CINXE.COM

What Is Phishing? - Definition, Types of Attacks & More | Proofpoint US

<!DOCTYPE html> <html lang="en-us" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema# " class="page-en"> <head> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-MGR7P8X');</script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-B1V8SZE3GL"></script> <script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-B1V8SZE3GL');</script> <script>(function(){var a=window.mutiny=window.mutiny||{};if(!window.mutiny.client){a.client={_queue:{}};var b=["identify","trackConversion"];var c=[].concat(b,["defaultOptOut","optOut","optIn"]);var d=function factory(c){return function(){for(var d=arguments.length,e=new Array(d),f=0;f<d;f++){e[f]=arguments[f]}a.client._queue[c]=a.client._queue[c]||[];if(b.includes(c)){return new Promise(function(b,d){a.client._queue[c].push({args:e,resolve:b,reject:d})})}else{a.client._queue[c].push({args:e})}}};c.forEach(function(b){a.client[b]=d(b)})}})();</script> <script data-cfasync="false" src="https://client-registry.mutinycdn.com/personalize/client/d454424c4514a20a.js"></script> <meta charset="utf-8" /> <meta name="description" content="Learn what phishing is, the history, how it works, and more. Find out how Proofpoint can help protect your people and organization from phishing attacks." /> <link rel="canonical" href="https://www.proofpoint.com/us/threat-reference/phishing" /> <link rel="shortlink" href="https://www.proofpoint.com/us/threat-reference/phishing" /> <link rel="icon" href="/themes/custom/proofpoint/apps/drupal/favicon.ico" /> <link rel="mask-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon.svg" /> <link rel="icon" sizes="16x16" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-16x16.png" /> <link rel="icon" sizes="32x32" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-32x32.png" /> <link rel="icon" sizes="96x96" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-96x96.png" /> <link rel="icon" sizes="192x192" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-192x192.png" /> <link rel="apple-touch-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-60x60.png" /> <link rel="apple-touch-icon" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <link rel="apple-touch-icon-precomposed" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-57x57.png" /> <link rel="apple-touch-icon-precomposed" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon-precomposed" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon-precomposed" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon-precomposed" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon-precomposed" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon-precomposed" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon-precomposed" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <meta property="og:site_name" content="Proofpoint" /> <meta property="og:type" content="website" /> <meta property="og:url" content="https://www.proofpoint.com/us/threat-reference/phishing" /> <meta property="og:title" content="What Is Phishing? - Definition, Types of Attacks &amp; More | Proofpoint US" /> <meta property="og:description" content="Learn what phishing is, the history, how it works, and more. Find out how Proofpoint can help protect your people and organization from phishing attacks." /> <meta property="og:image" content="" /> <meta property="og:image:url" content="" /> <meta property="og:image:secure_url" content="" /> <meta property="article:published_time" content="2021-02-18T16:54:30-08:00" /> <meta property="article:modified_time" content="2024-11-02T04:29:38-07:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="What Is Phishing? - Definition, Types of Attacks &amp; More | Proofpoint US" /> <meta name="twitter:site" content="@proofpoint" /> <meta name="twitter:description" content="Learn what phishing is, the history, how it works, and more. Find out how Proofpoint can help protect your people and organization from phishing attacks." /> <meta name="twitter:url" content="https://www.proofpoint.com/us/threat-reference/phishing" /> <meta name="twitter:image" content="" /> <link rel="alternate" hreflang="en-us" href="https://www.proofpoint.com/us/threat-reference/phishing" /> <link rel="alternate" hreflang="en-gb" href="https://www.proofpoint.com/uk/threat-reference/phishing" /> <link rel="alternate" hreflang="fr" href="https://www.proofpoint.com/fr/threat-reference/phishing" /> <link rel="alternate" hreflang="de" href="https://www.proofpoint.com/de/threat-reference/phishing" /> <link rel="alternate" hreflang="es" href="https://www.proofpoint.com/es/threat-reference/phishing" /> <link rel="alternate" hreflang="ja" href="https://www.proofpoint.com/jp/threat-reference/phishing" /> <link rel="alternate" hreflang="en-au" href="https://www.proofpoint.com/au/threat-reference/phishing" /> <link rel="alternate" hreflang="it" href="https://www.proofpoint.com/it/threat-reference/phishing" /> <script data-cfasync="false" type="text/javascript" id="vwoCode">window._vwo_code=window._vwo_code || (function() { var account_id=767242, version=1.3, settings_tolerance=2000, library_tolerance=2500,z use_existing_jquery=false, is_spa=1, hide_element='body', /* DO NOT EDIT BELOW THIS LINE */ f=false,d=document,code={use_existing_jquery:function(){return use_existing_jquery},library_tolerance:function(){return library_tolerance},finish:function(){if(!f){f=true;var e=d.getElementById('_vis_opt_path_hides');if(e)e.parentNode.removeChild(e)}},finished:function(){return f},load:function(e){var t=d.createElement('script');t.fetchPriority='high';t.src=e;t.type='text/javascript';t.innerText;t.onerror=function(){_vwo_code.finish()};d.getElementsByTagName('head')[0].appendChild(t)},init:function(){window.settings_timer=setTimeout(function(){_vwo_code.finish()},settings_tolerance);var e=d.createElement('style'),t=hide_element?hide_element+'{opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;}':'',i=d.getElementsByTagName('head')[0];e.setAttribute('id','_vis_opt_path_hides');e.setAttribute('nonce',document.querySelector('#vwoCode').nonce);e.setAttribute('type','text/css');if(e.styleSheet)e.styleSheet.cssText=t;else e.appendChild(d.createTextNode(t));i.appendChild(e);this.load('https://dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(d.URL)+'&f='+ +is_spa+'&vn='+version);return settings_timer}};window._vwo_settings_timer = code.init();return code;}());</script> <meta name="facebook-domain-verification" content="l349mr2tyecyl7w3a1146378lqxru1" /> <meta name="MobileOptimized" content="width" /> <meta name="HandheldFriendly" content="true" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/proofpoint.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Regular-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Bold-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="alternate" hreflang="pt" href="https://www.proofpoint.com/br/threat-reference/phishing" /> <link rel="alternate" hreflang="ko" href="https://www.proofpoint.com/kr/threat-reference/phishing" /> <title>What Is Phishing? - Definition, Types of Attacks &amp; More | Proofpoint US</title> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_WcSl7P-Ss7FG7eY1ij6nmORMS68V4waWnE3xuYAQtxU.css?delta=0&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg" /> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_L1bZhcH9m1y7PbRhvY5ou0N3V7xD8ooxpiOesvmlrBQ.css?delta=1&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg" /> <script src="/sites/default/files/js/js_Wi8RdyzDF-uwGcwq9eMv1Giiu7RfMo7nYneG5kg6rd4.js?scope=header&amp;delta=0&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg"></script> </head> <body class="path-node"> <a href="#main-content" class="visually-hidden focusable"> Skip to main content </a> <div class="limit-width-wrapper"> <div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas> <div class="header-nav__spacer"></div> <div class="header-nav js-is-top"> <div class="header-nav__extra"> <div class="header-nav__extra-wrap"> <div class="header-nav__top-language" data-open="content:x_lng"> <span>English (Americas)</span> </div> <div class="header-nav__actions"> <div class="header-nav__top-search" data-open="content:x_sch"> <span>Search</span> </div> <div class="header-nav__top-login" data-open="content:x_lgn"> <span>Login</span> </div> </div> </div> </div> <div class="header-nav__main"> <div class="header-nav__main-wrap"> <div class="header-nav__expand" data-open="home"></div> <ul class="header-nav__top-links"> <li class="header-nav__top-link"> <div data-open="content:platform_panel" class="header-nav__top-link-text"> Platform </div> </li> <li class="header-nav__top-link"> <div data-open="content:products_panel" class="header-nav__top-link-text"> Products </div> </li> <li class="header-nav__top-link"> <div data-open="content:solutions_panel" class="header-nav__top-link-text"> Solutions </div> </li> </ul> <a href="/us" class="header-nav__logo">Proofpoint</a> <div class="header-nav__buttons"> <a href=/us/contact class="global-elements__cta-button--outline header-nav__button" > <span>Contact</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> <div class="header-nav__mobile-actions"> <div class="header-nav__mobile-search" data-open="content:x_sch">Search</div> <div class="header-nav__mobile-menu" data-open="home"></div> </div> </div> </div> </div> <div class="header-nav__menu"> <div class="header-nav__menu-wrapper"> <div class="header-nav__menu-close"></div> <div class="header-nav__menu-pane" data-home={true}> <ul class="header-nav__home-links"> <li class="header-nav__home-link" data-open="content:platform_panel" ><span>Platform</span></li> <li class="header-nav__home-link" data-open="content:products_panel" ><span>Products</span></li> <li class="header-nav__home-link" data-open="content:solutions_panel" ><span>Solutions</span></li> <li class="header-nav__home-link" data-open="content:partners_panel" ><span>Partners</span></li> <li class="header-nav__home-link" data-open="content:resources_panel" ><span>Resources</span></li> <li class="header-nav__home-link" data-open="content:company_panel" ><span>Company</span></li> </ul> <div class="header-nav__menu-extras"> <div class="header-nav__menu-search" data-open="content:x_sch">Search</div> <div class="header-nav__menu-login" data-open="content:x_lgn">Login</div> <div class="header-nav__menu-language" data-open="content:x_lng">English (Americas)</div> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Platform"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Platform</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Products"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Products</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Solutions"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Solutions</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Partners"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Partners</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Resources"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Resources</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Company"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Company</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="products_panel"> <div class="header-nav__content"> <a href="/us/products/protect-people" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Protect People</div> <div class="header-nav__content-group-desc">Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.