8 Dodgy Phishing Tricks

Free Hacking Tutorials
User avatar
ltx_Lazzarus
Posts: 55
Joined: Tue Apr 09, 2024 8:05 pm

8 Dodgy Phishing Tricks

Postby ltx_Lazzarus » Tue Apr 23, 2024 7:40 am

1.- Whaling:
Whaling is a type of spear phishing that targets the big fish - high-profile people or execs in a company. The scammers go after the CEOs, CFOs, and other top dogs, trying to trick them into giving up sensitive corporate data or personal info.

2.- Angler Phishing:
Angler phishing is when scammers take advantage of popular social media trends or current events. They create fake accounts or pages on sites like Facebook or X and use hot topics, promotions, or whatever's trending to lure people into giving up their info or clicking dodgy links.

3.- Spear Phishing:
Spear phishing is a more targeted version of email phishing. The scammers do their research on a specific person or company to make the emails super personal. They might include your name, job title, or details about recent stuff to make it seem more legit. The more personal it is, the more likely you'll fall for it.

4.- Email Phishing:
One of the most common phishing tricks is through emails. The scammers send dodgy emails that look legit, like they're from your bank, social media, or other online services you use. These emails often have an urgent message, trying to get you to click a link or download something. Their goal is to trick ya into giving up personal info like login details or credit card numbers.

5.- Smishing:
Smishing, or SMS phishing, is when the scammers send dodgy text messages to your mobile. These texts often have links to fake websites or ask you to reply with personal info. People tend to trust texts, so it's an easy way for scammers to get you to click on something without thinking.

6.- Vishing:
Vishing, or voice phishing, is when the scammers call you up pretending to be someone legit like your bank or a government agency. They use sneaky tactics to try and get you to reveal sensitive info like credit card numbers, tax file numbers, or login details over the phone.

7.- Clone Phishing:
With clone phishing, the scammers start with a real email you've already received. They make a nearly identical copy but change the links to dodgy ones. You're more likely to trust it since it looks like it's from a legit source.

8.- Pharming:
It's when some dodgy blokes redirect ya web traffic to a fake-as-heck website that's tryna impersonate a legit one. They pull this stunt by mucking around with the DNS (domain name system) settings or exploiting holes in certain software. Basically, they're trying to rip ya off by sending ya to their bogan site instead of the real deal.
stopthe4ttack.box

Return to “Hacking Tutorials”