UNCOVER THE TRICKS BEHIND
EVERY PHISHING SCAM

15 TYPES OF PHISHING ATTACK
USED BY CYBERCRIMINALS

Understand what phishing is and learn to recognize the various types of
phishing attacks used to trick users online.

TYPES OF PHISHING ATTACK

Phishing involves an attacker trying to trick someone into providing sensitive account or other login information online. All the different types of phishing are designed to take advantage of the fact that so many people do business over the internet. This makes phishing one of the most prevalent cybersecurity threats around, rivaling distributed denial-of-service (DDoS) attacks, data breaches, and many kinds of malware.

Knowing the different types of phishing attacks can equip you to protect your organization from each.

Header Image
01

Spear Phishing

Targeted messages crafted using personal details to trick a specific person or team.

Example: An email referencing a recent project and asking for login details.

Header Image
02

Vishing

Voice-based phishing where attackers call and impersonate organisations to extract information.

Example: A caller posing as IT support asking for your password to "fix an issue".

Header Image
03

Email Phishing

Generic fraudulent emails pretending to be from trusted organisations asking you to click a link or provide credentials.

Example: An email claiming your bank account is suspended with a link to “reactivate”.

Header Image
04

HTTPS Phishing

Attackers use HTTPS to look safe. Always verify the domain and certificate and do not trust the padlock alone.

Example: A link to https://secure-bank-login.example-login.com, shows a padlock but not the real bank domain and asks for your password.

Header Image
05

Pharming

Redirecting users from legitimate websites to fake ones (often via DNS or compromised routers) to steal data.

Example: Typing a bank URL but being forwarded to a convincing fake login page.

Header Image
06

Popup Phishing

Fake browser pop-ups warn of “viruses” or urgent updates to trick you into downloading malware or calling fake support.

Example: A popup says “Your PC is infected, download this tool now” and provides a malicious installer.

Header Image
07

Evil Twin Phishing

Attackers create a fake Wi‑Fi hotspot with a familiar name so victims connect and have their traffic intercepted or credentials captured.

Example: A wifi named “Cafe_Free_WiFi” asks for email/password to “connect” and steals the entered info.

Header Image
08

Watering Hole Phishing

Attackers compromise sites frequented by a target group, then use those trusted sites to distribute phishing or malware.

Example: A popular industry forum is injected with malicious JavaScript that steals credentials.

Header Image
09

Whaling

High-value spear phishing that targets executives or other important people in an organisation.

Example: A fake invoice email sent to a CFO requesting an urgent transfer.

Header Image
10

Clone Phishing

A real email or page is copied and modified to include malicious links or attachments, making it appear authentic.

Example: A resend of a previous invoice email with the payment link replaced by a malicious URL.

Header Image
11

Deceptive Phishing

Generic scam emails impersonate trusted organisations to create fear or urgency, tricking recipients into revealing credentials.

Example: An email styled like a bank alert says “Your account is locked, verify now” linking to a fake login page.

Header Image
12

Social Engineering

Attackers manipulate emotions, fear, urgency, helpfulness to trick people into revealing secrets or taking unsafe actions.

Example: A colleague’s chat message urgently requests a shared folder password so “they can finish a report.”

Header Image
13

Angler Phishing

Scams that occur on social media or customer support channels, impersonating official help accounts.

Example: A fake support tweet directing users to submit account details via a link.

Header Image
14

Smishing

Phishing delivered by SMS/text messages. It is often includes urgent links or codes.

Example: A text claiming a parcel is waiting and asking you to click a tracking link.

Header Image
15

Man In The Middle

An attacker intercepts communication to steal credentials or alter messages without your knowledge.

Example: On public Wi‑Fi, a fake login page captures your email and password while appearing to be the real site.

Want to learn how to spot these scams? Check out our quick tips and countermeasures.

Read tips