</div> </div> </a> <div class="header-nav__content-link"> <a href="/us/products/threat-defense" class="header-nav__content-link-text">Email Security</a> </div> <div class="header-nav__content-link"> <a href="/us/products/impersonation-protection" class="header-nav__content-link-text">Impersonation Protection</a> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:products_more_tp_products_panel">More products</a> </div> <a href="/us/products/defend-data" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Defend Data</div> <div class="header-nav__content-group-desc">Transform your information protection with a human-centric, omni-channel approach.</div> </div> </a> <div class="header-nav__content-link"> <a href="/us/products/data-loss-prevention" class="header-nav__content-link-text">Enterprise DLP</a> </div> <div class="header-nav__content-link"> <a href="/us/products/adaptive-email-dlp" class="header-nav__content-link-text">Adaptive Email DLP</a> </div> <div class="header-nav__content-link"> <a href="/us/products/insider-threat-management" class="header-nav__content-link-text">Insider Threat Management</a> </div> <div class="header-nav__content-link"> <a href="/us/products/compliance-and-archiving" class="header-nav__content-link-text">Intelligent Compliance</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Mitigate Human Risk</div> <div class="header-nav__content-group-desc">Unlock full user risk visibility and drive behavior change.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/mitigate-human-risk" class="header-nav__content-link-text">Security Awareness</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Augment Your Capabilities</div> </div> <div class="header-nav__content-link"> <a href="/us/products/premium-services" class="header-nav__content-link-text">Managed Services</a> </div> <div class="header-nav__content-link"> <a href="/us/products/packages" class="header-nav__content-link-text">Product Packages</a> </div> <div class="header-nav__content-link-spacer"></div> </div> </div> <div class="header-nav__menu-pane" data-content="products_more_tp_products_panel"> <div class="header-nav__content"> <div class="header-nav__content-heading">More Protect People Products</div> <div class="header-nav__content-link"> <a href="/us/products/identity-protection" class="header-nav__content-link-text">Account Take-Over and Identity Protection</a> <div class="header-nav__content-link-desc">Secure vulnerable identities, stop lateral movement and privilege escalation.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/adaptive-email-security" class="header-nav__content-link-text">Adaptive Email Security</a> <div class="header-nav__content-link-desc">Stop more threats with a fully integrated layer of behavioral AI.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/email-security-and-protection/secure-email-relay" class="header-nav__content-link-text">Secure Email Relay</a> <div class="header-nav__content-link-desc">Secure your application email and accelerate DMARC implementation</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_panel"> <div class="header-nav__content"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Solutions by Use Case</div> <div class="header-nav__content-group-desc">How Proofpoint protects your people and data.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/email-authentication-with-dmarc" class="header-nav__content-link-text">Authenticate Your Email</a> <div class="header-nav__content-link-desc">Protect your email deliverability with DMARC.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/combat-email-and-cloud-threats" class="header-nav__content-link-text">Combat Email and Cloud Threats</a> <div class="header-nav__content-link-desc">Protect your people from email and cloud threats with an intelligent and holistic approach.</div> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:solutions_by_use_case_panel">More use cases</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Solutions by Industry</div> <div class="header-nav__content-group-desc">People-centric solutions for your organization.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/federal" class="header-nav__content-link-text">Federal Government</a> <div class="header-nav__content-link-desc">Cybersecurity for federal government agencies.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/state-and-local-government" class="header-nav__content-link-text">State and Local Government</a> <div class="header-nav__content-link-desc">Protecting the public sector, and the public from cyber threats.</div> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:solutions_by_industry_panel">More industries</a> </div> <a href="/us/compare" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Comparing Proofpoint</div> <div class="header-nav__content-group-desc">Evaluating cybersecurity vendors? Check out our side-by-side comparisons.</div> </div> </a> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:compare_proofpoint_panel">View comparisons</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_by_use_case_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions By Use Case</h3> <div class="header-nav__content-heading">How Proofpoint protects your people and data.</div> <div class="header-nav__content-link"> <a href="/us/solutions/change-user-behavior" class="header-nav__content-link-text">Change User Behavior</a> <div class="header-nav__content-link-desc">Help your employees identify, resist and report attacks before the damage is done.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/combat-data-loss-and-insider-risk" class="header-nav__content-link-text">Combat Data Loss and Insider Risk</a> <div class="header-nav__content-link-desc">Prevent data loss via negligent, compromised and malicious insiders.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/enable-intelligent-compliance" class="header-nav__content-link-text">Modernize Compliance and Archiving</a> <div class="header-nav__content-link-desc">Manage risk and data retention needs with a modern compliance and archiving solution.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/protect-cloud-apps" class="header-nav__content-link-text">Protect Cloud Apps</a> <div class="header-nav__content-link-desc">Keep your people and their cloud apps secure by eliminating threats and data loss.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/prevent-loss-from-ransomware" class="header-nav__content-link-text">Prevent Loss from Ransomware</a> <div class="header-nav__content-link-desc">Learn about this growing threat and stop attacks by securing ransomware&#039;s top vector: email.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/secure-microsoft-365" class="header-nav__content-link-text">Secure Microsoft 365</a> <div class="header-nav__content-link-desc">Implement the best security and compliance solution for Microsoft 365.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_by_industry_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions By Industry</h3> <div class="header-nav__content-heading">People-centric solutions for your organization.</div> <div class="header-nav__content-link"> <a href="/us/solutions/higher-education-security" class="header-nav__content-link-text">Higher Education</a> <div class="header-nav__content-link-desc">A higher level of security for higher education.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/financial-services-and-insurance" class="header-nav__content-link-text">Financial Services</a> <div class="header-nav__content-link-desc">Eliminate threats, build trust and foster growth for your organization.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/healthcare-information-security" class="header-nav__content-link-text">Healthcare</a> <div class="header-nav__content-link-desc">Protect clinicians, patient data, and your intellectual property against advanced threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/mobile-message-security-solutions-for-service-providers" class="header-nav__content-link-text">Mobile Operators</a> <div class="header-nav__content-link-desc">Make your messaging environment a secure environment.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/email-security-solutions-for-service-providers" class="header-nav__content-link-text">Internet Service Providers</a> <div class="header-nav__content-link-desc">Cloudmark email protection.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/protection-compliance-small-business" class="header-nav__content-link-text">Small and Medium Businesses</a> <div class="header-nav__content-link-desc">Big-time security for small business.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="compare_proofpoint_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Proofpoint vs. the competition</h3> <div class="header-nav__content-heading">Side-by-side comparisons.