Phishing: Definition and Attack Mechanics
Phishing is the practice of sending fraudulent communications (typically emails, but also text messages, phone calls, or social media messages) that impersonate legitimate entities to trick recipients into revealing sensitive information, clicking malicious links, or downloading malware. The term "phishing" derives from the metaphor of "fishing"—casting a wide net to "catch" victims, with emails as bait.
Phishing attacks combine technical and psychological manipulation:
- Email Spoofing: Falsifying the "From" address to appear from trusted sources
- Domain Mimicry: Creating domains that closely resemble legitimate ones (paypa1.com vs paypal.com)
- Urgency Creation: Artificial time pressure ("Account will be locked in 24 hours")
- Authority Impersonation: Pretending to be IT, Finance, HR, or executive leadership
- Credential Harvesting: Fake login pages capturing usernames and passwords
- Malware Delivery: Attachments or links containing executable files or exploits
- Data Exfiltration: Gathering information for secondary attacks or sale
🎯 Why Phishing Remains Devastatingly Effective
Despite being well-known for decades, phishing attacks show increasing effectiveness. FBI data consistently shows phishing as the initial attack vector for the majority of data breaches. This paradox exists because: (1) Scalability: Attackers send millions of emails. Even a 0.1% success rate yields hundreds of compromised accounts. (2) Psychological Exploitation: Phishing triggers urgency, authority, and fear—psychological principles that override logical analysis. (3) Low Technical Barrier: Phishing requires minimal technical skill and infrastructure. Anyone can rent a hosting account and create a fake login page. (4) Rapid Evolution: Attackers constantly adapt techniques based on what works. As defenses improve, attackers modify their approach. (5) Human Unpredictability: Unlike software, humans cannot be "patched." A well-crafted phishing email exploits individual vulnerabilities that vary per person. (6) Information Asymmetry: Phishing emails use publicly available information (employee names, organizational structure, current projects) to appear legitimate.