Explore chapters and articles related to this topic
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
Ankit Kumar Jain, B.B. Gupta
The phisher targets the vulnerability available in the system due to the human causes (Hong 2012). The phishing attacks are classified into various categories based on how the attacker acquires the credentials of users. Figure 5 presents taxonomy of phishing attacking techniques. This section discusses the phishing attack on two environments, namely, desktop and mobile. In the desktop environment, attackers utilise social engineering and technical subterfuge techniques. Attackers execute social engineering-based attacks using the malicious website or sending the fake email that appears to be legitimate. Social engineering techniques are further categorised as email spoofing, website spoofing and spear phishing (Almomani et al. 2013). Technical subterfuge methods gain user’s information by installing malware (Jain and Gupta 2017).