</div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-abnormal-security" class="header-nav__content-link-text">Proofpoint vs. Abnormal Security</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-mimecast" class="header-nav__content-link-text">Proofpoint vs. Mimecast</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-cisco" class="header-nav__content-link-text">Proofpoint vs. Cisco</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-microsoft" class="header-nav__content-link-text">Proofpoint vs Microsoft</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-microsoft-purview" class="header-nav__content-link-text">Proofpoint vs. Microsoft Purview</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-legacy-dlp" class="header-nav__content-link-text">Proofpoint vs. Legacy DLP</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="partners_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Partners</h3> <div class="header-nav__content-heading">Deliver Proofpoint solutions to your customers.</div> <a href=https://partners.proofpoint.com class="global-elements__cta-button header-nav__content-button" > <span>Channel Partners</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/partners/trusted-data-solutions-partnership" class="header-nav__content-link-text">Archive Extraction Partners</a> <div class="header-nav__content-link-desc">Learn about Extraction Partners.</div> </div> <div class="header-nav__content-link"> <a href="/us/global-system-integrator-gsi-and-global-managed-service-provider-msp-partners" class="header-nav__content-link-text">GSI and MSP Partners</a> <div class="header-nav__content-link-desc">Learn about our global consulting.</div> </div> <div class="header-nav__content-link"> <a href="/us/partners/technology-alliance-partners" class="header-nav__content-link-text">Technology and Alliance Partners</a> <div class="header-nav__content-link-desc">Learn about our relationships.</div> </div> <div class="header-nav__content-link"> <a href="/us/partners/digital-risk-and-compliance-partners" class="header-nav__content-link-text">Social Media Protection Partners</a> <div class="header-nav__content-link-desc">Learn about the technology and....</div> </div> <div class="header-nav__content-link"> <a href="/us/channel-partners-small-and-medium-business" class="header-nav__content-link-text">Proofpoint Essentials Partner Programs</a> <div class="header-nav__content-link-desc">Small Business Solutions .</div> </div> <div class="header-nav__content-link"> <a href="https://partners.proofpoint.com/prm/English/s/applicant" class="header-nav__content-link-text">Become a Channel Partner</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="resources_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Resources</h3> <div class="header-nav__content-heading">Find reports, webinars, blogs, events, podcasts and more.</div> <a href=/us/resources class="global-elements__cta-button header-nav__content-button" > <span>Resource Library</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/blog" class="header-nav__content-link-text">Blog</a> <div class="header-nav__content-link-desc">Keep up with the latest news and happenings.</div> </div> <div class="header-nav__content-link"> <a href="/us/webinars" class="header-nav__content-link-text">Webinars</a> <div class="header-nav__content-link-desc">Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/us/cybersecurity-academy" class="header-nav__content-link-text">Cybersecurity Academy</a> <div class="header-nav__content-link-desc">Earn your certification to become a Proofpoint Certified Guardian.</div> </div> <div class="header-nav__content-link"> <a href="/us/podcasts" class="header-nav__content-link-text">Podcasts</a> <div class="header-nav__content-link-desc">Learn about the human side of cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/us/new-perimeters" class="header-nav__content-link-text">New Perimeters Magazine</a> <div class="header-nav__content-link-desc">Get the latest cybersecurity insights in your hands.</div> </div> <div class="header-nav__content-link"> <a href="/us/threat-reference" class="header-nav__content-link-text">Threat Glossary</a> <div class="header-nav__content-link-desc">Learn about the latest security threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/events" class="header-nav__content-link-text">Events</a> <div class="header-nav__content-link-desc">Connect with us at events to learn how to protect your people and data from ever-evolving threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/customer-stories" class="header-nav__content-link-text">Customer Stories</a> <div class="header-nav__content-link-desc">Read how our customers solve their most pressing cybersecurity challenges.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="company_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Company</h3> <div class="header-nav__content-heading">Proofpoint protects organizations' greatest assets and biggest risks: their people.</div> <a href=/us/company/about class="global-elements__cta-button header-nav__content-button" > <span>About Proofpoint</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/why-proofpoint" class="header-nav__content-link-text">Why Proofpoint</a> <div class="header-nav__content-link-desc">Learn about our unique people-centric approach to protection.</div> </div> <div class="header-nav__content-link"> <a href="/us/company/careers" class="header-nav__content-link-text">Careers</a> <div class="header-nav__content-link-desc">Stand out and make a difference at one of the world&#039;s leading cybersecurity companies.</div> </div> <div class="header-nav__content-link"> <a href="/us/newsroom" class="header-nav__content-link-text">News Center</a> <div class="header-nav__content-link-desc">Read the latest press releases, news stories and media highlights about Proofpoint.</div> </div> <div class="header-nav__content-link"> <a href="/us/legal/trust" class="header-nav__content-link-text">Privacy and Trust</a> <div class="header-nav__content-link-desc">Learn about how we handle data and make commitments to privacy and other regulations.</div> </div> <div class="header-nav__content-link"> <a href="/us/legal/esg" class="header-nav__content-link-text">Environmental, Social, and Governance</a> <div class="header-nav__content-link-desc">Learn how we apply our principles to positively impact our community.</div> </div> <div class="header-nav__content-link"> <a href="/us/support-services" class="header-nav__content-link-text">Support</a> <div class="header-nav__content-link-desc">Access the full range of Proofpoint support services.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="platform_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Platform</h3> <div class="header-nav__content-heading">Discover the Proofpoint human-centric platform.</div> <a href=/us/platform class="global-elements__cta-button header-nav__content-button" > <span>Learn More</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/platform/nexus" class="header-nav__content-link-text">Proofpoint Nexus</a> <div class="header-nav__content-link-desc">Detection technologies to protect people and defend data.</div> </div> <div class="header-nav__content-link"> <a href="/us/platform/zen" class="header-nav__content-link-text">Proofpoint Zen</a> <div class="header-nav__content-link-desc">Protect and engage users wherever they work.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_sch"> <div class="header-nav__content"> <div class="header-nav__content-title--search"> Search Proofpoint </div> <div class="header-nav__search"> <form class="header-nav__search-form"> <input type="text" class="header-nav__search-input" placeholder=""> <input type="submit" class="header-nav__search-button" val="Search"> </form> <div class="header-nav__search-sugg-title">Try searching for</div> <div class="header-nav__search-suggestions"> <a href="/us/search?content%5Bquery%5D=Email%20Security" class="header-nav__search-suggestion">Email Security</a> <a href="/us/search?content%5Bquery%5D=Phishing" class="header-nav__search-suggestion">Phishing</a> <a href="/us/search?content%5Bquery%5D=DLP" class="header-nav__search-suggestion">DLP</a> <a href="/us/search?content%5Bquery%5D=Email%20Fraud" class="header-nav__search-suggestion">Email Fraud</a> </div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_lgn"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Product Login </div> <ul class="header-nav__logins"> <li class="header-nav__content-login"> <a href="https://proofpoint.my.site.com/community/s/" target="_blank">Support Log-in</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcybersecurityacademy.adobelearningmanager.com" target="_blank">Proofpoint Cybersecurity Academy</a> </li> <li class="header-nav__content-login"> <a href="https://digitalrisk.proofpoint.com/" target="_blank">Digital Risk Portal</a> </li> <li class="header-nav__content-login"> <a href="https://emaildefense.proofpoint.com/login.php" target="_blank">Email Fraud Defense</a> </li> <li class="header-nav__content-login"> <a href="https://threatintel.proofpoint.com/" target="_blank">ET Intelligence</a> </li> <li class="header-nav__content-login"> <a href="https://us1.proofpointessentials.com/app/login.php" target="_blank">Proofpoint Essentials</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcommunities.force.com/community" target="_blank">Sendmail Support Log-in</a> </li> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="x_lng"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Language </div> <ul class="header-nav__language-links"> <li class="header-nav__language-link"> <a href="/us">English (Americas)</a> </li> <li class="header-nav__language-link"> <a href="/uk">English (Europe, Middle East, Africa)</a> </li> <li class="header-nav__language-link"> <a href="/au">English (Asia-Pacific)</a> </li> <li class="header-nav__language-link"> <a href="/es">Español</a> </li> <li class="header-nav__language-link"> <a href="/de">Deutsch</a> </li> <li class="header-nav__language-link"> <a href="/fr">Français</a> </li> <li class="header-nav__language-link"> <a href="/it">Italiano</a> </li> <li