Types of Phishing Attacks

1234567891011121314151617
Across
  1. 2. Attack an eavesdropper monitors communication between two unsuspecting parties who have logged in at phony public WiFi networks at public places (e.g., coffee shops, shopping malls).
  2. 5. involves a malicious email seeming to be from a person in or related with the victim’s company demanding urgent action, whether sending money or buying gift cards.
  3. 7. Hijacking cybercriminals gaining access to an organization’s web server and steal the confidential or sensitive information kept on the server.
  4. 8. Phishing victim is tempted into clicking a link or download an attachment so that a computer virus, worm, Trojan horse, spyware, or scareware can be installed on the device.
  5. 11. Engine Phishing fake websites which appear in search results are set and used in gathering sensitive personal information and direct payments.
  6. 12. Phishin phishing attack focused to specific victims or group of victims using personal information.
  7. 14. In this SMS-enabled phishing with attached malicious link sent to smartphone users.
  8. 15. Fraud makes use of an email address that is familiar to the victim and the victim is urgently asked to act and transfer funds, update employee details, or install a new app on their computing device.
  9. 16. a suspicious caller claims to be from tech support, a government agency or other legitimate organization and attempts you to share your personal information (e.g., credit card details).
  10. 17. Manipulation a carefully worded phishing email with a link to a popular website is sent to victims. This link actually takes the victims to a fake version of the said popular website then the site will ask them to confirm or update their account details.
Down
  1. 1. Injection cybercriminals hack a popular website and include a phony website login page or pop-up that directs website guests to the phony site.
  2. 3. makes use of a digital ad software to publish legitimate looking ads with malicious code implanted within it.
  3. 4. Websites phishing emails with links to fake websites (e.g., mobile account login page for a popular mail provider) are sent to victims requesting them to share their credentials or other sensitive information into the phony website’s interface.
  4. 6. Phishing involves a shady actor compromising a person’s email account by making changes to an existing email, swapping a legitimate link, attachment or other element with a malicious one, and sending it to the person’s contacts to distribute the infection.
  5. 8. Phishing a widespread phishing attack that is not highly targeted.
  6. 9. phishing that targets a specific “big” victim within a company (e.g., CEO).
  7. 10. phishing attack that involves the internet’s domain name system (DNS)
  8. 13. Twin” Wi-Fi unsuspecting victims who log into the spoofed legitimate-looking Wi-Fi hotspot points, usually in public places (e.g., coffee shops, airports, hospitals, shopping malls, public parks) are asked to enter their username or password via a fake site which goes directly to the hacker.