{"id":2681,"date":"2021-01-23T16:27:15","date_gmt":"2021-01-23T13:27:15","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=2681"},"modified":"2021-01-23T16:27:17","modified_gmt":"2021-01-23T13:27:17","slug":"understanding-phishing-and-the-6-types-of-phishing-emails","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/","title":{"rendered":"Understanding Phishing and the 6 Types of Phishing Emails"},"content":{"rendered":"\n<p>What is phishing? Phishing (pronounced <em>fishing<\/em>) is trying to gather personal information using deceptive emails and websites.<\/p>\n\n\n\n<p>Phishing is one of the oldest types of cyberattacks dating back to the 1990s. It is also still one of the most widespread and malicious attacks. Indeed, Verizon&#8217;s&nbsp;<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">2020 Data Breach Investigations Report<\/span><\/strong><\/a>&nbsp;finds that phishing is the top threat action associated with breaches.<\/p>\n\n\n\n<p>Phishing messages and techniques have become increasingly sophisticated over the years and perpetrators are getting much better at it thanks to well-produced, off-the-shelf tools and templates.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69d25dc761efe\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69d25dc761efe\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#1_Phishing_Defined\" title=\"1. Phishing Defined\">1. Phishing Defined<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#2_Characteristics_of_Phishing\" title=\"2. Characteristics of Phishing \">2. Characteristics of Phishing <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#3_Types_of_Phishing_Emails\" title=\"3. Types of Phishing Emails\">3. Types of Phishing Emails<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#i_Phishing_Mass-market_emails\" title=\"i. Phishing: Mass-market emails\">i. Phishing: Mass-market emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#ii_Spear_phishing_Targeting_just_a_handful\" title=\"ii. Spear phishing: Targeting just a handful\">ii. Spear phishing: Targeting just a handful<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#iii_Whaling_Targeting_the_big_fish_top_executives\" title=\"iii. Whaling: Targeting the big fish (top executives)\">iii. Whaling: Targeting the big fish (top executives)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#iv_Business_Email_Compromise_BEC_Impersonation_of_finance_officersCEOs\" title=\"iv. Business Email Compromise (BEC): Impersonation of finance officers\/CEOs\">iv. Business Email Compromise (BEC): Impersonation of finance officers\/CEOs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#v_Clone_Phishing_An_almost_identical_copy\" title=\"v. Clone Phishing: An almost identical copy\">v. Clone Phishing: An almost identical copy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#vi_Snowshoeing_Spreading_poisonous_messages\" title=\"vi. Snowshoeing: Spreading poisonous messages\">vi. Snowshoeing: Spreading poisonous messages<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#4_Other_types_of_Phishing\" title=\"4. Other types of Phishing\">4. Other types of Phishing<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#Vishing_Phishing_over_the_phone\" title=\"Vishing: Phishing over the phone\">Vishing: Phishing over the phone<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#The_Wangiri_Scam\" title=\"The Wangiri Scam\">The Wangiri Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#Smishing_Phishing_via_text_message\" title=\"Smishing: Phishing via text message\">Smishing: Phishing via text message<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#5_Why_Cybersecurity_Awareness_is_Valuable_in_Reducing_Impact_of_Phishing_Attacks\" title=\"5. Why Cybersecurity Awareness is Valuable in Reducing Impact of Phishing Attacks\">5. Why Cybersecurity Awareness is Valuable in Reducing Impact of Phishing Attacks<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"1_Phishing_Defined\"><\/span>1. <strong>Phishing Defined<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As the name suggests, phishing (fishing) is an analogy of a fisherman throwing a hook with bait and hoping the fish bite. In this case, the cyber attacker hopes his target (possibly you) falls for the trick.<\/p>\n\n\n\n<p>Phishing is a cyberattack that uses disguised email as a weapon. What really distinguishes phishing is the form the message takes. The attackers masquerade as a trusted person or company the victim might do business with. The aim is to trick the email recipient into either disclosing sensitive information, downloading an attachment, or transferring funds.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"2_Characteristics_of_Phishing\"><\/span>2. <strong>Characteristics of Phishing <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>While there are different types of phishing, the common characteristic among phishing attacks is disguise. Cyber attackers make their email address looks like it&#8217;s coming from someone else (spoofing). They then set up fake websites that look like ones their target trusts.<\/p>\n\n\n\n<p>Generally, a phishing campaign will try to get its victim to do one of three things. Either divulge sensitive information, launch fraudulent transactions, or download malware onto their computers.<\/p>\n\n\n\n<p><strong>Divulge sensitive information<\/strong>.&nbsp;These messages aim to trick you into revealing important data. This is data such as passwords, identity card information, date of birth, bank account and credit card details, etc.