Tricks Most Used in Phishing Today

Of all the cyber attacks that can break the security of users, one very present through email is Phishing . It basically consists of tricking the victim into thinking that they are dealing with something legitimate. However, it is actually a scam, a page, link or service that pretends to be an official organization but is not. In this article we are going to show the main tricks they are using in these attacks this year.

Main tricks for Phishing

Hackers are constantly looking for ways to improve their attacks. It is true that security tools improve threat detection and users themselves also know how to better analyze when they are faced with a deception attempt. But of course, attackers also perfect the techniques they use.

Tricks Most Used in Phishing Today

In order to deceive the victim, to cross the security barriers, cyber criminals use different tricks for Phishing . However, some are more present and should be known.

One of the most used techniques in recent months related to identity theft has to do with the rules of conduct in a company. Supposedly from HR they send an email to the worker to inform him of new guidelines, tasks or changes. The victim opens the link thinking that it really is something important about the company and that they should know.

Trucos en ataques Phishing

Another widely used trick is to get scared about paying taxes . They send an e-mail informing them that there has been an error in the declaration, that we have to pay a tax that we have in debt, etc. They seek, as we see, to make the victim become nervous and want to know what it is about. The problem, once again, is that when you click on that link or download that file, you are actually dealing with a fraud.

The third trick on the list is closely related to the current situation. It is an email that they send us from our company to indicate the times and dates in which they are going to do maintenance and we will not be able to access the computer equipment. Today many users work remotely, so they are accessing these systems from home and want to know when it will not work.

The newly assigned tasks are also very present in Phishing attacks. They try to make the victim believe that they have to use new tools or functions in their daily lives. The user, a worker in this case, opens that email to see what to do.

The fifth widely used strategy is to simply check that the system works through an email. The victim receives this e-mail where they are instructed to click on a link to verify that the system works correctly. Something as simple and fast as that.

In short, these five strategies have been widely used during this year to carry out Phishing attacks. As we always say, common sense must be present and not make mistakes. We leave you an article with the types of Phishing.