Phishing Attacks: A Guide to Spotting and Understanding the Threat

Glen MusaGlen Musa
3 min read

In cybersecurity, phishing remains one of the most persistent — and successful — attack methods. It’s not about breaking through firewalls with complex code; it’s about exploiting human psychology. Attackers craft convincing messages to trick people into revealing sensitive information, downloading malicious software, or giving access to secure systems.

Why Phishing Works

Phishing targets the human element in security.

Even with advanced security software, a single click on a malicious link can bypass millions of dollars’ worth of technical defenses.

Common psychological triggers include:

  • Urgency: “Your account will be suspended in 24 hours!”

  • Authority: “This is the CEO — I need this done now.”

  • Curiosity: “Click here to see the confidential report.”

  • Fear: “Suspicious activity detected on your account.”

  • Social proof: “Everyone is trying out this new thing.”

Common Types of Phishing:

  • Email Phishing – The classic approach, sending fraudulent emails with malicious links or attachments.

  • Spear Phishing – Targeted attacks against specific individuals or organizations using personal details.

  • Whaling – Spear phishing aimed at high-value targets like executives.

  • Smishing – Phishing via SMS messages.

  • Vishing – Voice phishing over the phone.

  • Clone Phishing – Copying a legitimate email, replacing links/attachments with malicious ones.

  • Business Email Compromise (BEC) – Using compromised accounts to request money or sensitive data.

What Phishing is Used For:

Phishing is a gateway to larger attacks. Common objectives include:

  • Credential Harvesting – Stealing usernames, passwords, and MFA codes.

  • Financial Fraud – Requesting unauthorized transfers or payments.

  • Malware Delivery – Installing ransomware, spyware, or trojans.

  • Corporate Espionage – Stealing confidential business data.

Hands-On Example: My Phishing Simulation with SET

To go beyond theory, I created a phishing simulation in a safe, controlled lab using Kali Linux and the Social-Engineer Toolkit (SET).

The Social-Engineer Toolkit is an open-source platform used by ethical hackers to simulate real-world social engineering attacks.

Process:

  • Launched Kali Linux in a VirtualBox VM.

  • Used SET’s Website Attack Vectors module to clone a legitimate login page.

  • Configured SET to log any credentials entered.

  • Sent the cloned page link to my test email account.

  • Entered dummy credentials to confirm SET captured them.

Key Takeaways:

  • Cloning a site with SET takes minutes — showing how easy phishing can be.

  • Even a well-trained eye can be tricked if the fake site is convincing enough.

  • Security awareness training is vital for all staff, technical or not.

Side Note: This was done in an offline lab with no real targets. Ethical guidelines and permissions are non-negotiable in security testing.

Real-World Impact

Phishing was involved in over 80% of reported breaches in 2024 according to major cybersecurity reports.

Even Fortune 500 companies have suffered multi-million-dollar losses from a single successful phishing email.

One untrained employee can undo years of security investments causing untold damage.

0
Subscribe to my newsletter

Read articles from Glen Musa directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Glen Musa
Glen Musa