<\/p>\n\n\n\n<p>Most often, a username and password that the attacker can use to breach your system or account. This is done by sending emails that appear to be messages from financial institutions such as banks. Although the attackers may not know where you bank, by sending the email message to millions of people (spamming), the attacker is certain that some of the recipients will be customers of that bank.<\/p>\n\n\n\n<p>Clicking on a link in such a message will often direct you to a malicious site designed to resemble the bank&#8217;s site. The attackers hope that you will key in your username and password here. Once you do, they can capture these details and use them to access your bank account<\/p>\n\n\n\n<p><strong>Launch fraudulent transactions<\/strong>. The attacker&#8217;s email appears to be from a legitimate source and gives instructions to transfer funds to an account.<\/p>\n\n\n\n<p><strong>Download malware<\/strong><em>.&nbsp;<\/em>These types of phishing emails aim to get you to infect your computer with <strong><a href=\"https:\/\/www.mailsafi.com\/glossary\/malware\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">malware<\/span><\/a><\/strong>. They might send staff in the HR department an attachment that claims to be a job seeker&#8217;s CV, for example. The attachment is often a .zip file or Word document embedded with <strong>malicious code<\/strong>. <\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"3_Types_of_Phishing_Emails\"><\/span>3. <strong>Types of Phishing<\/strong> Emails<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>According to Proofpoint&#8217;s\u00a0<a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">2020 State of the Phish<\/span><\/strong><\/a>\u00a0report,\u00a065% of US organizations experienced a successful phishing attack in 2019. This speaks to both the sophistication of attackers and the need for equally sophisticated security awareness training. Add in the fact that not all phishing scams work the same way. Some are generic email blasts. Others are carefully crafted to target a specific person, making it harder to train users to identify suspicious messages.<\/p>\n\n\n\n<p>Let\u2019s look at the different types of phishing attacks and how to recognize them.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"i_Phishing_Mass-market_emails\"><\/span>i. <strong>Phishing: Mass-market emails<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Mass-market phishing is the most common form of phishing. It is a general, mass-mailed type, where someone sends an email pretending to be someone else and tries to trick the recipient into doing something, usually logging into a website or downloading <strong><a href=\"https:\/\/www.mailsafi.com\/glossary\/malware\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">malware<\/span><\/a><\/strong>. Attacks frequently rely on email spoofing. Here, the <em>From<\/em> field is forged to make the message appear as if it were sent by a trusted sender.<\/p>\n\n\n\n<p>However, phishing attacks don\u2019t always look like a warning message from PayPal about passwords expiring, or an Office 365 email about storage quotas. Some are crafted to specifically target organizations and individuals.<\/p>\n\n\n\n<p>Here is an example of a Phishing email captured by MailSafi spam filters.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"558\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-1-1-1024x558.jpg\" alt=\"\" class=\"wp-image-2718\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-1-1-1024x558.jpg 1024w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-1-1-300x163.jpg 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-1-1-768x419.jpg 768w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-1-1.jpg 1112w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Phishing email captured by MailSafi spam filters<\/figcaption><\/figure>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"ii_Spear_phishing_Targeting_just_a_handful\"><\/span>ii. <strong>Spear phishing: Targeting just a handful<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Spear phishing refers to when cyber attackers try to craft a message targeted to a specific individual<em>.&nbsp;<\/em>(The image is of a fisherman aiming for one specific fish, rather than just casting a baited hook in the water to see who bites). Instead of trying to get banking credentials for 1,000 consumers, the attacker may find it more worthwhile to target just 10 businesses.<\/p>\n\n\n\n<p>Spear phishing attacks are extremely successful because the attackers spend a lot of time crafting information specific to the recipient. They may gather information about their target from sites such as LinkedIn. Or, they may reference a conference the recipient may have attended or send a malicious attachment where the filename references a topic the recipient is interested in. They then use spoofed addresses to send emails that appear like they&#8217;re coming from co-workers.<\/p>\n\n\n\n<p><strong><em>Example: <\/em><\/strong>The spear phisher might target someone in the finance department and pretend to be the victim&#8217;s manager urgently requesting a large money transfer.<\/p>\n\n\n\n<p>Also, see another example of a spear-phishing attack targeted at a member of our staff at<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a href=\"https:\/\/www.mailsafi.