ESX Virtualization

VMware ESXi, vSphere, VMware Backup, Hyper-V... how-to, videos....

Nakivo Backup and Replication - #1 Backup solution for Virtual, physical, cloud, NAS and SaaS

Menu
  • Certification
      • VCP-DCV vSphere 8
          • vcp2024-125.
        • Close
    • Close
  • VMware
    • Configuration Maximums
    • vSphere
      • vSphere 8.0
      • vSphere 7.0
      • vSphere 6.7
      • vSphere 6.5
      • vSphere 6.0
      • Close
    • VMworld
      • VMware EXPLORE 2024
      • VMware EXPLORE 2023
      • VMware EXPLORE 2022
      • VMworld 2019
      • VMworld 2018
      • VMworld 2017
      • VMworld 2016
      • VMworld 2015
      • VMworld 2014
      • VMworld 2013
      • VMworld 2012
      • VMworld 2011
      • Close
    • Close
  • Microsoft
    • Windows Server 2012
    • Windows Server 2016
    • Windows Server 2019
    • Close
  • Categories
    • Tips – VMware, Microsoft and General IT tips and definitions, What is this?, How this works?
    • Server Virtualization – VMware ESXi, ESXi Free Hypervizor, VMware vSphere Server Virtualization, VMware Cloud and Datacenter Virtualization
    • Backup – Virtualization Backup Solutions, VMware vSphere Backup and ESXi backup solutions.
    • Desktop Virtualization – Desktop Virtualization, VMware Workstation, VMware Fusion, VMware Horizon View, tips and tutorials
    • How To – ESXi Tutorials, IT and virtualization tutorials, VMware ESXi 4.x, ESXi 5.x and VMware vSphere. VMware Workstation and other IT tutorials.
    • Free – Free virtualization utilities, ESXi Free, Monitoring and free backup utilities for ESXi and Hyper-V. Free IT tools.
    • Videos – VMware Virtualization Videos, VMware ESXi Videos, ESXi 4.x, ESXi 5.x tips and videos.
    • Home Lab
    • Reviews – Virtualization Software and reviews, Disaster and backup recovery software reviews. Virtual infrastructure monitoring software review.
    • Close
  • Partners
    • NAKIVO
    • StarWind
    • Zerto
    • Xorux
    • Close
  • This Web
    • News
    • ESXi Lab
    • About
    • Advertise
    • Archives
    • Disclaimer
    • PDFs and Books
    • Close
  • Free
  • Privacy policy

Are You Aware of the Most Common Phishing Attacks?

By Vladan SEGET | Last Updated: November 18, 2019

Shares

A phishing attack according to Wikipedia is an example of social engineering techniques used to deceive users. These are mostly fraudulent attempts to obtain personal information such as passwords, banking details, home addresses, and usernames by disguising as a credible item in electronic communication.

Phishing is usually meant to either make the victim hand over sensitive information by getting credentials or downloading malware to infect the system. There are different types of phishing attacks, and it is necessary to know about these attacks to ensure your information is safe.

Spear Phishing

This type of phishing completely relies on personalization; instead of targeting a whole group of people, the attackers focus on one to get into the system. The victim is usually researched on mostly through social media – this way the information sent by the fraudster is custom made to actually convince the victim they have a connection. The fraudster then uses this vulnerability to get the victim to click on a malicious URL or email attachment leading to access to data.

Deceptive Phishing

Fraudsters have found ways to create fake websites that may look exactly like the original of a company or organization. The impersonated website will then use threats and a sense of urgency to make the victim provide information that may lead to giving of login credentials or personal information. An example would be an email asking an account holder to verify discrepancies in his or her account but then the link redirects to a malicious URL. VPN connections that come with malicious website detectors can help curb this type of phishing. For this purpose you can use a free VPN, for example Hotspot Shield. Also Tunnelbear and ProtonVPN are the choices which most commonly appear in ‘best of’ lists on review sites.

Whaling

Imagine what would happen to a company’s information if the top executives’ login credentials are accessed by a hacker. This type of phishing is specifically designed to target the most important people in an organization typically known as ‘the big fish”. A top executive such as a CEO will most likely be able to access a lot of information regarding the company, hence profiling them and getting their credentials will easily lead to access to a lot of sensitive information.

Pharming

Traditional methods of phishing are starting to fail hence leading to fraudsters changing their tactics and now using Pharming. This mode of attack stems from the domain name system cache poisoning. What normally happens is that the internet uses DNS servers to convert alphabetic website names to numerical IP addresses used to locate services and devices. In the event of a DNS cache poisoning, the attacker targets a DNS server and changes the IP address associated with an alphabetic website name. This enables the attacker to redirect users with the correct website name to malicious websites. The most dangerous thing about this type of phishing is that the user does not have to click on any malicious ink or download any malware.