class="header-nav__language-link"> <a href="/br">Português</a> </li> <li class="header-nav__language-link"> <a href="/jp">日本語</a> </li> <li class="header-nav__language-link"> <a href="/kr">한국어</a> </li> </ul> </div> </div> </div> </div> <div class="layout-container"> <div> <div data-drupal-messages-fallback class="hidden"></div> </div> <main class="container" role="main"> <a id="main-content" tabindex="-1"></a> <section class="row"> <div class="layout-content"> <div> <div id="block-particle-content"> <article about="/us/threat-reference/phishing" class="node--type--glossary node--view-mode--full node node-glossary-full"> <script type="application/ld+json"> { "@context": "https://schema.org/", "@type": "DefinedTerm", "name": "What Is Phishing?", "description": "Phishing Definition How Phishing Works Why Is Phishing a Problem? Phishing Examples Phishing Techniques Types of Phishing Attacks Most Targeted Industries Most Impersonated Brands Phishing Prevention Anti-Phishing Training Suite Phishing Protection What to Do If You’ve Fallen Victim Phishing FAQs", "url": "https://www.proofpoint.com/us/threat-reference/phishing", "inDefinedTermSet": "https://www.proofpoint.com/us/threat-reference" } </script> <div class="glossary-content__breadcrumbs"> <div class="breadcrumbs"><div class="nav-crumbs"><div class="breadcrumb__item"><a href="/us/threat-reference" class="breadcrum__item-link">Glossary</a></div><div class="breadcrumb__item"> What Is Phishing? </div></div></div> </div> <div class="glossary-content__hero"> <div class="paragraph paragraph--type--hero-banner-v3 paragraph--view-mode--default hero-banner-v3" style="background-image: url(&quot;/sites/default/files/styles/webp_conversion/public/general-banners/pfpt-placeholder-banner-2022.png.webp?itok=E050rqaL&quot;)"> <div class="hero-banner-v3__wrapper hero-banner-v3__wrapper-default"> <h1 class="hero-banner-v3__title"> What Is Phishing? </h1> <a href=/us/resources/threat-reports/state-of-phish class="global-elements__cta-button--white" target="" > <span>2023 State of the Phish Report</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <a href=/us/resources/data-sheets/email-protection class="global-elements__cta-button" target="" > <span>Download the Proofpoint Email Protection Data Sheet</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> <div class="glossary-content"> <h3 class="glossary-content__headline"> Table of Contents </h3> <div class="node-full__body glossary-content__body"> <div style="display: flex; flex-wrap: wrap; margin: 25px 0;"> <ul style="margin: 0; width: 400px;"> <li><a href="#toc-1">Phishing Definition</a></li> <li><a href="#toc-2">How Phishing Works</a></li> <li><a href="#toc-3">Why Is Phishing a Problem?</a></li> <li><a href="#toc-4">Phishing Examples</a></li> <li><a href="#toc-5">Phishing Techniques</a></li> <li><a href="#toc-6">Types of Phishing Attacks</a></li> <li><a href="#toc-7">Most Targeted Industries</a></li> </ul> <ul style="margin: 0; width: 400px;"> <li><a href="#toc-8">Most Impersonated Brands</a></li> <li><a href="#toc-9">Phishing Prevention</a></li> <li><a href="#toc-10">Anti-Phishing Training Suite</a></li> <li><a href="#toc-11">Phishing Protection</a></li> <li><a href="#toc-12">What to Do If You’ve Fallen Victim</a></li> <li><a href="#toc-13">Phishing FAQs</a></li> </ul> </div> </div> </div> <div class="glossary__components"> <span data-smooth-scroll="true" class="anchor_link" id="toc-1"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Phishing Definition</h3> <div class="block-text-cols__body"> <p>Phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication. A phishing attack aims to trick the recipient into falling for the attacker’s desired action, such as revealing financial information, system login credentials, or other sensitive information.</p> <p>As a popular form of social engineering, phishing involves psychological manipulation and deception whereby threat actors masquerade as reputable entities to mislead users into performing specific actions. These actions often involve clicking links to fake websites, downloading and installing malicious files, and divulging private information, like bank account numbers or credit card information.</p> <p>Since the mid-1990s, the term “phishing” has been used to identify hackers who use fraudulent emails to “fish for” information from unsuspecting users. However, phishing attacks have become increasingly sophisticated and are now broken down into different types, including email phishing, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="cb24684f-298a-4be0-a321-0cf284caa322" href="/us/threat-reference/spear-phishing" title="Spear Phishing">spear phishing</a>, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="aef13313-f6fc-4819-9b08-5b2b0a9b3dc2" href="/us/threat-reference/smishing" title="Smishing">smishing</a>, vishing, and whaling. Each type is characterized by specific channels and methods of execution – email, text, voice, social media, etc. – all with a similar underlying intention.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <div id="statistics-carousel-439536" class="paragraph paragraph--type--statistics-carousel paragraph--view-mode--full statistics-carousel" style="background-image: url(/sites/default/files/styles/webp_conversion/public/solution-graphics/pfpt-stats-carousel-bkgd.png.webp?itok=JvXvP79A)"> <div class="statistics-carousel__wrapper"> <div class="statistics-carousel__slides"> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader">Phishing attacks reported in 2020</div> <div class="statistics-carousel__main statistics-carousel__main--small">241,324</div> <div class="statistics-carousel__follower">an estimated 110% increase from 2019’s reported 114,702 incidents</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">84%</div> <div class="statistics-carousel__follower">of U.S. survey respondents have fallen victim to phishing</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">96%</div> <div class="statistics-carousel__follower">of phishing attacks are delivered using email</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">$14.8 million</div> <div class="statistics-carousel__follower">is the average cost to an organization after becoming a victim of a phishing campaign, more than triple the amount in 2015, $3.8 million</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader">Employee productivity losses have increased from $1.8m in 2015 to</div> <div class="statistics-carousel__main statistics-carousel__main--small">$3.2 million</div> <div class="statistics-carousel__follower">in 2021</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader">Total cost of business email compromise</div> <div class="statistics-carousel__main statistics-carousel__main--small">$2.7 billion</div> <div class="statistics-carousel__follower">for 2022</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">76%</div> <div class="statistics-carousel__follower">increase in direct financial loss from successful phishing in 2022</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">65%</div> <div class="statistics-carousel__follower">of organizations reported at least one incident of data loss in 2022</div> </div> </div> <div class="statistics-carousel__slide"> <div class="statistics-carousel__content"> <div class="statistics-carousel__leader"></div> <div class="statistics-carousel__main statistics-carousel__main--small">30 million</div> <div class="statistics-carousel__follower">malicious messages sent in 2022 involved Microsoft branding</div> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item"> </div> </div> </div> <div class="paragraph paragraph--type--free-trial-panel paragraph--view-mode--full free-trial-panel free-trial-panel--black v3-dark-bg-only free-trial-panel--no-img"> <div class="free-trial-panel__wrapper"> <div class="free-trial-panel__content"> <div class="free-trial-panel__heading"> <h3>Cybersecurity Education and Training Begins Here</h3> </div> <a href=# class="global-elements__cta-button--white free-trial-panel__action-btn" > <span>Start a Free Trial</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> <div class="free-trial-panel-form"> <div class="paragraph paragraph--type--marketo-form paragraph--view-mode--default marketo-form UNCONVERTED"> <div class="marketo-form__content"> <h2>Here’s how your free trial works:</h2> <ul> <li>Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure</li> <li>Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days</li> <li>Experience our technology in action!</li> <li>Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks</li> </ul> <p>Fill out this form to request a meeting with our cybersecurity experts.</p> </div> <div class="marketo-form__form-container"> <div class="mk-form"> <div class="mk-form__form-container"> <script type="IN/Form2" data-data-form="mktoForm_3331" data-field-firstname="FirstName" data-field-lastname="LastName" data-field-email="Email" data-field-company="Company" data-field-title="Title" data-field-state="State" data-field-country="Country" ></script> <form id="mktoForm_3331" data-mkto-id="3331" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1" class="mk-form__form marketo-form-block__form" ></form> </div> </div> <div class="mk-form__success"> <p>Thank you for your submission.</p> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-2"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How Phishing Works</h3> <div class="block-text-cols__body"> <p>Whether a phishing campaign is hyper-targeted or sent to as many victims as possible, it starts with a malicious message. An attack is disguised as a message from a legitimate company. The more aspects of the message that mimic the real company, the more likely an attacker will be successful.</p> <p>While attackers’ goals vary, the general aim is to steal personal information or credentials. An attack is facilitated by emphasizing a sense of urgency in the message, which could threaten account suspension, money loss, or loss of the targeted user’s job. Users tricked into an attacker’s demands don’t take the time to stop and think if the demands seem reasonable or if the source is legitimate.