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">MailSafi<\/span><\/a><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"523\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2-1024x523.jpg\" alt=\"\" class=\"wp-image-2721\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2-1024x523.jpg 1024w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2-300x153.jpg 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2-768x392.jpg 768w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2-1536x785.jpg 1536w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-2.jpg 1538w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Example of a phishing email targeted at a member of staff at MailSafi<\/figcaption><\/figure>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"iii_Whaling_Targeting_the_big_fish_top_executives\"><\/span>iii. <strong>Whaling: Targeting the big fish (top executives)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><em>Whale phishing,<\/em>&nbsp;or&nbsp;<em>whaling<\/em>, is a type of spear phishing aimed at the very big fish \u2014 top executives, CEOs, or other high-value targets. A successful whaling attack is likely to be more lucrative because the stolen information may be more valuable than that from a regular employee.<\/p>\n\n\n\n<p>Whaling needs additional research because the attacker needs to know who the intended victim communicates with and the kind of discussions they have.<\/p>\n\n\n\n<p><strong>Example<\/strong>:<\/p>\n\n\n\n<ol type=\"a\"><li>A scammer may target company board members because while they may have a high level of authority within a company, they aren&#8217;t full-time employees, and therefore, they often use personal email addresses for business-related correspondence. Personal email addresses may lack the level of protection offered by corporate email.<\/li><li>Emails that reference customer complaints, legal subpoenas, or even a problem in the executive suite.<\/li><li><\/li><\/ol>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"iv_Business_Email_Compromise_BEC_Impersonation_of_finance_officersCEOs\"><\/span>iv. <strong>Business Email Compromise (BEC): Impersonation of finance officers\/CEOs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In BEC, scammers pretend to be key individuals in finance departments or CEO\/MDs. By impersonating financial officers and CEOs, these criminals attempt to trick victims into initiating money transfers into unauthorized accounts.<\/p>\n\n\n\n<p>Here\u2019s how it works:<\/p>\n\n\n\n<ul><li>First the cyber criminals compromise the email account of a senior executive or financial officer by exploiting an existing infection or via a spear phishing attack.<\/li><li>The attacker then hangs around monitoring the executive\u2019s email activity for a period of time to learn about processes and procedures within the company.<\/li><li>Then the attack. Typically in the form of a false email that looks like it has come from the compromised executive\u2019s account being sent to someone who is a regular recipient. The email appears to be important and urgent, and it requests that the recipient transfer funds to an external or unfamiliar bank account. If successful, the money ultimately lands in the attacker\u2019s bank account.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"625\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-3-whaling.jpg\" alt=\"\" class=\"wp-image-2725\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-3-whaling.jpg 929w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-3-whaling-300x202.jpg 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-email-sample-3-whaling-768x517.jpg 768w\" sizes=\"(max-width: 929px) 100vw, 929px\" \/><figcaption>Example of a business email compromise<\/figcaption><\/figure>\n\n\n\n<p>According to the Anti-Phishing Working Group&#8217;s&nbsp;<a href=\"https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Phishing Activity Trends Report<\/span><\/strong><\/a>&nbsp;for Q3 2020, the number of phishing attacks had grown since Q2 2020 and the average amount requested during wire transfer BEC attacks in Q3 2020 was $48,000.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"v_Clone_Phishing_An_almost_identical_copy\"><\/span><strong>v. Clone Phishing: An almost identical copy<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In clone phishing, the attacker may either:<\/p>\n\n\n\n<ul><li>Create a cloned website with a spoofed domain to trick the victim, or<\/li><li>Craft a nearly identical replica of a legitimate email message to trick the victim into thinking it is real.<\/li><\/ul>\n\n\n\n<p>In the case of the cloned email, the email is then sent from an email address that closely resembles the legitimate sender. While the body of the message may look the same as a previous message, the attachment or the link in the message has been swapped out with a malicious one. The attacker will usually try to explain the reason he is resending the message, or an updated version, such as \u201c<em>Sorry, sent the wrong attachment earlier. Please refer to this one instead<\/em>.\u201d<\/p>\n\n\n\n<p>This attack relies on a message previous legitimate message seen by the recipient. This undoubtedly makes it more likely that the email recipient will fall for the attack.<\/p>\n\n\n\n<p>An attacker who has already infected one user may use this technique against another person who also received the message that is being cloned.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"vi_Snowshoeing_Spreading_poisonous_messages\"><\/span><strong>vi. Snowshoeing: Spreading poisonous messages<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Snowshoeing, or \u201chit-and-run\u201d spam, requires attackers to push out messages via multiple domains and IP addresses. By doing this reputation or volume-based <a href=\"https:\/\/www.mailsafi.com\/glossary\/spam-filtering\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">spam filtering<\/span><\/strong><\/a> technologies will not recognize and block them immediately because each IP address\/domain sends out only a low volume of messages.