions in losses every single year, according to the FBI [*].

    In this guide, we’ll cover how phishing attacks work, the most common types of phishing attempts, and what to do if you’ve been the victim of phishing

    How Do Phishing Attacks Work?

    Phishing attacks occur when scammers pose as trustworthy individuals, businesses, or government agencies and attempt to trick you into giving up sensitive information or sending them money. 

    Phishing messages often include links to fake websites that steal your login credentials and financial information or even infect your device with malware — giving scammers full access to your files. 

    The goal of these phishing attacks is often one of the following:

    • Steal your personal information. Phishing attacks often seek to get you to give up or “verify” personal data, which could lead to identity theft. Scammers are usually after your Social Security number (SSN), Medicare number, or your credit card and other financial information. 
    • Trick you into sending them money. Some phishing emails pressure you into wiring money, sending checks, or using payment apps like Zelle or Cash App to send payments that can’t easily be reversed. In many cases, the attackers threaten you with legal action or arrest if you don’t pay them.
    • Gain access to your online accounts. Links in phishing messages may take you to a fake website that looks like a legitimate login page. But in reality, it’s designed to steal your credentials and give scammers access to your online accounts (such as your email, bank, or social media). 
    • Break into your work email or network. Business Email Compromise (BEC) is a $43 billion problem [*]. Cybercriminals use phishing campaigns to gain access to your work email account or company network. They might trick your co-workers into clicking on a link or opening an attachment in phishing emails. Then, they can snoop around, steal data, or plant malware.
    • Convince you to give up remote access to your computer. Phishing emails or calls claiming to be from tech support agents may ask you to give them remote access to your computer. If they get access, they can install malware, steal your files, or watch your activities.
    • Infect your device with malware. Phishing messages may contain links or attachments that infect your device with malware. These programs can track your keystrokes, take screenshots, or even turn on your webcam or microphone without your permission.

    Scammers know that phishing is often their best strategy when it comes to stealing your login credentials, financial information, or access to your business’ sensitive data. And they’re always coming up with new phishing messages and approaches to target your vulnerabilities. 

    Pro tip: Protect your identity and finances from scammers. Phishing attacks can quickly lead to identity theft — or worse. Identity Guard monitors your most sensitive information and online accounts for signs of fraud, and alerts you in near real-time. Save 33% on your Identity Guard membership today

    The 11 Latest Types of Phishing (and How To Spot Them)

    Watch out for these common types of phishing attacks scammers use to trick you into giving up sensitive information, money, or more.

    1. Email phishing
    2. Spear phishing
    3. Whaling (i.e. executive phishing)
    4. Smishing
    5. Vishing
    6. Angler phishing 
    7. Pharming 
    8. Search engine phishing
    9. Watering hole phishing
    10. Tech support phishing
    11. Clone phishing

    1. Email phishing

    Email phishing is the most common type of phishing attack. A recent survey found that 80% of people were targeted by a phishing email in 2021 — up 46% from 2020 [*].

    Phishing emails appear legitimate, but contain links to malicious websites that infect your device with malware. If you click on the link, you’ll be taken to a fake website that asks for personal information, such as your login credentials, SSN, or credit card numbers.

    Common examples of phishing emails include scammers impersonating prominent banks or brands (like Amazon and Walmart) and claiming that the victim’s account will be suspended if they don't download and fill out an attached document.

    This phishing tactic aims to scare users into clicking on suspicious links or taking actions that they otherwise wouldn’t. 

    How to identify the scam:

    • Check the sender’s name and email address to ensure that it’s coming from an official domain. For example, all legitimate Bank of America emails must come from “[name]@bankofamerica.com.” 
    • Look out for a lack of personal information, such as your full name or account number. Scammers send thousands of phishing emails, hoping that a small percentage of recipients will click on their links. 
    • When in doubt, contact the company directly. Don’t click on links or download attachments. Instead, log in to your account directly or call the company’s phone number listed on its website to ensure that the message is legitimate. 

    ⛳️ Related: How To Spot a Wells Fargo Phishing Email (6 Examples)

    2. Spear phishing

    While phishing attacks are vague messages sent to thousands of people in hopes that a few may respond, spear phishing uses highly customized messages to target specific individuals. For example, a spear phishing attack may claim to be from someone you trust personally, like your boss or a colleague. 

    A whopping 65% of scammers use spear phishing in targeted attacks [*].

    A spear phishing email or text may impersonate a CEO or other supervisor in your company and ask you to do a “small favor.” The “favor” can be anything from buying gift cards to paying invoices that disburse money to fake companies. The scammers always claim to be busy, which is why you can’t call them. 

