« Back to Glossary Index

Phishing is a cybercrime in which attackers deceive individuals into providing sensitive information, such as usernames, passwords, and credit card details, by masquerading as a trustworthy entity in electronic communications. This information is then used to commit fraud or other malicious activities.

Key Points:

  1. Purpose: The primary objective of phishing is to steal personal information for financial gain, identity theft, or to gain unauthorized access to systems and data.
  2. Methods of Phishing:
    • Email Phishing: Attackers send fraudulent emails that appear to be from legitimate sources, such as banks, online services, or employers, to trick recipients into revealing personal information.
    • Spear Phishing: A targeted form of phishing where attackers personalize the email content based on information about the victim to increase the likelihood of success.
    • Smishing (SMS Phishing): Sending fraudulent text messages to trick recipients into clicking on malicious links or providing personal information.
    • Vishing (Voice Phishing): Using phone calls to deceive individuals into providing personal information or transferring money.
    • Clone Phishing: Creating a nearly identical copy of a legitimate email with a malicious link or attachment and sending it to the original recipients.
    • Whaling: Targeting high-profile individuals within an organization, such as executives or managers, with personalized phishing attacks.
  3. Indicators of Phishing:
    • Unsolicited Communication: Unexpected emails, texts, or calls asking for personal information or urging immediate action.
    • Suspicious Links or Attachments: Links or attachments in emails that lead to unfamiliar websites or request downloads.
    • Generic Greetings: Use of generic salutations like “Dear Customer” instead of personalized greetings.
    • Spelling and Grammar Errors: Emails or messages containing obvious spelling and grammar mistakes.
    • Urgency and Fear Tactics: Messages that create a sense of urgency or fear, such as threats of account suspension or legal action.
    • Inconsistent Email Addresses: The sender’s email address does not match the legitimate domain of the organization they claim to represent.
  4. Detection and Prevention:
    • Email Filtering: Implementing spam filters and email security solutions to detect and block phishing emails.
    • Two-Factor Authentication (2FA): Using two-factor authentication for an added layer of security, requiring users to verify their identity through a secondary method.
    • Security Awareness Training: Educating employees and individuals about the risks of phishing and how to recognize and respond to phishing attempts.
    • Verification Processes: Encouraging individuals to verify the authenticity of requests for personal information through direct communication with the supposed sender.
    • Regular Software Updates: Keeping software and systems updated to protect against vulnerabilities that could be exploited by phishing attacks.
  5. Regulatory Framework:
    • General Data Protection Regulation (GDPR): EU regulation that mandates strict data protection and privacy measures, including safeguards against phishing.
    • Federal Trade Commission (FTC): U.S. agency that provides guidelines and enforcement against deceptive practices, including phishing.
    • National Institute of Standards and Technology (NIST): Provides guidelines and best practices for information security, including measures to prevent phishing.
  6. Technological Solutions:
    • Anti-Phishing Software: Tools that detect and block phishing attempts by analyzing email content and links.
    • SSL Certificates: Ensuring websites use secure HTTPS connections to protect data transmission and authenticate the website’s legitimacy.
    • Browser Extensions: Extensions that warn users about potentially malicious websites and phishing attempts.
  7. Examples of Phishing:
    • An email claiming to be from a bank asks the recipient to click a link and update their account information to avoid suspension.
    • A text message from a delivery service instructs the recipient to follow a link to reschedule a delivery, leading to a fake website that collects personal details.
    • A phone call from someone pretending to be from the IRS threatens legal action unless the victim provides sensitive information or makes an immediate payment.
  8. Impact of Phishing:
    • Financial Losses: Direct financial losses from stolen information and unauthorized transactions.
    • Identity Theft: Long-term consequences of stolen personal information, leading to further fraud and misuse.
    • Data Breaches: Compromised credentials can lead to larger data breaches within organizations.
    • Reputational Damage: Loss of trust in affected organizations and individuals.
« Back to Glossary Index
Vaidyanathan Chandrashekhar

Vaidyanathan Chandrashekhar

Advisors

“Chandy,” is a technology and risk expert with executive experience at Boston Consulting Group, Citi, and PwC. With over two decades in financial services, digital transformation, and enterprise risk, he advises iComply on scalable compliance infrastructure for global markets.
Thomas Linder

Thomas Linder

Advisors

Thomas is a global tax and compliance expert with deep specialization in digital assets, blockchain, and tokenization. As a partner at MME Legal | Tax | Compliance, he advises iComply on regulatory strategy, cross-border compliance, and digital finance innovation.
Thomas Hardjono

Thomas Hardjono

Advisors

Thomas is a renowned identity and cybersecurity expert, serving as CTO of Connection Science at MIT. With deep expertise in decentralized identity, zero trust, and secure data exchange, he advises iComply on cutting-edge technology and privacy-first compliance architecture.
Rodney Dobson

Rodney Dobson

Advisors

Rodney is the former President of ADP Canada and international executive with over two decades of leadership in global HR and enterprise technology. He advises iComply with deep expertise in international service delivery, M&A, and scaling high-growth operations across regulated markets.
Praveen Mandal

Praveen Mandal

Advisors

Praveen is a serial entrepreneur and technology innovator, known for leadership roles at Lucent Bell Labs, ChargePoint, and the Stanford Linear Accelerator. He advises iComply on advanced computing, scalable infrastructure, and the intersection of AI, energy, and compliance tech.
Paul Childerhose

Paul Childerhose

Advisors

Paul is a Canadian RegTech leader and founder of Maple Peak Group, with extensive experience in financial services compliance, AML, and digital transformation. He advises iComply on regulatory alignment, operational strategy, and scaling compliance programs in complex markets.
John Engle

John Engle

Advisors

John is a seasoned business executive with senior leadership experience at CIBC, UBS, and Accenture. With deep expertise in investment banking, private equity, and digital transformation, he advises iComply on strategic growth, partnerships, and global market expansion.
Jeff Bandman

Jeff Bandman

Advisors

Jeff is a former CFTC official and globally recognized expert in financial regulation, fintech, and digital assets. As founder of Bandman Advisors, he brings deep insight into regulatory policy, market infrastructure, and innovation to guide iComply’s global compliance strategy.
Greg Pearlman

Greg Pearlman

Advisors

Greg is a seasoned investment banker with over 35 years of experience, including leadership roles at BMO Capital Markets, Morgan Stanley, and Citigroup. Greg brings deep expertise in financial strategy and growth to support iComply's expansion in the RegTech sector.
Deven Sharma

Deven Sharma

Advisors

Deven is the former President of S&P and a globally respected authority in risk, data, and capital markets. With decades of leadership across financial services and tech, he advises iComply on strategic growth, governance, and the future of trusted data in AML compliance.