<\/p>\n\n\n\n<p>Some of the messages make it to the targets\u2019 email inboxes before the spam filters learn to block them.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"4_Other_types_of_Phishing\"><\/span>4. Other types of Phishing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are also other types of phishing attacks, although these are not sent via email. These are the wangiri scam (phone), vishing (phone), and smishing (SMS).<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"Vishing_Phishing_over_the_phone\"><\/span><strong>Vishing: Phishing over the phone<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Vishing stands for \u201cvoice phishing\u201d and it entails the use of the phone. Typically, the victim receives a call with a voice message disguised as a communication from a financial institution.<\/p>\n\n\n\n<p><strong>Example<\/strong>: The voice message might ask the recipient to call a number and enter their account information or PIN for security verification. What the target may not know is that the phone number they call actually goes straight to the attacker via a voice-over-IP (VOIP) service.<\/p>\n\n\n\n<p>In a&nbsp;<a href=\"https:\/\/www.netsec.news\/highly-sophisticated-apple-vishing-scam-detected\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">sophisticated vishing scam<\/span><\/strong><\/a>&nbsp;in 2019, criminals called victims pretending to be Apple tech support and providing users with a number to call to resolve the \u201csecurity problem.\u201d Like the old Windows tech support scam, these scams took advantage of user fears of their devices getting hacked.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"The_Wangiri_Scam\"><\/span>The Wangiri Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Have you ever received a call from an unknown international number that only rang once? Did you return that missed call? If you have, the chances are that you lost money.<\/p>\n\n\n\n<p>The term <em>Wangiri <\/em>is Japanese for &#8220;one (ring) and cut.&#8221; As the name implies the scam involves receiving missed calls from international numbers you don&#8217;t recognize on a mobile\/landline phone. The fraudsters generating the calls rely on human&#8217;s innate curiosity. They hope that their expensive international numbers will be called back so that they can profit.<\/p>\n\n\n\n<p>Many people will instinctively return a missed call, even from a mysterious international number. Returning the call will lead to the victim being ripped off as the call will be re-routed to a premium rate number overseas. The victim is billed exorbitantly for listening to pre-recorded messages.<\/p>\n\n\n\n<p>If you receive a missed call from an unknown number, do not return the call.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"Smishing_Phishing_via_text_message\"><\/span><strong>Smishing: Phishing via text message<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Smishing, a combination of &#8220;phishing&#8221; and &#8220;SMS\u201d is a cyberattack that uses misleading text messages to deceive victims. The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing you to take certain action that gives the attacker more information about you such as your online banking login credentials or access to your mobile device.<\/p>\n\n\n\n<p>Smishing is on the rise because people are more likely to read and respond to text messages than email:<strong><span class=\"has-inline-color has-black-color\">&nbsp;<\/span><a href=\"https:\/\/www.gartner.com\/en\/marketing\/insights\/articles\/tap-into-the-marketing-power-of-sms\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">98% of text messages are read and 45% are responded to<\/span><\/a><\/strong>, while those for email are 20% and 6%, respectively. Users are also often less vigilant on their phones than on their computers, and most often, personal devices lack the type of security available on corporate PCs.<\/p>\n\n\n\n<p>Hailstorm campaigns work the same as snowshoe, except the messages are sent out over an extremely short time span. Some hailstorm attacks end just as the anti-spam tools catch on and update the filters to block future messages. Unfortunately, by the time the <strong><a href=\"https:\/\/www.mailsafi.com\/glossary\/spam-filtering\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">spam filtering<\/span><\/a><\/strong> tools are updated, the attackers have already moved on to the next campaign.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"5_Why_Cybersecurity_Awareness_is_Valuable_in_Reducing_Impact_of_Phishing_Attacks\"><\/span>5. Why <strong>Cybersecurity Awareness<\/strong> is Valuable in Reducing Impact of Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Some companies regularly remind users to beware of phishing, however, many users don\u2019t really know how to recognize phishing scams. Also, humans generally tend to be bad at recognizing scams.<\/p>\n\n\n\n<p>Traditional email security tools (such as spam filters) are not sufficient defense against some forms of phishing. This is because they are not 100% full-proof. Therefore, organizations need to appreciate the importance of cyber awareness training and campaigns to ensure staff is equipped with skills to aid in the fight against cyber attackers.<\/p>\n\n\n\n<p>Typically, while a reasonably savvy user may be able to appreciate that clicking on a link in a suspicious email could result in a download of <strong><a href=\"https:\/\/www.mailsafi.com\/glossary\/malware\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">malware<\/span><\/a><\/strong> or escalate to gathering more sensitive information from you, most end users do not understand the impact of falling for a phishing attack.