Business Email Compromise (BEC)

Getting an email from your CEO regarding financial transactions may lead an employee to act on it, but this may just be the work of a fraudster. The idea is to target employees in the finance or accounting department. The attack usually takes the form of an email which looks like it came from the compromised colleague, and since the fraudsters are likely to have studied the company’s processes and procedures; they are likely to be successful in tricking the employee.

Vishing

Have you ever received a voice message from your “bank” asking you to call a number to verify your details or pin? Well, you may have just been in contact with a fraudster. Vishing is basically phishing but over the phone thus using voice. The number provided to call will typically ring straight to the attacker’s phone via voice-over-IP service and divulging information will lead to data access.

Clone Phishing

You need to be highly suspicious when receiving a similar message to what you had received earlier but with a different attachment. Attackers have been known to clone previous legitimate messages to get victims to click and open malicious attachments. They may even have an explanation as to why the message had to be resent. An attacker may also use a cloned website with a spoofed domain to get more access.

Conclusion

Phishing is among the most common form of cyber-attacks, and it clearly proves that any employee or individual can be used to get to the system. Organizations and individuals may be vulnerable to the above, and it is advisable for them to take a keen interest in the safety of their information. User education should be at the forefront of anyone wanting to secure their information. Investing in good antivirus software for all devices, implementing virus database updates along with security upgrades issued by a trusted Internet Service Provider on a regular basis are some of the ways of getting secure these may not protect sensitive information fully but it is a good start to ensuring the same.

Are there any other forms of phishing that you are aware of?

Note: This post was sponsored by ARGUS LABS LIMITED

More from ESX Virtualization

  • ESXi Free vs Paid – What are the differences?
  • What is VMware vCenter Convergence Tool?
  • ESXi Free vs Paid – What are the differences?
  • How To Reset ESXi Root Password via Microsoft AD
  • How to Patch VMware vCenter Server Appliance (VCSA) 6.7 Offline
  • How To do a Dry Run of an esxcli Installation or Upgrade on VMware ESXi
  • Veeam Availability Console Released (VAC)

Stay tuned through RSS, and social media channels (Twitter, FB, YouTube)

Shares
Vote !

| Filed Under: Featured

About Vladan SEGET

This website is maintained by Vladan SEGET. Vladan is as an Independent consultant, professional blogger, vExpert x16, Veeam Vanguard x9, VCAP-DCA/DCD, ESX Virtualization site has started as a simple bookmarking site, but quickly found a large following of readers and subscribers.

Connect on: Facebook. Feel free to network via Twitter @vladan.

Private Sponsors

Featured

  • Thinking about HCI? G2, an independent tech solutions peer review platform, has published its Winter 2023 Reports on Hyperconverged Infrastructure (HCI) Solutions.
  • Zerto: One Platform for Disaster Recovery, Backup & Cloud Mobility: Try FREE Hands-On Labs Today!
Click to Become a Sponsor

Most Recent

  • Veeam confirming vSphere 9.0 and ESXi 9 upcoming support
  • Veeam Backup & Replication v13 Beta: A Game-Changer with Linux
  • What is Veeam Data Cloud Vault and how it can help SMBs
  • Nakivo Backup and Replication – Malware Scan Feature
  • Zerto 10 U7 released with VMware NSX 4.2 Support
  • XorMon NG 1.9.0 Infrastructure Monitoring – now also with Veeam Backup Support
  • Heartbeat vs Node Majority StarWind VSAN Failover Strategy
  • Vulnerability in your VMs – VMware Tools Update
  • FREE version of StarWind VSAN vs Trial of Full version
  • Commvault’s Innovations at RSA Conference 2025 San Francisco

Get new posts by email:

 

 

 

 

Support us on Ko-Fi

 

 

Buy Me a Coffee at ko-fi.com

Sponsors

Free Trials

  • DC Scope for VMware vSphere – optimization, capacity planning, and cost management. Download FREE Trial Here.
  • Augmented Inline Deduplication, Altaro VM Backup v9 For #VMware and #Hyper-V – Grab your copy now download TRIAL.

VMware Engineer Jobs

VMware Engineer Jobs

YouTube

…

Find us on Facebook

ESX Virtualization

…

Copyright © 2025 ·Dynamik-Gen · Genesis Framework · Log in