    How to identify the scam:

    • You receive a request from someone you know, but from an email or phone number that you don’t recognize. This is a clear warning sign. When in doubt, contact the person directly to be sure, and use a trusted method of communication. 
    • You’re asked to buy gift cards and provide the sender with the numbers and PIN codes on the backs of the cards. Scammers love gift cards because they’re nearly untraceable — and impossible to refund once redeemed.
    • The sender claims they can’t speak on the phone — but that the request is urgent. Never buy gift cards, send invoices, or give up sensitive information without confirming the validity of the message. 

    ⛳️ Related: Facebook Messenger Scams: What Are They & How To Avoid Them

    3. Whaling (i.e. executive phishing)

    A whaling attack — also known as CEO fraud or executive phishing — is a phishing scam that targets high-profile individuals, such as CEOs, CFOs, and other executives.

    During a whaling attack, scammers send emails that attempt to get executives to give up sensitive information, pay fake invoices, or download malware. 

    In November 2020, the co-founder of an Australian hedge fund, Levitas Capital, clicked on a fake Zoom link that installed malware on the company’s network [*]. The attackers attempted to steal over $8.7 million through fraudulent invoices, and got away with $800,000. 

    The attack hit the fund's reputation significantly, causing Levitas to lose its biggest client — forcing them to close. 

    How to identify the scam:

    • You receive an “urgent” request from someone claiming to be an executive, either asking you to change payment details on an invoice or wire money. Beware of any email that uses a subject line that strikes urgency, such as “Request,” “Follow Up,” or “Urgent.”
    • Never click on links or download attachments from unsolicited emails. Scammers often disguise malware as invoices or “sensitive information” about an employee to fool you into clicking on the links. 

    4. Smishing

    Smishing is a phishing attack in which the scammer sends a text message (SMS) instead of an email. While the medium is different, the goal is the same: to trick victims into giving up sensitive information or doing something that gives the attacker access to their system.

    Since 2020, the number of smishing attacks has grown by more than 328%, with people losing over $3.5 billion [*]. Common smishing attacks come from fake companies either trying to collect debts or pretending to be financial institutions.

    How to identify the scam:

    • You receive an unsolicited text message claiming to be from a company or government agency. In actuality, these organizations rarely text you without your explicit permission. If you’re not expecting the message, it could be a scam. 
    • The message contains a shortened, suspicious link. If you don’t know where the link is taking you, it’s most likely a scam. 
    • The message tries to create a sense of urgency, either by claiming you’ll owe money, lose access to an account, or miss out on a prize if you don’t click on the link. If you think the message could be legitimate, reach out to the company directly using the contact information on its official website. 

    5. Vishing

    Vishing — a shortened version of “voice phishing” — includes any phone call scam in which fraudsters try to steal your sensitive information or get you to send them money. Nearly one in three Americans fell victim to vishing in 2021, collectively losing up to an estimated $9.8 billion [*]. 

    During a vishing attack, scammers pose as a trusted entity, such as a bank or a government agency, and use social engineering attacks to pressure the victim into disclosing private information.

    How to identify the scam:

    • You receive an unsolicited call from a number you don’t recognize. Don’t blindly trust your caller ID, either. Scammers can spoof phone numbers to make them look like they’re coming from trusted callers. 
    • Vishing campaigns are common during times of stress, like tax season. Be wary if a government organization like the IRS “calls” you for information. These organizations will almost never call you unless you’ve given them permission or have specifically requested that they call you.
    • Never give out personal information over the phone — especially if someone calls you. Instead, always hang up and call back the official phone number of the company from which they claimed to represent so that you can make sure the call was legitimate. 

    ⛳️ Related: What To Do If a Scammer Has Your Phone Number

    6. Angler phishing 

    Angler phishing is a type of attack that targets users on social media. Attackers impersonate representatives of a big company, like PayPal, to gain information about you. More than 55% of these attacks come from fraudsters posing as financial institutions [*].

    How to identify the scam:

    • Check to see if the suspicious account is verified. Major brands that use social media for customer support will always be verified or have a handle that’s linked to the main account’s bio. For example, check @PayPal’s account to see if it lists the account that’s messaging you. 
    • Beware of shortened links, and avoid clicking on them. If you do, don’t enter personal details or account credentials until you confirm that you’re on the company’s official website. 
    • Take customer service issues directly to a company’s website. Never trust responses from a social media account. 

    ⛳️ Related: Social Media Security: How To Secure Your Social Accounts

    7. Pharming 

    Pharming is an extremely technical form of phishing that can be difficult to identify. In a pharming attack, hackers hijack a domain name server (DNS) and redirect users from the actual website to a malicious site instead.

    These attacks are difficult to execute and hard to identify because the URL in the address bar is the same as the real site.  Insidiously, the scam happens behind the scenes of your web browser.