</p> <p>Phishing continually evolves to bypass security filters and human detection, so organizations must continually train staff to recognize the latest phishing strategies. It only takes one person to fall for phishing to incite a severe data breach. That’s why it’s one of the most critical threats to mitigate and the most difficult as it requires human defenses.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-3"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Why Is Phishing a Problem?</h3> <div class="block-text-cols__body"> <p>Phishing is a significant problem because it is easy, cheap, and effective for cybercriminals to use. Phishing tactics, particularly email, require minimal cost and effort, making them widespread cyber-attacks. Victims of phishing scams may end up with malware infections (including <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="4f5f680d-55f7-4589-b8c5-8db870462bb1" href="/us/threat-reference/ransomware" title="Ransomware">ransomware</a>), identity theft, and data loss.</p> <p>The data that cybercriminals go after include <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="64bc830b-f23a-49c5-9b50-731686670af5" href="/us/threat-reference/personal-identifiable-information" title="Personal Identifiable Information">personal identifiable information (PII)</a>—like financial account data, credit card numbers, and tax and medical records—as well as sensitive business data, such as customer names and contact information, proprietary product secrets, and confidential communications.</p> <p>Cybercriminals also use phishing attacks to gain direct access to email, social media and other accounts or to obtain permissions to modify and compromise connected systems, like point-of-sale terminals and order processing systems. Many of the biggest data breaches start with an innocent phishing email where cybercriminals gain a small foothold to build upon.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-4"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Phishing Examples</h3> <div class="block-text-cols__body"> <p>Attackers prey on fear and a sense of urgency, often using strategies that tell users their account has been restricted or will be suspended if they don’t respond to the email.</p> <p>Because phishing attacks are typically sent to as many people as possible, the messaging is usually thin and generic. The following illustrates a common phishing email example.</p> <p>&nbsp;</p> <article class="align-center"> <img src="/sites/default/files/styles/webp_conversion/public/misc/example-of-phishing-email-with-typos-and-poor-grammar.jpg.webp?itok=035PYQeO" width="975" height="447" alt="Example of phishing email with typos &amp; poor grammar" loading="lazy" typeof="foaf:Image"> </article> <p>In the above message, the user’s name is not mentioned, and the sense of urgency injects fear to trick users into opening the attachment.</p> <p>The attachment could be a web page, a shell script (e.g., PowerShell), or a Microsoft Office document with a malicious macro. The macro and scripts can be used to download malware or trick users into divulging their account credentials.</p> <p>In some email phishing tactics, attackers register domains that look similar to their official counterparts or they occasionally use generic email providers such as Gmail. When users receive emails, the messages might use the official company logo, but the sender’s address would not include the official company domain.</p> <p>How an attacker carries out a phishing campaign depends on their goals. In B2B for example, attackers may use fake invoices to trick the accounts payable department into sending money. In this attack, the sender is not important, as many vendors use personal email accounts to do business.</p> <p>&nbsp;</p> <article class="align-center"> <img src="/sites/default/files/styles/webp_conversion/public/misc/fake-invoice-used-for-phishing-campaigns.jpg.webp?itok=Jj4NI9N-" width="701" height="595" alt="Fake invoice used for phishing campaigns" loading="lazy" typeof="foaf:Image"> </article> <p>&nbsp;</p> <p>The button in this example opens a web page with a fraudulent Google authentication form. The page attempts to scam targeted victims into entering their Google credentials so that attackers can steal accounts.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-5"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Phishing Techniques</h3> <div class="block-text-cols__body"> <p>Cybercriminals use three primary phishing techniques to steal information: malicious web links, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="cf25aeea-2fa4-4674-b127-48d375cc5aac" href="/us/threat-reference/malicious-email-attachments" title="Malicious Email Attachments">malicious attachments</a> and fraudulent data-entry forms.</p> <h4>Malicious Web Links</h4> <p>Phishing links take users to impostor websites or sites infected with malicious software, also known as <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5312929a-c85d-4291-a361-e34378e7fdff" href="/us/threat-reference/malware" title="Malware">malware</a>. Malicious links can be disguised as trusted links and are embedded in logos and other images in an email.</p> <p>Here is an example of an email received by users at Cornell University, displaying “Help Desk” as the sender’s name. However, the email did not originate from the university’s help desk but rather from the @connect.ust.hk domain. The link embedded in the email points to a page that looks like the Office 365 login page attempting to steal user credentials.</p> <p>&nbsp;</p> <article> <img src="/sites/default/files/styles/webp_conversion/public/misc/Malicious%20Web%20Links.jpg.webp?itok=-vkDU2Q2" width="979" height="656" alt="Malicious web links" loading="lazy" typeof="foaf:Image"> </article> <p>&nbsp;</p> <h4>Malicious Attachments</h4> <p>While these may look like legitimate file attachments, they are actually infected with malware that can compromise computers and their files.</p> <article> <img src="/sites/default/files/styles/webp_conversion/public/misc/malicious-attachments.jpg.webp?itok=HvqG--xz" width="950" height="488" alt="Malicious attachments" loading="lazy" typeof="foaf:Image"> </article> <p>Here’s an example of a phishing email shared by international shipper FedEx on its website. This email encouraged recipients to print out a copy of an attached postal receipt and take it to a FedEx location to get a parcel that could not be delivered. Unfortunately, the attachment contained a virus that infected the recipients’ computers. Variations of these shipping scams are particularly common during the holiday shopping season.</p> <h4>Fraudulent Data Entry Forms</h4> <p>These techniques use fake forms that prompt users to fill in sensitive information—such as user IDs, passwords, credit card data, and phone numbers. Once users submit that information, it can be used by cybercriminals for various fraudulent activities, including identity theft.</p> <p>Here’s an example of a fake landing page mimicking the gov.uk website. After clicking a link in a phishing email, users are routed to this fraudulent page that appears to be part of the HMRC tax collection agency. Users are told they are eligible for a refund but must complete the form.</p> <p>&nbsp;</p> <article class="align-center"> <img src="/sites/default/files/styles/webp_conversion/public/misc/fraudulent-data-entry-forms.jpg.webp?itok=IoWs_1Ld" width="710" height="633" alt="Fraudulent data entry forms" loading="lazy" typeof="foaf:Image"> </article> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <div class="paragraph paragraph--type--featured-asset-panel paragraph--view-mode--full featured-asset featured-asset--image featured-asset--gray"> <div class="featured-asset__bg"></div> <div class="featured-asset__wrapper"> <div class="featured-asset__image"> <img loading="lazy" src="/sites/default/files/styles/webp_conversion/public/ipad-imgs/pfpt-ponemon21-cost-of-phishing-study-ipad.png.webp?itok=n8R8U148" width="1492" height="1484" alt="The 2021 Cost of Phishing Study" typeof="foaf:Image" /> </div> <div class="featured-asset__content"> <h4 class="featured-asset__headline">The Ponemon 2021 Cost of Phishing Study</h4> <a href=/us/resources/analyst-reports/ponemon-cost-of-phishing-study class="global-elements__cta-button featured-asset__button" > <span>Read Now</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-6"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Types of Phishing Attacks</h3> <div class="block-text-cols__body"> <p>Phishing has evolved into more than simple credential and data theft. How an attacker lays out a campaign depends on the type of phishing. Types of phishing include:</p> <ul> <li><strong>Email phishing:</strong> the general term given to any malicious email message meant to trick users into divulging private information. Attackers generally aim to steal account credentials, personally identifiable information (PII) and corporate trade secrets. However, attackers targeting a specific business might have other motives.</li> <li><strong>Spear phishing:</strong> these email messages are sent to specific people within an organization, usually high-privilege account holders, to trick them into divulging sensitive data, sending the attacker money or downloading malware.</li> <li><strong>Link manipulation:</strong> messages contain a link to a malicious site that looks like the official business but takes recipients to an attacker-controlled server where they are persuaded to authenticate into a spoofed login page that sends credentials to an attacker.</li> <li><strong>Whaling (CEO fraud):</strong> these messages are typically sent to high-profile employees of a company to trick them into believing the CEO or other executive has requested to transfer money. <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8351fbfa-c1fb-4749-a8ca-4b0850151f1d" href="/us/threat-reference/ceo-fraud" title="CEO Fraud">CEO fraud</a> falls under the umbrella of phishing, but instead of an attacker spoofing a popular website, they spoof the CEO of the targeted corporation.