Click me
Transcribed

Anatomy of a Phishing Attack

ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2) ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2) ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2) ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2) ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2) ANATOMY OF A PHISHING ATTACK Starts with an email that looks like it came from a trusted source. EITHER REPLY TO AN EMAIL OR GO TO A WEBSITE YOU WILL BE ASKED TO ENTER PRIVATE DATA OR EMAIL YOUR PERSONAL INFORMATION... ENTER BANK INFORMATION HERE: PAYMENT SERVICES ACCOUNT FOR NEARLY 38% OF ATTACKS (Source: APWG) THE HACKER NOW HAS YOUR DATA AND WILL DO ONE OR A COMBINATION OF THE FOLLOWING: 1 SELL YOUR INFORMATION STEAL YOUR IDENTITY 3 STEAL FUNDS FROM YOUR BANK ACCOUNT 4 ATTACKYOUR CONTACTS U.S. is the top country for hosting phishing websites (Source: APWG) then... THE CYCLE CONTINUES Source: ESET 2)

Anatomy of a Phishing Attack

shared by Kristofferson on May 13
967 views
3 shares
0 comments
Sometimes, cyberpunks go fishing in email boxes to see if they can swipe your personal information. The bait that they use is an official-looking email that asks you to submit some private information...

Source

Unknown. Add a source

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size