SECURITY EDUCATION
7 Phishing Tricks Attackers Use
A phishing-pattern lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.
Attackers reuse the same patterns because they work at scale.
Scenario
An attacker sends a lure that looks routine enough to bypass your first instinct to slow down.
Attack Chain
Urgency or trust signal
↓
User clicks before validating
↓
Credential capture or malicious file access
↓
Account compromise or device infection
Observable Evidence
Look for:
- sender-display-name mismatch
- lookalike or unrelated destination domains
- urgency, fear, secrecy, or payment pressure
- files with macros, archives, or double extensions
- login pages that do not use the provider's real domain
Operator Response
- Pause before interacting with the message.
- Check the sender, hover the link, and verify through another channel.
- Preserve the message if it looks suspicious.
- If someone already interacted, move to a governed phishing investigation immediately.
WitnessOps Controls
The response should tie into:
The seven patterns
- Urgency and fear — warnings that demand immediate action
- Fake login pages — pages that copy a trusted brand but use the wrong domain
- Attachment-based malware — files that execute scripts or macros
- Impersonation of trusted people — executives, vendors, or IT support
- Link misdirection — displayed text and actual destination do not match
- Fake deliveries or invoices — normal business process used as bait
- Security alerts — defensive language used to trigger a fast click
The rule stays the same: pause, validate, then act.