</li> <li><strong>Content injection:</strong> an attacker who can inject malicious content into an official site will trick users into accessing the site to show them a malicious popup or redirect them to a phishing website.</li> <li><strong>Malware:</strong> users tricked into clicking a link or opening an attachment might download malware onto their devices. Ransomware, rootkits or keyloggers are common malware attachments that steal data and extort payments from targeted victims.</li> <li><strong>Smishing:</strong> using SMS messages, attackers trick users into accessing malicious sites from their smartphones. Attackers send a text message to a targeted victim with a malicious link that promises discounts, rewards or free prizes.</li> <li><strong>Vishing:</strong> attackers use voice-changing software to leave a message telling targeted victims that they must call a number where they can be scammed. Voice changers are also used when speaking with targeted victims to disguise an attacker’s accent or gender so that they can pretend to be a fraudulent person.</li> <li><strong>“Evil Twin” Wi-Fi:</strong> spoofing free Wi-Fi, attackers trick users into connecting to a malicious hotspot to perform man-in-the-middle exploits.</li> <li><strong>Pharming:</strong> <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8827b9d0-1f45-4eaf-88a8-b555f1fd4aa5" href="/us/threat-reference/pharming" title="Pharming">pharming</a> is a two-phase attack used to steal account credentials. The first phase installs malware on a targeted victim and redirects them to a browser and a spoofed website where they are tricked into divulging credentials. DNS poisoning is also used to redirect users to spoofed domains.</li> <li><strong>Angler phishing:</strong> using social media, attackers reply to posts pretending to be an official organization and trick users into divulging account credentials and personal information.</li> <li><strong>Watering hole:</strong> a compromised site provides endless opportunities, so an attacker identifies a site used by numerous targeted users, exploits a vulnerability on the site, and uses it to trick users into downloading malware. With malware installed on targeted user machines, an attacker can redirect users to spoofed websites or deliver a payload to the local network to steal data.</li> </ul> </div> </div> </div> </div> <div class="paragraph paragraph--type--text-onecol-centered paragraph--view-mode--full text-onecol-centered text-onecol-centered--normal"> <div class="text-onecol-centered__body"> <p class="responsive-video"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen frameborder="0" height="315" src="https://www.youtube.com/embed/ghLTz12zMQo" title="YouTube video player" width="560"></iframe></p> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <div class="paragraph paragraph--type--featured-asset-panel paragraph--view-mode--full featured-asset featured-asset--gray"> <div class="featured-asset__bg"></div> <div class="featured-asset__wrapper"> <div class="featured-asset__content"> <h4 class="featured-asset__headline">Free Phishing Awareness Kit</h4> <p class="featured-asset__summary">Engage and educate your users with our free Phishing Awareness Kit</p> </div> <a href=/us/learn-more/security-awareness-phishing-kit class="global-elements__cta-button featured-asset__button featured-asset__button--premium" > <span>Learn More</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-7"></span> <div class="utl-disable-bottom-margin paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Most Targeted Industries</h3> <div class="block-text-cols__body"> <p>The goal of most phishing is financial gain, so attackers mainly target specific industries that store credit card data or have the funds to pay large sums of money. The target could be the entire organization or its individual users. The <a href="https://www.statista.com/statistics/420442/organizations-most-affected-by-phishing/" rel=" noopener" target="_blank">top targeted</a> industries include:</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-2"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li>Online stores (ecommerce)</li> <li>Social media</li> <li>Banks and other financial institutes</li> <li>Payment systems (merchant card processors)</li> </ul> </div> </div> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li>IT companies</li> <li>Telecommunication companies</li> <li>Delivery companies</li> </ul> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-8"></span> <div class="utl-disable-bottom-margin paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Most Impersonated Brands</h3> <div class="block-text-cols__body"> <p>To trick as many people as possible, attackers use well-known brands. Well-known brands instill trust in recipients, increasing attacker success. Any common brand can be used in phishing, but a few standard ones are:</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-2"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li>Google</li> <li>Microsoft</li> <li>Amazon</li> <li>Chase</li> <li>Wells Fargo</li> </ul> </div> </div> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li>Bank of America</li> <li>Apple</li> <li>LinkedIn</li> <li>FedEx</li> <li>DHL</li> </ul> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-9"></span> <div class="utl-disable-bottom-margin paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Phishing Prevention</h3> <div class="block-text-cols__body"> <p>Preventing phishing attacks requires a combination of user training to recognize the warning signs and robust cybersecurity systems to stop payloads. Email filters are helpful with phishing, but human prevention is still necessary in cases of false negatives.</p> <p>A few ways your organization can prevent being a victim of phishing:</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-2"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li><strong>Train users to detect a phishing email:</strong> a sense of urgency and requests for personal data, including passwords, embedded links and attachments, are all warning signs. Users must be able to identify these warning signs to defend against phishing.</li> <li><strong>Avoid clicking links:</strong> instead of clicking a link and authenticating into a web page directly from an embedded link, type the official domain into a browser and authenticate directly from the manually typed site.</li> <li><strong>Use anti-phishing email security:</strong> artificial intelligence scans incoming messages, detects suspicious messages and quarantines them without allowing phishing messages to reach the recipient’s inbox.</li> <li><strong>Change passwords regularly:</strong> users should be forced to change their passwords every 30-45 days to reduce an attacker’s window of opportunity. Leaving passwords active for too long gives an attacker indefinite access to a compromised account.</li> </ul> </div> </div> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <ul> <li><strong>Keep software and firmware up-to-date:</strong> software and firmware developers release updates to remediate bugs and security issues. Always install these updates to ensure known vulnerabilities are no longer present in your infrastructure.</li> <li><strong>Install firewalls:</strong> firewalls control inbound and outbound traffic. Malware installed from phishing silently eavesdrops and sends private data to an attacker, but a firewall blocks malicious outgoing requests and logs them for further review.</li> <li><strong>Avoid clicking on popups:</strong> attackers change the location of the X button on a popup window to trick users into opening a malicious site or downloading malware. Popup blockers stop many popups, but false negatives are still possible.</li> <li><strong>Be cautious about giving out credit card data:</strong> unless you know the site is completely trustworthy, never give credit card data to a website you don’t recognize. Any site promising gifts or money back should be used with caution.</li> </ul> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-10"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Anti-Phishing Training Suite</h3> <div class="block-text-cols__body"> <p>Training employees to detect phishing is a critical component of phishing awareness and education to ensure that your organization does not become the next victim. It only takes one employee to fall for a phishing campaign to become the next reported data breach.</p> <p><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="4e8bf339-7c6d-4b86-bd23-7d3572115fdd" href="/us/blog/security-awareness-training/phishing-simulations-everything-you-need-know" title="Phishing Simulations: Everything You Need to Know">Phishing simulation</a> is the latest in employee training. The practical application to an active phishing attack gives employees experience in how an attack is carried out. Most simulations involve social engineering because attackers often combine the two for a more effective campaign. Simulations mirror real-world phishing scenarios, but employee activity is monitored and tracked.</p> <p>Reporting and analytics inform administrators where the organization can improve by discovering which phishing attacks tricked employees. Simulations including links tie into reporting by tracking who clicks a malicious link, which employees enter their credentials on a malicious site, and any email messages that trigger spam filters. Results can be used to configure spam filters and reinforce training and education across the organization.</p> <p>Proofpoint customers have used <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="59c6c940-2e3b-4318-8a80-5b3c1842fb55" href="/us/learn-more/anti-phishing-suite" title="Anti-Phishing Security Awareness and Training Program">Anti-Phishing Training Suite</a> and Continuous Training Methodology to reduce successful phishing attacks and malware infections by up to 90%. This unique, four-step Assess, Educate, Reinforce, and Measure approach can be the foundation of any organization’s phishing awareness training program.