Phishing is one of the most common cyber threats, targeting individuals and organizations by tricking them into revealing sensitive information. Attackers use deceptive emails, messages, or websites to steal login credentials, financial details, or personal data. These scams often rely on social engineering techniques to create a sense of urgency or trust, convincing victims to act without thinking critically.
As phishing tactics evolve, cybercriminals have developed various methods, including spear phishing, smishing (SMS phishing), and vishing (voice phishing). Understanding how phishing works, recognizing warning signs, and implementing security measures such as two-factor authentication (2FA) and email filtering are essential for protecting against these attacks. This lesson will explore different types of phishing, how they exploit human psychology, and how to defend against them effectively.
I can explain what phishing is and identify different forms, including spear phishing, smishing, and vishing.
I can recognize common phishing tactics, such as fake invoices, urgent language, and suspicious attachments.
I can describe strategies to prevent phishing, including two-factor authentication and using browser security tools.
Phishing – A cyberattack that uses fake messages or websites to trick users into sharing sensitive information.
Spear Phishing – A targeted phishing attack aimed at specific individuals or organizations using personalized messages.
Smishing – Phishing attacks delivered via SMS (text messages), often containing malicious links.
Vishing – Phishing attacks conducted over the phone, where attackers pretend to be trusted entities.
Social Media Phishing – Using fake accounts or malicious links on social platforms to steal information.
Email Spoofing – Faking the sender’s address to make phishing emails appear as if they’re from a trusted source.
Phishing Website – A fake website designed to look like a legitimate one to steal user credentials or financial information.
Credential Harvesting – A phishing technique where attackers collect usernames and passwords for unauthorized access.
Clone Phishing – A phishing attack that copies a legitimate email but replaces links or attachments with malicious ones.
CEO Fraud – A phishing scam where attackers impersonate executives to trick employees into transferring money or sensitive data.
Pretexting – A form of social engineering where an attacker fabricates a scenario to gain trust and extract information.
Business Email Compromise (BEC) – A phishing scam targeting businesses by spoofing an executive’s email to request fraudulent transactions.
Pharming – A cyberattack that redirects users from legitimate websites to fraudulent ones to steal information.
Ransomware – A type of malware often spread through phishing emails that locks users out of their data until a ransom is paid.
Whaling Attack – A phishing scam targeting high-profile individuals like executives or government officials.
Social Engineering – Manipulating individuals into divulging confidential information.
Impersonation Attacks – Pretending to be a trusted figure to deceive victims.
Firewall – A security system that monitors and controls incoming and outgoing network traffic to prevent cyber threats.
Phishing is a cyberattack that tricks users into revealing sensitive information like passwords or financial details.
Attackers use social engineering (impersonation, urgency, deception) to manipulate victims.
Common phishing types include spear phishing, smishing (SMS phishing), and vishing (voice phishing).
Whaling attacks target high-profile individuals like executives.
Phishing emails often contain red flags such as suspicious links, urgent language, and fake sender addresses (email spoofing).
Fake websites (phishing sites) mimic real ones to steal login credentials and financial data.
Credential harvesting is a phishing tactic used to collect usernames and passwords for unauthorized access.
Business Email Compromise (BEC) and CEO fraud trick employees into sending money or sensitive data.
Clone phishing duplicates legitimate emails but replaces links or attachments with malicious versions.
Pretexting is a phishing method where attackers invent a scenario to gain trust and extract information.
Pharming redirects users to fraudulent websites by exploiting DNS settings.
Ransomware is often spread via phishing emails, locking users out of their data until a ransom is paid.
Security measures like 2FA, email filtering, and anti-phishing tools help prevent attacks.
Checking for HTTPS and hovering over links before clicking helps verify authenticity.
Cyber awareness training is essential for recognizing and avoiding phishing threats.
Phishing emails trick people into revealing sensitive information.
From: IT-Support@schoolsecurity.com
Subject: Urgent: Password Reset Required
Dear Student, we have detected unusual activity on your school account. Please reset your password immediately by clicking the link below.
What’s wrong with the email?
The email address is slightly off.
The urgency creates panic.
The link leads to a fake website.
Never click suspicious links—go to your school’s official website instead!
Phishing is a social engineering attack that tricks users into revealing sensitive information. Attackers impersonate trusted sources, using emails, texts, or fake websites to steal credentials, spread malware, or commit fraud. Even with firewalls and email filters, phishing exploits human error, making awareness a crucial defense.
🔹 Psychological Tricks:
Impersonation – Fake emails from banks, teachers, or IT support.
Urgency – “Your account will be locked in 24 hours!”
Malicious links & attachments – Redirecting to fake login pages or installing malware.
🔹 Common Attack Methods:
Spear Phishing – Personalized attacks targeting individuals (e.g., fake emails from a teacher).
Smishing & Vishing – Phishing via text or phone calls (e.g., fake Apple support messages).
Clone Phishing – Duplicating real emails but swapping links or attachments with malicious ones.
✔ Hover over links before clicking.
✔ Check for HTTPS on login pages.
✔ Use Two-Factor Authentication (2FA) for extra security.
✔ Never share passwords via email or text.
✔ Report suspicious emails to IT support or teachers.
A major SMS phishing (smishing) scam swept across the U.S., tricking drivers into handing over their payment details. Fraudsters sent fake texts claiming unpaid toll fees, urging recipients to click a malicious link to settle their balance. Victims who followed the link were directed to a fake payment page, where attackers stole their credit card information.
How the Scam Worked:
Attackers posed as toll agencies across multiple states, including Texas, California, and Florida.
Messages contained urgent warnings about "overdue tolls" to create panic.
Clicking the link led to a fraudulent website, stealing payment details and login credentials.
This video explains various types of social engineering which includes phishing.
Watch the video and create notes for the section that shows the NOTES symbol.
Phishing Types Activity
Create a table with four columns: Phishing Type, Definition, Example, and Prevention Method.
Define Phishing, Spear Phishing, Smishing, Vishing, Clone Phishing, Business Email Compromise (BEC), Pharming, and Whaling Attack in your own words.
Choose two phishing types, research or create an example for each, and write two sentences explaining how the attack works.
In pairs, complete the Prevention Method column of your table with security measures that help protect against each phishing type. Discuss which phishing types have the same security measures, and group them together in your table by moving the rows into groups.
Explain the role of HTTPS in preventing phishing attacks. Write this underneath your table.
In pairs, research a phishing case from the last five years.
Summarize the case in five sentences, explaining:
Who was targeted?
How did the phishing attack work?
What were the consequences?
How could it have been prevented?
What lessons can be learned from this case?
What are three common features of phishing emails?
How does spear phishing differ from general phishing?
What is smishing, and how does it work?
Describe the term "vishing" and explain how it can be used in a phishing attack. (4 marks)
Explain two techniques that can prevent phishing attacks and discuss their effectiveness. (6 marks)