Types of Phishing Attacks
Across
- 2. Attack an eavesdropper monitors communication between two unsuspecting parties who have logged in at phony public WiFi networks at public places (e.g., coffee shops, shopping malls).
- 5. involves a malicious email seeming to be from a person in or related with the victim’s company demanding urgent action, whether sending money or buying gift cards.
- 7. Hijacking cybercriminals gaining access to an organization’s web server and steal the confidential or sensitive information kept on the server.
- 8. Phishing victim is tempted into clicking a link or download an attachment so that a computer virus, worm, Trojan horse, spyware, or scareware can be installed on the device.
- 11. Engine Phishing fake websites which appear in search results are set and used in gathering sensitive personal information and direct payments.
- 12. Phishin phishing attack focused to specific victims or group of victims using personal information.
- 14. In this SMS-enabled phishing with attached malicious link sent to smartphone users.
- 15. Fraud makes use of an email address that is familiar to the victim and the victim is urgently asked to act and transfer funds, update employee details, or install a new app on their computing device.
- 16. a suspicious caller claims to be from tech support, a government agency or other legitimate organization and attempts you to share your personal information (e.g., credit card details).
- 17. Manipulation a carefully worded phishing email with a link to a popular website is sent to victims. This link actually takes the victims to a fake version of the said popular website then the site will ask them to confirm or update their account details.
Down
- 1. Injection cybercriminals hack a popular website and include a phony website login page or pop-up that directs website guests to the phony site.
- 3. makes use of a digital ad software to publish legitimate looking ads with malicious code implanted within it.
- 4. Websites phishing emails with links to fake websites (e.g., mobile account login page for a popular mail provider) are sent to victims requesting them to share their credentials or other sensitive information into the phony website’s interface.
- 6. Phishing involves a shady actor compromising a person’s email account by making changes to an existing email, swapping a legitimate link, attachment or other element with a malicious one, and sending it to the person’s contacts to distribute the infection.
- 8. Phishing a widespread phishing attack that is not highly targeted.
- 9. phishing that targets a specific “big” victim within a company (e.g., CEO).
- 10. phishing attack that involves the internet’s domain name system (DNS)
- 13. Twin” Wi-Fi unsuspecting victims who log into the spoofed legitimate-looking Wi-Fi hotspot points, usually in public places (e.g., coffee shops, airports, hospitals, shopping malls, public parks) are asked to enter their username or password via a fake site which goes directly to the hacker.