</p> </div> <div class="block-text-cols__links"> <div class="block-text-cols__links__item"> <a href=/us/products/security-awareness-training class="global-elements__cta-button block-text-cols__links__link" target="" > <span>Learn more about Proofpoint Security Awareness Training</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-11"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Phishing Protection</h3> <div class="block-text-cols__body"> <p>Phishing protection involves the security measures organizations can take to mitigate phishing attacks on their employees and systems. <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3076582a-a1b9-4d8f-bd03-a379d68bb792" href="/us/products/security-awareness-training" title="Proofpoint Security Awareness">Security awareness training and education</a> through real-world examples and exercises will help users identify phishing. It’s common for organizations to work with experts to send <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a0ca4a2e-8f66-4a37-9f4c-1d2009605b68" href="/us/products/security-awareness-training/phishing-simulations" title="Assess">simulated phishing emails</a> to employees and track who opened the email and clicked the link.</p> <p>Some email gateway solutions can catch and classify phishing emails based on the known bad reputation of the embedded URLs. However, these solutions are not always reliable in detecting well-crafted phishing messages from compromised legitimate websites.</p> <p>The most effective systems identify suspicious emails based on anomalytics. They look for unusual patterns in traffic to identify suspicious emails, rewrite the embedded URL, and maintain a constant watch on the URL for in-page exploits and downloads. These monitoring tools quarantine suspicious email messages so administrators can research ongoing phishing attacks. If a high number of phishing emails are detected, administrators can alert employees and reduce the chance of a successful targeted phishing campaign.</p> <p>With user-based awareness training the most critical line of defense, it’s critical for organizations to communicate to employees and educate them on the latest phishing and social engineering techniques. Keeping employees aware of the latest threats reduces risk and generates a culture of cybersecurity within the organization.</p> </div> <div class="block-text-cols__links"> <div class="block-text-cols__links__item"> <a href=/us/products/email-security-and-protection/email-protection class="global-elements__cta-button block-text-cols__links__link" target="" > <span>Learn more about Email Protection</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-12"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">What to Do If You’ve Fallen Victim</h3> <div class="block-text-cols__body"> <p>After you’ve sent your information to an attacker, it will likely be disclosed to other scammers. You’ll probably receive vishing and smishing messages, new phishing emails, and voice calls. Always stay on alert for suspicious messages asking for your information or financial details.</p> <p>The <a href="https://www.identitytheft.gov/" rel=" noopener" target="_blank">Federal Trade Commission has a website dedicated to identity theft</a> to help you mitigate damages and monitor your credit score. If you clicked on a link or opened a suspicious attachment, your computer could have malware installed. To detect and remove the malware, ensure your antivirus software is up-to-date and has the latest patches installed.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-13"></span> <div class="paragraph paragraph--type--vertical-feature-list paragraph--view-mode--full vert-feats UNCONVERTED"> <div class="vert-feats__wrapper"> <h3>Phishing FAQs</h3> <h2></h2> <div class="vert-feats__items"> <div class="vert-feats__items-wrapper"> <div class="paragraph paragraph--type--vertical-feature-list-item paragraph--view-mode--default vert-feats__item"> <h4>How to Report Phishing Emails</h4> <p>If you think you’re the target of a phishing campaign, the first step is to report it to the appropriate people. On a corporate network, it’s best to report it to IT staff to review the message and determine if it’s a targeted campaign. For individuals, you can <a href="https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams" rel=" noopener" target="_blank">report fraud and phishing</a> to the FTC.</p> </div> <div class="paragraph paragraph--type--vertical-feature-list-item paragraph--view-mode--default vert-feats__item"> <h4>What Is Trap Phishing?</h4> <p>Phishing has many forms, but one effective way to trick people into falling for fraud is to pretend to be a sender from a legitimate organization. A phishing trap lures users to a malicious website using familiar business references and the same logo, designs, and interface as a bank, ecommerce, or other recognizable popular brands. This is also known as a <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f23b954f-2933-48e2-bad6-f056c64648cd" href="/us/threat-reference/watering-hole" title="Watering Hole">Watering Hole attack</a>.</p> </div> <div class="paragraph paragraph--type--vertical-feature-list-item paragraph--view-mode--default vert-feats__item"> <h4>What Is Barrel Phishing?</h4> <p>To avoid filters, an attacker might send an initial benign-looking email to establish trust first, and then send a second email with a link or request for sensitive information. Barrel phishing takes more effort from the attacker, but the effect can be more damaging as targeted users feel they can trust the email sender.</p> </div> <div class="paragraph paragraph--type--vertical-feature-list-item paragraph--view-mode--default vert-feats__item"> <h4>How to Spot a Phishing Email</h4> <p>The main goal of phishing is to steal credentials (<a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d34e1309-0bd9-4b7a-936b-0e5cfab87899" href="/us/blog/email-and-cloud-threats/fighting-credential-phishing-isolating-and-protecting-your-risk-users" title="Fighting Credential Phishing by Isolating and Protecting Your At-Risk Users">credential phishing</a>), sensitive information, or trick individuals into sending money. Always be wary of messages that ask for sensitive information or provide a link where you immediately need to authenticate.</p> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <div class="paragraph paragraph--type--resources paragraph--view-mode--full resources-block"> <div class="resources-block__wrapper"> <div class="resources-block__inner-wrapper"> <div class="resources-block__heading-wrapper"> <h3 class="resources-block__heading"> Related Phishing Resources </h3> </div> <div class="resources-block__resources"> <div about="/us/resources/analyst-reports/ponemon-cost-of-phishing-study" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/us/resources/analyst-reports/ponemon-cost-of-phishing-study"> <div class="resource-teaser-v3__image" data-type="analyst-report"></div> <h3 class="resource-teaser-v3__type">Analyst Report</h3> <h4 class="resource-teaser-v3__title"> The Ponemon 2021 Cost of Phishing Study </h4> </a> </div> <div about="/us/blog/security-awareness-training/new-ponemon-study-finds-annual-cost-phishing-scams-has-more-tripled" class="node--type--blog-post node--view-mode--teaser-v3 blog-teaser-v3 resource-teaser-v3 UNCONVERTED"> <a class="blog-teaser-v3__url" href="/us/blog/security-awareness-training/new-ponemon-study-finds-annual-cost-phishing-scams-has-more-tripled"> <div class="blog-teaser-v3__image"></div> <h3 class="blog-teaser-v3__type">Blog</h3> <h4 class="blog-teaser-v3__title"> <span>New Ponemon Study Finds the Annual Cost of Phishing Scams Has More Than Tripled Since 2015</span> </h4> </a> </div> <div about="/us/blog/email-and-cloud-threats/what-do-after-responding-phishing-email" class="node--type--blog-post node--view-mode--teaser-v3 blog-teaser-v3 resource-teaser-v3 UNCONVERTED"> <a class="blog-teaser-v3__url" href="/us/blog/email-and-cloud-threats/what-do-after-responding-phishing-email"> <div class="blog-teaser-v3__image"></div> <h3 class="blog-teaser-v3__type">Blog</h3> <h4 class="blog-teaser-v3__title"> <span>What to Do If You Respond to a Phishing Email</span> </h4> </a> </div> </div> <div class="resources-block__link-wrapper"> <a class="resources-block__link" href="/us/resources"> See more resources </a> </div> </div> </div> </div> <div class="subscribe-block blog-subscribe" data-animate="true"> <div class="subscribe-block__inner blog-subscribe__inner"> <div class="subscribe-block__copy"> <h3 class="subscribe-block__heading"> Subscribe to the Proofpoint Blog </h3> </div> <div class="subscribe-block__form"> <div class="mk-form"> <div class="mk-form__form-container"> <script type="IN/Form2" data-data-form="mktoForm_19277" data-field-firstname="FirstName" data-field-lastname="LastName" data-field-email="Email" data-field-company="Company" data-field-title="Title" data-field-state="State" data-field-country="Country" ></script> <form id="mktoForm_19277" data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1" class="mk-form__form marketo-form-block__form" ></form> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <div class="paragraph paragraph--type--grid paragraph--view-mode--full solution-grid solution-grid__2 solution-grid__total-"> <div class="solution-grid__heading-wrapper"> <h3 class="solution-grid__heading">Phishing Products and Solutions</h3> <div class="solution-grid__description-wrapper"> <p class="solution-grid__description"></p> </div> </div> <div class="solution-grid__wrapper"> <div class="paragraph paragraph--type--grid-item paragraph--view-mode--default solution-grid-teaser solution-grid-teaser__main"> <div class="solution-grid-teaser__container"> <a class="solution-grid-teaser__background-link" href="/us/solutions/protect-against-phishing"> </a> <div class="solution-grid-teaser__background"></div> <div class="solution-grid-teaser__text"> <h5>Protect Against Phishing</h5> <p> Choose the No. 1 email security solution in preventing phishing attacks. </p> <a class="solution-grid-teaser__link" href="/us/solutions/protect-against-phishing"> </a> </div> </div> </div> <div class="paragraph paragraph--type--grid-item paragraph--view-mode--default solution-grid-teaser solution-grid-teaser__main"> <div class="solution-grid-teaser__container"> <a