Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

What Is Phishing? How to Spot It and Stop It

A phishing attack is a fraudulent communication that is designed to trick a person into giving up private information (like passwords or credit card numbers), paying money, or downloading malicious software. More specifically, phishing is a social engineering attack where criminals send fraudulent messages—usually by email—purporting to be a legitimate business, organization, or person.

It is primarily conducted via email, though attackers can also use phone calls and text messages. It uses social engineering and link manipulations to trick humans instead of network systems.

Phishing is a cyberattack where criminals impersonate a trustworthy source to trick victims into sharing sensitive data or downloading malware.

Types of Phishing

Phishing is an umbrella term for various types of phishing attacks. While email phishing is the most common, there are several other phishing examples, including:

Email Phishing: Emails that trick you into revealing sensitive information or downloading malware.

Spear Phishing: A targeted form of email phishing that focuses on a single specific victim rather than a large group.

Vishing: Voice phishing, usually done via phone call or voice message.

Smishing: Phishing attacks delivered through text messages.

Pharming: Maliciously redirecting users from a legitimate website to a fake version, by malware or DNS spoofing.

Whaling and CEO Fraud: Phishing attacks that specifically target or impersonate high-ranking executives.

Angler Phishing: Phishing attacks targeting social media users, usually by impersonating brand accounts.

URL Phishing: Directing users to spoofed websites with fake URLs.

How Phishing Works

Phishing attacks use social engineering to target both individuals and businesses. They pose as legitimate businesses, like a bank, agencies, like the IRS, or even people that the victim personally knows, like a work manager.

Artificial urgency is a key component of phishing that helps make it such an effective attack. Phishing attempts often come with time-sensitive prompts like a manager needing an immediate wire transfer for an important invoice.

How to Spot Phishing

Common signs of a phishing email include poor grammar and spelling, generic greetings, urgent language, suspicious links or attachments, and mismatched sender addresses. Users should hover over any links to confirm they lead to official websites before clicking.

How to Stop Phishing

Organizations can reduce the risk of phishing by deploying advanced email security solutions, implementing multi-factor authentication, conducting regular employee security awareness training, and using email authentication protocols like SPF, DKIM, and DMARC. Pangratis uses behavioral AI to detect and block phishing attacks that evade traditional security tools by analyzing the content, context, and intent of each email rather than relying solely on known threat signatures.

Phishing bypasses most email filters

AI-native detection catches attacks that signature-based tools miss — including novel and targeted phishing.

See how we stop phishing