Skip to main content

Our phishing series continues with an especially nefarious form, one that can be very difficult to detect once a cybercriminal has gained access to an account, likely leveraging stolen credentials, perhaps even obtained via another one of the forms of phishing we’ve covered.

In clone phishing, a shady actor makes changes to an existing email, resulting in a nearly identical (cloned) email but with a legitimate link, attachment, or other element swapped for a malicious one. These attacks can’t get off the ground without an attacker first compromising an email account, so a good defense is using strong, unique passwords paired with two-factor authentication.

What Clone Phishing Looks Like

Download the 11 Types of Phishing eBook

 

 

 

Be the first to reply!

Reply