Credentials and Personal Information Theft Through Fake Web Sites
Phishing attacks leverage fraudulent websites (a.k.a. Phishing sites) using trustworthy brands to persuade users to surrender credentials and other sensitive information. Emails, social networks, SMS and manipulated search engine results (i.e. SEO) are used to channel user to these sites. More sophisticated phishing attacks use personal information about the victim to make the email appear more legitimate (i.e. “Spear-Phishing”).
IBM® intelligence has shown that 80% of phishing victims access online banking phishing sites within the first 4 hours of an attack.