Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

236Citations
Citations of this article
1.3kReaders
Mendeley users who have this article in their library.

Abstract

With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals. Phishing is an example of a highly effective form of cybercrime that enables criminals to deceive users and steal important data. Since the first reported phishing attack in 1990, it has been evolved into a more sophisticated attack vector. At present, phishing is considered one of the most frequent examples of fraud activity on the Internet. Phishing attacks can lead to severe losses for their victims including sensitive information, identity theft, companies, and government secrets. This article aims to evaluate these attacks by identifying the current state of phishing and reviewing existing phishing techniques. Studies have classified phishing attacks according to fundamental phishing mechanisms and countermeasures discarding the importance of the end-to-end lifecycle of phishing. This article proposes a new detailed anatomy of phishing which involves attack phases, attacker’s types, vulnerabilities, threats, targets, attack mediums, and attacking techniques. Moreover, the proposed anatomy will help readers understand the process lifecycle of a phishing attack which in turn will increase the awareness of these phishing attacks and the techniques being used; also, it helps in developing a holistic anti-phishing system. Furthermore, some precautionary countermeasures are investigated, and new strategies are suggested.

References Powered by Scopus

Why phishing works

946Citations
N/AReaders
Get full text

Social phishing

827Citations
N/AReaders
Get full text

Learning to detect phishing emails

464Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study

120Citations
N/AReaders
Get full text

Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods

68Citations
N/AReaders
Get full text

A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures

48Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021, March 9). Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science. Frontiers Media S.A. https://doi.org/10.3389/fcomp.2021.563060

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 134

60%

Lecturer / Post doc 53

24%

Researcher 26

12%

Professor / Associate Prof. 10

4%

Readers' Discipline

Tooltip

Computer Science 173

71%

Engineering 37

15%

Social Sciences 20

8%

Business, Management and Accounting 15

6%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1
News Mentions: 4
References: 2
Social Media
Shares, Likes & Comments: 19

Save time finding and organizing research with Mendeley

Sign up for free