    The most famous example of pharming happened in 2007 when 50 financial institutions were targeted at once [*]. Hackers created lookalike websites for each of the banks they targeted, making it look like they were the actual websites. Over three days, thousands of people entered their account details and login information to the fake websites.

    How to identify the scam:

    • Use safe browsing software to warn you if you’re entering a potentially dangerous website. Every Identity Guard membership comes with safe browsing tools to protect you online. 
    • Make sure the website you’re on has HTTPS — or a lock icon near the URL — to ensure that it’s using a secure connection. This isn’t a foolproof way to protect yourself from phishing websites, but it can offer an early warning sign that your sensitive information could be at risk. 
    • Look for any website design inconsistencies, like mismatched colors, incorrect fonts, or low-quality images. These can signal that you’re not on the company’s official website. 

    ⛳️ Related: How To Spot a Fake Airline Website (and Airline Ticket Scams)

    8. Search engine phishing 

    Search engine phishing — also called SEO poisoning — occurs when cybercriminals create fake product pages and get them to rank on legitimate search engines; or, they run search engine ads so that you’ll find their fake pages on your own. 

    These sites often promote ridiculously good deals and low prices. But if you enter your payment information, it goes straight to the scammer. Google said it detected 25 billion spam web pages each day in 2020 alone [*].

    How to identify the scam:

    • Always make sure you’re logging in to a site using their official domain. For example, a Coinbase login page should always be on “www.coinbase.com.” 
    • If you see a search engine ad for a deal that seems too good to be true, it probably is. Check other reputable websites or online stores to see if you can find the same deal. 

    9. Watering hole phishing

    Watering hole phishing is another high-tech scam in which attackers target high-traffic websites (like government or healthcare sites) and infect their IP addresses with malicious code. Anyone who visits these infected websites gets malware on their device right away.

    One infamous attack occurred in 2019, targeting religious and charity groups by prompting users to visit certain sites to update Adobe Flash [*]. By accepting this prompt, malware was immediately installed on the users’ devices. This attack was live for several months before it was discovered.

    How to identify the scam:

    • Browsers like Google Chrome are good at detecting malicious code. If you receive a warning not to enter a website, do not proceed.
    • Keep an active firewall on your device to avoid getting malicious software installed without your knowledge.

    ⛳️ Related: How To Protect Yourself From Scammers on Social Media Sites

    10. Tech support phishing

    Tech support phishing scams occur when hackers reach out via email, pop-up, or another mode of communication to claim there’s an issue with your software or device. Scammers may claim your device is infected with malware or that it will be locked until you call their support number. 

    Then, they either ask for a large fee to “fix” the issue, or convince you to download software that gives them remote access to your device.  

    How to identify the scam:

    • Never trust a message, pop-up, or website that claims your device is infected with malware. No one can tell you this without direct access to your device. 
    • Don’t download remote access software, such as AnyDesk or TeamViewer. These applications give hackers remote access to your device — which they can use to spy on you, steal information, or break into your bank accounts. 
    • Beware if a customer support agent requests payment for their services. Almost every major company offers its support for free. If someone wants payment — especially via gift cards, wire transfers, or payment apps — it’s a scam. 

    11. Clone phishing

    Clone phishing is a newer type of phishing attack in which scammers reply to email messages with the same email — but swap out the original attachment with malware. 

    For example, let’s say your business regularly sends documents that need to be signed for new clients. A scammer will go through the process but send back your email with an attachment that looks like the signed document, but is really malware. 

    In other cases, scammers recreate common email messages sent by a business (such as a password reset request or one saying “click here to view a message from customer support”). Then, they’ll include malware where the legitimate link should be.

    How to identify the scam:

    • Be suspicious of any unexpected invoices or charges. Always log in to your account directly (on the official website or app) to check if the charge was actually made. 
    • Use antivirus software to protect your devices from malware. You can also hover over any suspicious links to see if they match the sender’s domain. 
    • Look for other signs of a phishing email, such as a strange or unexpected “From” email address, poor design, or spelling and grammatical errors. 

    ⛳️ Related: How To Tell If a Website Is Fake

    Were You the Victim of a Phishing Attack?

    If you fell victim to a phishing attack, don’t worry. There are steps you can take to minimize the damage or gain back access to your accounts.

    If you gave scammers your sensitive information:

    1. Freeze your credit so that scammers can’t open a new line of credit under your name.
    2. File an official identity theft report with the Federal Trade Commission (FTC) at identitytheft.gov.
    3. Change all of your passwords and enable two-factor authentication (2FA) to secure your accounts.
    4. Consider signing up for identity theft protection to monitor your accounts and alert you to signs of fraud.

