Phishing Attacks

Social-engineering attacks that trick people into revealing data, granting access, or taking unsafe actions.

Phishing is a social-engineering tactic that tries to trick people into revealing information, granting access, or taking unsafe actions. In plain language, it is fraudulent communication that aims to exploit trust, urgency, or confusion rather than relying only on a technical flaw.

Why It Matters

Phishing matters because many security incidents begin with a person being manipulated rather than a system being directly broken. Stolen credentials, unsafe file execution, and fraudulent approvals often start with misleading messages that appear ordinary enough to be trusted.

It also matters because phishing targets both individuals and organizational process. Even strong technical environments can be undermined if users are persuaded to surrender secrets or approve unsafe actions.

Where It Appears in Real Systems or Security Workflow

Phishing appears in email security, identity protection, awareness training, help-desk workflows, and incident response. Security teams connect it to Multi-Factor Authentication, Antivirus, Business Email Compromise, and Trojan defense because phishing can lead to credential abuse, malware delivery, and fraudulent decision-making.

Teams also use phishing scenarios in tabletop exercises and detection tuning because it is one of the most common entry points for broader compromise.

Defensive Layers

LayerDefensive role
Email and web controlsReduce delivery and unsafe navigation
MFA and passkeysLimit damage from stolen passwords
User reportingTurns suspicious messages into reviewable cases
Incident playbooksStandardize response when a user clicks or submits data

Common Phishing Patterns

PatternTypical lure
Credential harvestFake login or document-sharing prompt
Urgent actionAccount lockout or payment warning
File deliveryInvoice or policy document attachment
Conversation hijackReply to an existing thread to gain trust

Practical Example

A staff member receives an email that looks like a routine sign-in or document-sharing request. The message creates urgency and encourages the user to click through and provide credentials or open a file, even though the request did not come from the legitimate source it claims to represent.

Common Misunderstandings and Close Contrasts

Phishing is not limited to email, even though email is a common delivery path. The core issue is deceptive communication aimed at manipulating trust.

It is also different from Spear Phishing. Phishing can be broad and generic. Spear phishing is more specifically targeted to a person, team, or organization.

Knowledge Check

  1. What does phishing mainly try to exploit? Human trust, urgency, or confusion.
  2. Is phishing purely a technical exploit? No. It is primarily a social-engineering tactic.
  3. How is phishing different from spear phishing? Phishing can be broad and generic, while spear phishing is more targeted.
Revised on Friday, April 24, 2026