CybersecurityOffensive Security

Phishing

Overview

Direct Answer

Phishing is a targeted social engineering attack wherein adversaries send fraudulent communications—typically emails, SMS, or messaging platforms—impersonating trusted entities to deceive recipients into divulging sensitive credentials, financial information, or system access. The attack exploits human psychology and trust rather than technical vulnerabilities.

How It Works

An attacker crafts a message that mimics legitimate correspondence from a bank, employer, or service provider, often including authentic-looking branding, urgency cues, or threats to lower victim vigilance. Recipients are directed to malicious links or attachments that either harvest credentials through fake login forms or deploy malware. Success depends on psychological manipulation and the difficulty recipients face in distinguishing fraudulent from genuine communications.

Why It Matters

Phishing remains the initial attack vector for a significant proportion of enterprise data breaches and ransomware infections, making it a critical vector for risk management and compliance programmes. Organisations face operational disruption, regulatory penalties, and reputational damage; individuals risk identity theft and financial loss. Employee awareness and detection mechanisms are essential to reducing organisational exposure.

Common Applications

Phishing attacks target financial services (credential harvesting), healthcare systems (patient data theft), government agencies, and corporate environments (business email compromise). Variants include spear-phishing directed at specific individuals and whaling targeting senior executives. Attackers also exploit third-party supply chains to gain initial footholds.

Key Considerations

Sophisticated phishing campaigns increasingly use legitimate infrastructure, stolen certificates, and domain lookalikes that evade technical controls. User training and authentication mechanisms such as multi-factor authentication reduce but do not eliminate risk; successful defence requires layered detection and incident response capabilities.

Referenced By2 terms mention Phishing

Other entries in the wiki whose definition references Phishing — useful for understanding how this concept connects across Cybersecurity and adjacent domains.

More in Cybersecurity