<\/p>\n\n\n\n<p>Less cyber-aware users may think nothing would happen or wind up with spam advertisements and pop-ups. Only the more cyber aware users can associate potential damage such as credential theft and account compromise to suspicious emails. This risk assessment gap makes it more difficult for users to grasp the seriousness of recognizing malicious messages.<\/p>\n\n\n\n<p>Organizations need to consider existing internal or external cybersecurity awareness training or campaigns to ensure staff is equipped to recognize different types of attacks.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">MailSafi can help you jump start your fight against phishing with a world-class <strong><a href=\"https:\/\/www.mailsafi.com\/email-security\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">spam filtering solution <\/span><\/a><\/strong>and support your cybersecurity awareness efforts through our <strong><a href=\"https:\/\/www.mailsafi.com\/cyber-security-training\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">cybersecurity awareness training program<\/span><\/a><\/strong>.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2681\" class=\"pvc_stats all  \" data-element-id=\"2681\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>What is phishing? Phishing (pronounced fishing) is trying to gather personal information using deceptive emails and websites. Phishing is one of the oldest types of cyberattacks dating back to the 1990s. It is also still one of the most widespread and malicious attacks. Indeed, Verizon&#8217;s&nbsp;2020 Data Breach Investigations Report&nbsp;finds that phishing is the top threat [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2681\" class=\"pvc_stats all  \" data-element-id=\"2681\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2698,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[23,169,252],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing &amp; The 6 Types of Phishing Emails Explained | MailSafi<\/title>\n<meta name=\"description\" content=\"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing &amp; The 6 Types of Phishing Emails Explained | MailSafi\" \/>\n<meta property=\"og:description\" content=\"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-23T13:27:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-23T13:27:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"626\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"Understanding Phishing and the 6 Types of Phishing Emails\",\"datePublished\":\"2021-01-23T13:27:15+00:00\",\"dateModified\":\"2021-01-23T13:27:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\"},\"wordCount\":2261,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg\",\"keywords\":[\"email security\",\"phishing emails\",\"phishing scams\"],\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\",\"name\":\"Phishing & The 6 Types of Phishing Emails Explained | MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg\",\"datePublished\":\"2021-01-23T13:27:15+00:00\",\"dateModified\":\"2021-01-23T13:27:17+00:00\",\"description\":\"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg\",\"width\":626,\"height\":500,\"caption\":\"Phishing emails\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Phishing and the 6 Types of Phishing Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing & The 6 Types of Phishing Emails Explained | MailSafi","description":"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"Phishing & The 6 Types of Phishing Emails Explained | MailSafi","og_description":"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.","og_url":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2021-01-23T13:27:15+00:00","article_modified_time":"2021-01-23T13:27:17+00:00","og_image":[{"width":626,"height":500,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg","type":"image\/jpeg"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"Understanding Phishing and the 6 Types of Phishing Emails","datePublished":"2021-01-23T13:27:15+00:00","dateModified":"2021-01-23T13:27:17+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/"},"wordCount":2261,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg","keywords":["email security","phishing emails","phishing scams"],"articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/","url":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/","name":"Phishing & The 6 Types of Phishing Emails Explained | MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg","datePublished":"2021-01-23T13:27:15+00:00","dateModified":"2021-01-23T13:27:17+00:00","description":"Phishing is a cyberattack that uses disguised email to attack. We explain the different types of phishing scams and how to identify them.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/phishing-emails.jpg","width":626,"height":500,"caption":"Phishing emails"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Phishing and the 6 Types of Phishing Emails"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2681"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=2681"}],"version-history":[{"count":43,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2681\/revisions"}],"predecessor-version":[{"id":2741,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2681\/revisions\/2741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/2698"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=2681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=2681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=2681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}