Overview
Direct Answer
Phishing is a targeted social engineering attack wherein adversaries send fraudulent communications—typically emails, SMS, or messaging platforms—impersonating trusted entities to deceive recipients into divulging sensitive credentials, financial information, or system access. The attack exploits human psychology and trust rather than technical vulnerabilities.
How It Works
An attacker crafts a message that mimics legitimate correspondence from a bank, employer, or service provider, often including authentic-looking branding, urgency cues, or threats to lower victim vigilance. Recipients are directed to malicious links or attachments that either harvest credentials through fake login forms or deploy malware. Success depends on psychological manipulation and the difficulty recipients face in distinguishing fraudulent from genuine communications.
Why It Matters
Phishing remains the initial attack vector for a significant proportion of enterprise data breaches and ransomware infections, making it a critical vector for risk management and compliance programmes. Organisations face operational disruption, regulatory penalties, and reputational damage; individuals risk identity theft and financial loss. Employee awareness and detection mechanisms are essential to reducing organisational exposure.
Common Applications
Phishing attacks target financial services (credential harvesting), healthcare systems (patient data theft), government agencies, and corporate environments (business email compromise). Variants include spear-phishing directed at specific individuals and whaling targeting senior executives. Attackers also exploit third-party supply chains to gain initial footholds.
Key Considerations
Sophisticated phishing campaigns increasingly use legitimate infrastructure, stolen certificates, and domain lookalikes that evade technical controls. User training and authentication mechanisms such as multi-factor authentication reduce but do not eliminate risk; successful defence requires layered detection and incident response capabilities.
Referenced By2 terms mention Phishing
Other entries in the wiki whose definition references Phishing — useful for understanding how this concept connects across Cybersecurity and adjacent domains.
More in Cybersecurity
Intrusion Detection System
Defensive SecurityA system that monitors network traffic or system activities for malicious activity or policy violations.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.
Identity Threat Detection and Response
Identity & AccessSecurity solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.
Security Orchestration, Automation and Response
Defensive SecurityA technology stack that integrates security tools and automates incident response workflows, enabling faster triage, investigation, and remediation of security alerts.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Next-Generation Firewall
Defensive SecurityAn advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.