Clone Phishing

  • 7 September 2020
  • 0 replies
  • 20 views
Clone Phishing
Userlevel 7
Badge +48
  • Community and Advocacy Manager
  • 1631 replies

Our phishing series continues with an especially nefarious form, one that can be very difficult to detect once a cybercriminal has gained access to an account, likely leveraging stolen credentials, perhaps even obtained via another one of the forms of phishing we’ve covered.

In clone phishing, a shady actor makes changes to an existing email, resulting in a nearly identical (cloned) email but with a legitimate link, attachment, or other element swapped for a malicious one. These attacks can’t get off the ground without an attacker first compromising an email account, so a good defense is using strong, unique passwords paired with two-factor authentication.

What Clone Phishing Looks Like

Download the 11 Types of Phishing eBook

 

 

 


0 replies

Be the first to reply!

Reply