Phishing has emerged to be one of the most extensively used means bycybercriminals to deceive online users. In fact, most individuals who have anemail account or a cell phone would have come across a number of phishingemails; some even falling into this cyber trap.
The International Telecommunications Union (ITU) of the United Nations has defined Phishing as
The ways and methods of Phishing have drastically diversified after ITU had defined the term. Today Phishing happens over email, phone, over social media, matrimonial portals, etc with various approaches and strategies.
Credit Card / Banking
OTP / Banking
Fake Government Schemes’
Google Docs / Cloud
Fake Jobs Phishing /
Fake Government Body Emails
(RBI, IT Dept, etc)
Event Phishing (Cricket World Cup,
popular Concerts, etc)
We encourage you to report scams & frauds here which will help us to warn respective authorities, warn people about current scams, monitor trends and disrupt scams where possible.
Please include details of the scam contact you received, for example, email or screenshot.
Personalised attacks in which hacker knows which target they are after in order to increase the chances of them falling into their trap.
Same email is sent to millions with a request to fill in personal details which will be used by the phishers for their illegal activities.
Phisher sends a link to a malicious website which opens up the phisher’s website instead of the website mentioned in the link.
Technique where the phisher changes a part of thecontent on the page of a reliable website to mislead the user to go to a fraudinformation-seeking page.
User is directed to fake products sitesfrom search engines which may offer low cost products or services.
The phisher makes phone calls to the user and bygaining trust seeks personal & banking information of the bank accountthrough the phone.
Phishing conducted via SMS.
A method of attack which stems from domain name system(DNS) cache poisoning.
Whaling is an attempt to go after the targethigh-level employees and executives to gain access to their email accountsor spoof them.
18 January, 2019
11 October, 2018