As IT control systems are increasingly secure and difficult to crack, fraudsters have had to find other ways of obtaining the personal information they need from users, and one of them is to trick them into handing it over themselves.
Phishing is a type of computer scam that consists in someone pretending to be from a company contacting a person to obtain information about personal data, passwords, bank accounts, credit card numbers, identification cards, etc., and use them for fraudulent purposes.
Contact can take place in a number of different ways: a phone call (vishing), an SMS or text message (smishing), a link to a website that looks like another, a pop-up window or an email, for example. In all cases, the person contacted is asked to provide or give access to personal information, supposedly for security or maintenance reasons, or is led to believe that a survey is being conducted or a special offer being promoted. Basically, anything that makes that person provide her or his personal details.
Phishing comes from the word fishing, as it is a metaphor for using a hook and bait to catch a person out.
The most well-known and widespread method is to make contact via email. These emails contain a link to a website that is an almost identical copy of the login page of the company fraudsters are attempting to impersonate. Both the email and the website may contain logos, forms, texts, etc., to make it seem that they are the same as the legitimate company’s, so that the user enters personal information and sends it.