Understanding phishing: common attack types and how to protect yourself
Phishing remains one of the most prevalent cyber threats facing organisations and individuals in the UK. This week, The Guardian reported a rise in phishing attacks targeting UK MPs via messaging apps, highlighting how threat actors are increasingly using direct messages, text messages, and social platforms to bypass traditional email security controls.
If you’re concerned about your business being targeted by threat actors, contact Zensec today for same-day expert support.
At its core, phishing is a cyber attack where scammers attempt to trick users into revealing sensitive information, such as login credentials, payment details, or other personal and financial information. These attacks rely on social engineering, using emails, messaging apps, phone calls, or fake online content to manipulate victims into actions that benefit the attacker.
Think of phishing as a baited hook. Attackers create fake websites, malicious emails, or closely mimicked official communications designed to appear as though they come from legitimate companies. Once a victim engages, attackers may gain access to bank accounts, corporate systems, or sensitive data, leading to identity theft, data breaches, or business email compromise.
In this blog, we break down common types of phishing attacks, explain how phishing campaigns operate, and provide practical steps to help protect yourself and your organisation.
What is phishing?
At its core, phishing is a form of cyber attack that exploits trust. Attackers send phishing emails, phishing messages, or SMS text messages that encourage users to click malicious links, download malicious software, or submit information via phishing sites.
Most phishing campaigns aim to:
- Steal sensitive information
- Capture login credentials
- Deliver malicious code
- Enable further targeted attacks
These attacks often use urgency, unusual requests, or fear to trick victims into acting quickly without verification.
Common types of phishing attacks
- Email phishing: Email phishing remains the most common technique. Scammers launch thousands of phishing emails containing suspicious links, attachments, or malicious websites. Messages may include spelling errors, grammatical errors, or spoofed sender details that imitate a legitimate domain name.
- Spear phishing: Spear phishing is a targeted attack aimed at specific individuals or departments, often the finance department requesting urgent action. A spear phishing email may appear error free and reference internal details, making it harder to detect.
- Clone phishing: Clone phishing copies a genuine message from a trusted sender but replaces links or attachments with malicious links or downloading malware. Because the message closely resembles previous communications, phishing attempts are harder to spot.
- Whaling (whale phishing):Whale phishing targets senior executives. These attacks often focus on high-value transactions, access to email servers, or confidential business information.
- Business email compromise (BEC): A common UK threat, business email compromise occurs when attackers gain access to or spoof a corporate email account to request fraudulent payments or sensitive data.
- Mobile phishing: Smishing and vishing: It is becoming increasingly common. SMS phishing, often referred to as smishing, uses SMS text messages to deliver phishing scams, malicious links, or QR code phishing prompts designed to trick users into revealing sensitive information. Voice phishing, or vishing, relies on phone calls that impersonate banks, service providers, or other trusted
Additional phishing techniques include:
- Social media phishing using fake profiles or compromised social media accounts
- Angler phishing via customer support impersonation
- Search engine phishing using fake adverts or malicious sites
- Watering hole phishing targeting frequently visited websites
- Evil twin phishing using fake Wi-Fi access points
- HTTPS phishing, where secure-looking URLs hide malicious intent
- Domain spoofing that mimics a legitimate domain
How to spot phishing attempts
Recognising phishing attempts is key to staying safe online. Common warning signs include suspicious emails or direct messages that use urgent or threatening language, requests to reveal sensitive information or personal details, and the presence of suspicious links or unexpected attachments. Phishing messages may also show mismatched IP addresses or sender details, or claim that accounts will be locked or payments reversed unless immediate action is taken. Before clicking any links or opening attachments, always verify URLs using a search engine and confirm the legitimate domain independently.
How to protect yourself from phishing
To prevent phishing attacks, both organisations and individuals should take a proactive approach to security. This includes using security software, anti-malware software, and spam filters, as well as enabling multi-factor authentication on key accounts. Users should avoid clicking malicious links or downloading unknown attachments and verify unusual requests through a second communication channel. Regular training to help staff recognise phishing techniques and suspicious activity is also essential. Strong controls significantly reduce the likelihood of a successful phishing attack and help limit exposure to sensitive data.
What to do after a successful phishing attack
If phishing occurs, it is important to act quickly. Cut contact with the attacker immediately and change any compromised passwords. Secure affected bank accounts and systems, and report the suspicious activity internally as well as to the relevant authorities. Taking prompt action can help limit damage and prevent further compromise.
Final considerations
Phishing is an evolving threat that continues to impact UK organisations. From email phishing and spear phishing to mobile attacks and social media phishing, understanding phishing campaigns is essential to cyber resilience.
By recognising phishing scams, avoiding malicious websites, and implementing strong security controls, organisations can reduce risk and protect sensitive information.
Building a strong cyber security culture is one of the most effective ways to reduce risk. Take the next step by enrolling your team in our phishing simulation training and awareness programmes, turning real-world phishing attacks into practical learning experiences.