    If you sent scammers money, gift cards, or cryptocurrency:

    1. Report the scam to the authorities to see if they’re able to help.
    2. If you sent money via bank transfer, your bank may be able to help you recoup those funds.
    3. If you sent money via gift cards or cryptocurrency, you’re unlikely to get those funds back.
    4. Consider looking into financial and/or emotional support offered for scam victims.

    If you entered your passwords onto a phishing website:

    1. If this was done at work, immediately contact your IT department to prevent a data breach.
    2. Disconnect your device from the internet and back it up.
    3. Scan your device for malware or ransomware — if you find any, delete or remove it from the device.
    4. Change all of your passwords to be more secure.
    5. Turn on two-factor authentication (2FA).
    6. Set up a fraud alert with all three credit bureaus (Experian, TransUnion, and Equifax), and consider filing an identity theft report with the FTC. 

    If you downloaded an attachment or clicked on a link:

    1. Again, if you did this on a work email, contact your IT department before anything else.
    2. Disconnect your device from the internet, either by turning off Wi-Fi or manually disconnecting the ethernet cable.
    3. Scan your device for malware or ransomware and remove any that you find.
    4. Change all of your passwords and enable 2FA.

    If you gave scammers remote access to your computer:

    1. Immediately disconnect your device from the internet.
    2. Scan your device for malware or ransomware. Delete anything you find that shouldn’t be on your device.
    3. Use a different device to change all of your passwords and turn on 2FA.
    4. Back up your computer and essential files.
    5. Completely wipe the device and restore it to factory settings.
    6. Freeze your credit, and order new debit/credit cards.
    7. Monitor your accounts manually, or sign up for account monitoring and fraud alerts.
    8. Report the scam to ReportFraud.ftc.gov.

    How To Protect Yourself From Phishing

    • Double-check all “from” email addresses. If you’ve received an email saying your payment was declined or are asked to log in to your account, make sure it’s coming from the company’s official domain.
    • Don’t click on suspicious links. Every time you receive a random email about your account (or communication from a brand you didn’t subscribe to), pause before clicking on anything. Do your due diligence to make sure it’s accurate. Or log in to your official account by opening a new tab and going to the website yourself rather than clicking on an email link.
    • Set strong passwords. Use a combination of lowercase and capital letters, numbers, and symbols to create strong passwords. Try not to use the same password for multiple accounts.
    • Use cybersecurity software. Download security software on your devices, and keep it up to date so that you can easily discover if scammers have gained access to your device and uploaded malware.
    • Use multi-factor authentication (MFA). Don’t make it easy for anyone (other than you) to gain access to your accounts. Enable multi-factor authentication on all accounts.
    • Freeze your credit. A credit freeze can help stop scammers from opening new accounts or taking out loans in your name. Contact each of the three major credit bureaus — Experian, Equifax, and TransUnion — and request a freeze. 
    • File an identity theft report with the FTC. Filing an official report at identitytheft.gov provides you with a recovery plan and is essential when disputing fraudulent charges.
    • Back up your data regularly. Keep a regular backup of your files in case you need to wipe your device in the event of a cyberattack.

    Be vigilant with your internet use. Cybercriminals are everywhere, so it’s key to be wary of suspicious emails, malicious links, and other attempts to gain access to your sensitive data.

    For added protection, consider signing up for Identity Guard to monitor your accounts, protect your finances, and warn you of phishing websites. 

    Special offer: Save 33% on Identity Guard today

    Related Articles

    A look over someones shoulder as they hold a phone while the screen displays the word "Scam!"

    What Happens If You Open A Phishing Email?

    Did you accidentally open a phishing email? Here are the top do's and don’ts cybersecurity experts recommend. Follow our step-by-step guide to stay safe.

    Read More

    August 10, 2023

    What Happens If You Open A Phishing Email?
    Zoomed in view of an open laptop screen showing a social media platform, and next to it is a blurred hand holding a phone

    How To Avoid Social Media Identity Theft

    Victims of social media identity theft lost $800 million last year. Here’s what you need to know about how to keep your identity safe on social media.

    Read More

    February 14, 2024

    How To Avoid Social Media Identity Theft

    Get Started with Identity Guard

    Get started with Identity Guard today, risk-free.

    Get Protected Today
    1. Financial identity theft and fraud
    2. Medical identity theft
    3. Child identity theft
    4. Elder fraud and estate identity theft
    5. “Friendly” or familial identity theft
    6. Employment identity theft
    7. Criminal identity theft
    8. Tax identity theft
    9. Unemployment and government benefits identity theft
    10. Synthetic identity theft
    11. Identity cloning
    12. Account takeovers (social media, email, etc.)
    13. Social Security number identity theft
    14. Biometric ID theft
    15. Crypto account takeovers