33. Phishing

Phishing

Phishing is a type of cybercrime where attackers impersonate a legitimate person, brand, or organization to trick individuals into revealing sensitive information such as:

  • Login credentials
  • Bank account or credit card numbers
  • Aadhaar or PAN details
  • OTPs or PINs
  • Personal identification details

The attacker typically uses emails, SMS, phone calls, or fake websites to carry out the attack. It is called “phishing” because it’s like “fishing” for victims by luring them with bait.


2. How Phishing Works (Step-by-Step)

  1. Bait Creation
    The attacker creates a fake but convincing message, link, or website that resembles a trusted entity (e.g., a bank, government agency, or employer).
  2. Delivery
    The phishing message is sent via email, SMS, social media, or fake websites.
  3. Victim Interaction
    The user clicks a link or downloads an attachment, thinking it’s safe.
  4. Data Theft or Malware Execution
    • User is asked to “log in” on a fake site, giving away credentials.
    • Or, malware is installed on the user’s system for spying or stealing.
  5. Exploitation
    The attacker uses the stolen information for:
    • Identity theft
    • Bank fraud
    • Unauthorized purchases or fund transfers
    • Gaining access to secure systems

3. Types of Phishing Attacks

TypeDescriptionExample
Email PhishingFake emails with malicious links or attachments“Your bank account is blocked. Click here to verify.”
Spear PhishingTargeted phishing aimed at specific individuals using personal data“Dear Mr. Rao, your tax report needs verification.”
WhalingTargets senior executives or high-profile individualsCEO gets an email from a fake “legal department”
SmishingPhishing via SMS (SMS + Phishing)“Your PAN card is suspended. Call 1234567890.”
VishingVoice phishing using fake calls“This is RBI. Confirm your account number to avoid suspension.”
PharmingRedirecting users to fake websites by manipulating DNSA user enters a bank URL and lands on a fake login page
Clone PhishingDuplicates a real email with a malicious link or attachmentForwarding a legitimate newsletter with altered links

4. Real-Life Phishing Examples in India

  • IRCTC Fake Emails: Users received fake ticket booking links mimicking IRCTC, stealing payment info.
  • SBI Phishing SMS: SMS claiming to be from SBI asking to update KYC, leading to credential theft.
  • Aadhaar Phishing: Fake websites asked for Aadhaar number and OTPs to link bank accounts.

5. Prevention and Safety Tips

For Individuals:

  • Do not click on suspicious links in emails or SMS.
  • Always check sender’s email address carefully.
  • Verify URLs – phishing sites often use slight spelling variations.
  • Use multi-factor authentication (MFA) on important accounts.
  • Keep antivirus and browsers updated.
  • Never share OTPs or PINs, even if the request seems urgent.

For Organizations:

  • Conduct cybersecurity awareness training.
  • Use email filtering and anti-phishing tools.
  • Implement strong access controls and network monitoring.
  • Simulate phishing attacks to educate employees.

6. Legal Aspects in India

✅ Covered Under the Information Technology Act, 2000:

SectionProvisionPunishment
Sec 43Penalty for unauthorized access to computers or networksCivil liability and damages
Sec 66Computer-related offenses (data theft, fraud)Up to 3 years imprisonment + fine
Sec 66CIdentity theft (using someone else’s password or signature)Up to 3 years + ₹1 lakh fine
Sec 66DCheating by personation using a computer (Phishing, Vishing)Up to 3 years + ₹1 lakh fine

✅ Also covered under:

  • Indian Penal Code (IPC) Sections 419 (cheating by impersonation), 420 (cheating and dishonestly inducing delivery of property)

7. Key Signs of a Phishing Attempt

Requests for confidential or financial information

Unusual or urgent language: “Immediate action required”

Fake domain names: g00gle.com, paypa1.net

Poor grammar or spelling

Unexpected attachments or shortened URLs

Leave a Reply

Your email address will not be published. Required fields are marked *