http://hiperduct.ac.uk/custom-critical-essay-ghostwriting-service-for-mba Phishing attacks on central ministry officials get sharper, targeted
Phenomenon where the attacker steals sensitive and confidential information from the user.
Confidential information could include PIN numbers, passwords, and bank details.
Done using social engineering methods.
Purpose of phishing is to get confidential information from the victim.
Common motives behind phishing:
- Financial Access
- Identity theft
- Installing malware – virus, worm, trojan horse, spyware, ransomware
- Spreading misinformation and disinformation
- Psychological Warfare – Through Vishing (Using Telephone) and Smishing (SMS)
- Sexual exploitation of minors
Types/techniques of phishing:
- Spear Phishing
- Clone Phishing
- Voice Phishing
- Link Manipulation
- Website Forgery