class="solution-grid-teaser__background-link" href="/us/products/security-awareness-training/phishing-simulations"> </a> <div class="solution-grid-teaser__background"></div> <div class="solution-grid-teaser__text"> <h5>Assess</h5> <p> Identify your most vulnerable users and top clickers. </p> <a class="solution-grid-teaser__link" href="/us/products/security-awareness-training/phishing-simulations"> </a> </div> </div> </div> <div class="paragraph paragraph--type--grid-item paragraph--view-mode--default solution-grid-teaser solution-grid-teaser__main"> <div class="solution-grid-teaser__container"> <a class="solution-grid-teaser__background-link" href="/us/solutions/combat-data-loss-and-insider-risk"> </a> <div class="solution-grid-teaser__background"></div> <div class="solution-grid-teaser__text"> <h5>Combat Data Loss and Insider Risk</h5> <p> The human element behind data loss. </p> <a class="solution-grid-teaser__link" href="/us/solutions/combat-data-loss-and-insider-risk"> </a> </div> </div> </div> <div class="paragraph paragraph--type--grid-item paragraph--view-mode--default solution-grid-teaser solution-grid-teaser__main"> <div class="solution-grid-teaser__container"> <a class="solution-grid-teaser__background-link" href="/us/solutions/change-user-behavior"> </a> <div class="solution-grid-teaser__background"></div> <div class="solution-grid-teaser__text"> <h5>Change User Behavior</h5> <p> You protect your people–and your people can protect you. </p> <a class="solution-grid-teaser__link" href="/us/solutions/change-user-behavior"> </a> </div> </div> </div> <div class="paragraph paragraph--type--grid-item paragraph--view-mode--default solution-grid-teaser solution-grid-teaser__main"> <div class="solution-grid-teaser__container"> <a class="solution-grid-teaser__background-link" href="/us/solutions/combat-email-and-cloud-threats"> </a> <div class="solution-grid-teaser__background"></div> <div class="solution-grid-teaser__text"> <h5>Combat Email and Cloud Threats</h5> <p> Email and cloud security everywhere your people work. </p> <a class="solution-grid-teaser__link" href="/us/solutions/combat-email-and-cloud-threats"> </a> </div> </div> </div> <article class="solution-grid-teaser solution-grid-teaser__before"><div class="solution-grid-teaser__container"><div class="solution-grid-teaser__background"></div></div></article> <article class="solution-grid-teaser solution-grid-teaser__after"><div class="solution-grid-teaser__container"><div class="solution-grid-teaser__background"></div></div></article> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__xl"> </div> </div> </div> <div class="paragraph paragraph--type--cta-banner paragraph--view-mode--full cta-banner cta-banner--bg" data-background-image="/sites/default/files/styles/webp_conversion/public/cta-banner/cta-bkgd.jpg.webp?itok=lGrCI_5c"> <div class="cta-banner__wrapper"> <h2 class="cta-banner__heading"> Ready to Give Proofpoint a Try? </h2> <p class="cta-banner__body">Start with a free Proofpoint trial.</p> <div class="cta-banner__buttons"> <a href=/us/free-trial-request class="global-elements__cta-button--white" target="" > <span>Get Protected</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> </div> <div class="glossary__content-pager"> <div class="content-pager"> <div class="content-pager__items-wrapper"> <div class="content-pager__items"> <div class="content-pager__item content-pager__item--prev"> <a href="/us/threat-reference/pharming" hreflang="en">Previous Glossary</a> </div> <div class="content-pager__item content-pager__item--next"> <a href="/us/threat-reference/phishing-simulation" hreflang="en">Next Glossary</a> </div> </div> </div> </div> </div> </article> </div> </div> </div> </section> </main> </div> <div class="footer-v3" data-animate="true"> <div class="footer-v3__inner"> <nav class="footer-v3__nav"> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Products</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/us/products/protect-people">Protect People</a></li> <li><a href="/us/products/defend-data">Defend Data</a></li> <li><a href="/us/products/mitigate-human-risk">Mitigate Human Risk</a></li> <li><a href="/us/products/premium-services">Premium Services</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Get Support</div> <ul class="footer-v3__nav-collapsible"> <li><a href="https://proofpoint.my.site.com/community/s/" target="_blank">Product Support Login</a></li> <li><a href="/us/support-services">Support Services</a></li> <li><a href="https://ipcheck.proofpoint.com" target="_blank">IP Address Blocked?</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Connect with Us</div> <ul class="footer-v3__nav-collapsible"> <li><a href="tel:+1-408-517-4710" class="icon-phone-ppoint">+1-408-517-4710</a></li> <li><a href="/us/events">Attend an Event</a></li> <li><a href="/us/contact">Contact Us</a></li> <li><a href="/us/free-demo-request">Free Demo Request</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">More</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/us/company/about">About Proofpoint</a></li> <li><a href="/us/why-proofpoint">Why Proofpoint</a></li> <li><a href="/us/company/careers">Careers</a></li> <li><a href="/us/leadership-team">Leadership Team</a></li> <li><a href="/us/newsroom">News Center</a></li> <li><a href="/us/legal/trust">Privacy and Trust</a></li> </ul> </div> </nav> <div class="footer-v3__bottom-wrap"> <section class="footer-v3__bottom"> <div class="footer-v3__logo"> <a href="/us" class="footer-v3__logo-link"> <div class="footer-v3__logo-image"></div> </a> <div class="footer-v3__bottom-copyright-info">&copy; 2024. All rights reserved. </div> </div> <div class="footer-v3__bottom-copyright"> <a class="footer-v3__bottom-copyright-info" href="/us/legal/license">Terms and conditions</a> <a class="footer-v3__bottom-copyright-info" href="/us/legal/privacy-policy">Privacy Policy</a> <a class="footer-v3__bottom-copyright-info" href="/us/sitemap">Sitemap</a> </div> <ul class="footer-v3__bottom-social-menu"> <li> <a href="http://www.facebook.com/proofpoint" class="icon-facebook" target="_blank"></a> </li> <li> <a href="http://www.twitter.com/proofpoint" class="icon-twitter" target="_blank"></a> </li> <li> <a href="https://www.linkedin.com/company/proofpoint" class="icon-linkedin" target="_blank"></a> </li> <li> <a href="https://www.youtube.com/channel/UCIvtJgsrUzFo90NKeiVozhQ" class="icon-youtube-play" target="_blank"></a> </li> <li> <a href="https://www.instagram.com/proofpoint" class="icon-instagram" target="_blank"></a> </li> </ul> </section> </div> </div> </div> </div> <script type="text/javascript">document.write(unescape("%3Cscript src='//munchkin.marketo.net/munchkin.js' type='text/javascript'%3E%3C/script%3E")); </script> <script>Munchkin.init('309-RHV-619');</script><div class="element-invisible" style="clear:both;"><!-- Google Code for Remarketing Tag --> <!-------------------------------------------------- Remarketing tags may not be associated with personally identifiable information or placed on pages related to sensitive categories. See more information and instructions on how to setup the tag on: http://google.com/ads/remarketingsetup ---------------------------------------------------> <script type="text/javascript"> /* <![CDATA[ */ var google_conversion_id = 950296937; var google_custom_params = window.google_tag_params; var google_remarketing_only = true; /* ]]> */ </script> <script type="text/javascript" src="//www.googleadservices.com/pagead/conversion.js"> </script> <noscript> <div style="display:inline;"> <img height="1" width="1" style="border-style:none;" alt="" src="//googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/?value=0&amp;guid=ON&amp;script=0"/> </div> </noscript></div> </div> <div id="flyout-container"></div> <script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","pathPrefix":"us\/","currentPath":"node\/103571","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJxlktFuwyAMRX-oFE172d9MhrgEldjINtX693OmqiXdG5zrxL6-bLhUiJfaDOWcoVtlOnUQKAJ91bjI6NDOL3Ie1EdqVVdc9kKruWFMjcvxFnQkzVITTlwQlixjS_qCmcmQLHQoKDOW6ctsEBIQzRUXBBuCSwBVtIkzu5lw-5yQIAaTCs3bELaXUhonp9hw8yH0IKiC3APxMg1SmEvDcOFD8eq-vCXB7cgqlRkIP0wchhNUHpIxVMPtP9bg68zXl6Dcxh5TKFKnCLRDngZVA6vqZw0ZhIfOrp_ZvP_b8MdC9gYb6RtlQhdC9jWhzNnfcD_4Eh-BBH8cHkf_rh9fFBtQGR5tWNAwG8uubCBXNI7boLxeK-1MESSv0a013e-2eiTRIBGk9LfIJ2NuCeSkd_WNxQSKv3mDEoY","theme":"particle","theme_token":null},"ajaxTrustedUrl":[],"vwo":{"id":767242,"timeout_library":2500,"timeout_setting":2000,"usejquery":"false","testnull":null},"pp_i18n":{"language":"us"},"instantsearch":{"indexName":"content","path":"us\/search"},"user":{"uid":0,"permissionsHash":"26dd96d39e445e838e5f0382a0a4240ea0629de7ad59c3778594246405e2ccf5"}}</script> <script src="/sites/default/files/js/js_8CW70isSIT32kS0YKfqio8Q45sLJZNysYeCQqB4dtLQ.js?scope=footer&amp;delta=0&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg"></script> <script src="https://geoip-js.com/js/apis/geoip2/v2.1/geoip2.js"></script> <script src="/sites/default/files/js/js_DA7GHFg6Iz1O22c58zPl-nNTEwx5y7RuyKjesK1mXJI.js?scope=footer&amp;delta=2&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg"></script> <script src="//munchkin.marketo.net/munchkin.js"></script> <script src="/sites/default/files/js/js_Q_hAq3KoriT4uxdUnA3XDouviRgbwswFyj5MCBnzVHU.js?scope=footer&amp;delta=4&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg"></script> <script src="/themes/custom/proofpoint/apps/drupal/../../dist/app-drupal/assets/js/app.js?q=IQfYStL2d9M&amp;v=1"></script> <script src="/sites/default/files/js/js_2LYNA9Zu5KE51oXU7U2qX9zbS5cCqO7wzxelxAEWhjk.js?scope=footer&amp;delta=6&amp;language=en&amp;theme=particle&amp;include=eJxlUu1uwzAIfKHSaNqfvU2FHZpYdcACXK1vP7IPxe3-2ceZuwO3dilvHzxV5KXjQjCTU3bRU2uXDfVGLtPWOa-3wjtmhJrXqXuptt99pY0mF6kJ9WQPc9qmhEanhuolV5qyKA1UTIwpFV4OxiKyVIKrsNuBXkWcFO7vA7GKGeoDWOYnBXZihxYJ9IBXwvlJJ2kgWfuWvmVwUWyrTbP2hvV8IOfOradabKV5UHGEhMyjRBhKWIFqRHsybw3z4NCkxsiEYdEytExVFrCeLGtJI_0PgmDk21FQMumayV4Le6f_NCixjgO-034Iv1dC70oQEf0oO3065HC68biGH-4MaEavbGGKB5AjPAXntNFccLqWGtdzxrZnHlopEbiWcNCQqQ6BHT28lGyQUaXbWFxJ5XfyT79h329AjPcvHhwShg"></script> <script src="//app-abj.marketo.com/js/forms2/js/forms2.min.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10