Phishing
What is Phishing?
Phishing is a scamming method by which criminals attempt to obtain confidential information such as usernames, passwords and credit card details by posing as trustworthy sources. This fraud is usually carried out via emails, fake websites or messages that look deceptively similar to the legitimate communication channels of well-known companies.
The attackers send messages designed to appear to come from trusted sources such as banks or well-known online services. These messages often contain links to fake websites that look very similar to the companies’ real sites. As soon as users enter their information on these fake sites, it is intercepted and misused by the fraudsters.
Phishing can also be carried out via text messages, phone calls or other digital means of communication, whereby the fraudsters try to gain the trust of the victims and get them to disclose sensitive information. To protect yourself from phishing, it is important to be suspicious of unexpected messages and to carefully check the authenticity of links and senders before responding.
Recent examples of phishing attacks can be found on this page of the Federal Office for Information Securitygefunden werden.
What are the different types of phishing?
E-Mail-Phishing
Spear-Phishing
Whaling
Smishing
Vishing
What are frequent attack scenarios?
Microsoft Teams
Outlook
Zoom
WebEx
Microsoft Updates
Citrix
Google Meet
Internal attacks
This is how we help you achieve your goal:
Initialisierung
Festlegung des Geltungsbereich
Informationen
- Leitfaden zu Phishing-Kampagnen
- Unternehmen besser kennenlernen
- Mögliche Angriffsvektoren besprechen
- Festlegen von Angriffszeiträumen
Aufbau
Aufbau und Durchführung
Aufbau
- Aufbau der Angriffe
- Spamtests durchführen
- 1. Angriff mit Berichterstattung
- 2. Angriff mit Berichterstattung
Halbzeit
Analyse des Ist-Zustandes
Halbzeit
- Vorstellen des Ist-Zustandes
- 3. Angriff mit Berichterstattung
- 4. Angriff mit Berichterstattung
Abschluss
Vorstellen des End-Zustandes
Abschluss
- Abschlussreport
- Weitere Maßnahmen besprechen
Our customers
Contact person
Contact us for further information
ZDRAVKO MATIC
IT-Security Consultant