badge icon

This article was automatically translated from the original Turkish version.

Article

Phishing, is defined in information security literature as a hybrid attack method that combines both technical and social engineering elements. Its primary objective is to deceive users by impersonating trusted institutions or individuals, thereby obtaining sensitive information or directing them to install malicious software. In this regard, phishing is not merely a technological threat but also a psychological attack that manipulates human behavior. The impact of phishing, one of the most commonly used attack types in the cybersecurity ecosystem, spans a broad spectrum—from individual users’ identity credentials to corporate financial losses and even the targeting of critical national infrastructure.


The fundamental mechanism of a phishing attack is typically described through a three-stage process: the “lure,” a compelling or threatening message sent to the user; the “hook,” a fraudulent website or interface to which the victim is directed; and the “catch,” the stage in which the attacker uses or transfers the obtained data. This structure illustrates both the technical infrastructure and the psychological manipulation inherent in the attack.


Academic studies have developed various formulations to model the nature of phishing attacks. A simplified representation explains the success of an attack as the product of the user’s probability of exposure and the probability of being deceived. In this context, the success rate of the attack is formulated as P(success) = P(exposure) × P(compromise). Here, P(exposure) represents the likelihood that the user encounters the attack, while P(compromise) denotes the attacker’s probability of convincing the victim to disclose critical information. This approach underscores that phishing is shaped not only by technical infrastructure but also by human factors.


The importance of phishing in the cybersecurity ecosystem stems from its prevalence and continuously evolving nature. Reports from the Anti-Phishing Working Group (APWG) reveal that millions of phishing attempts are reported annually, with these attempts showing increasing diversity and sophistication. Advancing technology provides attackers with new opportunities to generate fake domain names, mimic security certificates, and bypass email filters. At the same time, the human factor remains the weakest link in the cybersecurity chain, further increasing the likelihood of successful phishing attacks.

History and Evolution

The historical development of phishing attacks can be read as parallel to the evolution of cybercrime. The term was first used in 1996 and initially gained attention through simple deception methods targeting America Online (AOL) users. During this period, attackers impersonated AOL customer service representatives to direct users to fake login screens and obtain account credentials or credit card numbers. The primary goal was to gain free access or use compromised accounts for illegal activities. Although these early examples of phishing did not yet encompass the full technological and psychological layers seen today, they established the foundational principles of social engineering-based manipulation and identity spoofing.


By the 2000s, the target of phishing shifted from individual email accounts to customers of financial institutions. With the widespread adoption of online banking services, attacks increasingly focused on stealing online banking credentials and financial identity information. The evolution of phishing during this period can be explained by a probabilistic approach indicating that attack success grew alongside increasing technical sophistication and exploitation of user behavior. This process can be summarized by the formula P(success) = f(T, H, U), where T represents technical complexity, H denotes the social engineering dimension of the attack, and U reflects the user’s level of security awareness. Historically, the increase in T and the diversification of H, coupled with stagnant or low levels of U, have consistently raised the success rate of phishing attacks.


The 2007 phishing attack against customers of Sweden’s Nordea Bank, which resulted in millions of dollars in losses, marked a turning point in history. In this incident, malicious keylogger software was distributed to users’ devices via fake emails, enabling attackers to empty bank accounts using the stolen information. Similarly, the 2011 spear phishing attack on RSA demonstrated that phishing was no longer limited to financial institutions but could also target critical security firms. In this attack, a vulnerability in Adobe Flash software was exploited to bypass RSA’s two-factor authentication systems. The 2014 attack on Sony Pictures provided a clear example of how phishing can serve as the initial vector for large-scale data breaches.


In today’s evolution of phishing attacks, a clear trend is the enhancement of deception techniques through automation and artificial intelligence-powered tools. Software packages known as “phishing kits” provide attackers with ready-made infrastructure, enabling individuals with limited technical knowledge to carry out sophisticated attacks. Moreover, recent advances in deep learning and AI-based content generation have led to the integration of deepfake-based audio and video manipulation into phishing strategies, indicating an advanced stage of evolution. Now, phishing is no longer limited to fake emails; it also includes voice and video content that is difficult to distinguish from reality.

Types of Phishing Attacks

Phishing attack types constitute a multifaceted threat class determined by varying combinations of technical infrastructure and social engineering strategies, depending on both the target and the attacker’s resources. The most fundamental distinction is between broad, generalized phishing campaigns targeting mass audiences and targeted attacks aimed at specific individuals or groups. General campaigns are typically conducted through fake email sequences and automated credential harvesting kits, while targeted attacks (such as spear phishing and whaling) rely on high-reliability messages constructed using previously gathered information about the victim’s social and organizational context. This distinction can be expressed through a simple formula quantifying attack success: P(success) = P(reach) × P(convince), where P(reach) represents the attacker’s probability of reaching the victim and P(convince) denotes the probability that the contacted victim will be persuaded to disclose sensitive information or execute malicious software; in targeted attacks, P(convince) is significantly elevated through social engineering, whereas in broad campaigns, P(reach) is kept high due to scale, and these two components determine the attack’s form.


Email-based phishing remains the most historically and currently prevalent form; attackers use fake or spoofed domain names, display name spoofing, and URL obfuscation to direct recipients to a fraudulent entry point. Techniques employed in this method include link embedding, distinguishing displayed anchor text from the actual URL, and manipulating email subject lines; additionally, phishing kits enable attackers to rapidly produce numerous professional-looking fake pages, allowing actors without technical expertise to conduct effective campaigns. Spear phishing is a more sophisticated form in which message content is personalized using personal information such as the target’s name, job title, work relationships, and social media data; this personalization significantly increases the P(convince) value, facilitating actions with managerial or financial consequences—such as approving fund transfers.


The term whaling refers to attacks targeting individuals in high-level corporate roles; in such attacks, message language, timing, and context are carefully designed because the targets’ authority levels amplify the expected impact of the attack in layered ways. In contrast, smishing (SMS-based) and vishing (voice call-based) attacks exploit the context-specific psychological effects of mobile communication channels; the limited format of SMS messages or the urgency conveyed by direct phone calls can reduce the victim’s inclination to question the message, thereby increasing the likelihood of success.


Social media-based variants such as angler phishing and clone/pharming present a different threat dynamic: in angler attacks, trust is targeted through fake customer service accounts, cloned posts, or direct messages; in pharming and DNS-based attacks, technical manipulation—such as modifying the hosts file or DNS poisoning—redirects victims directly to a site that appears legitimate but is under the attacker’s control, enabling credential theft without any email warning. Additionally, malware-based phishing involves encouraging the victim to download malicious attachments or spyware to gain control of the device; tools such as keyloggers or web trojans then facilitate session hijacking and provide infrastructure for deeper infiltration into internal networks.


The distinction between attack types also carries significance from a defense perspective: email filters and email authentication protocols (SPF/DKIM/DMARC) aim to reduce the impact of broad campaigns, whereas internal organizational procedures, workflow validations, and executive-level awareness training provide more effective protection against targeted attacks. However, the evolution of attack types—driven by the accessibility of phishing kits, the diversification of URL obfuscation techniques, and the exploitation of mobile and social platforms—necessitates continuous updates to defense mechanisms and the simultaneous implementation of both technical and human-centric countermeasures.

Technical Mechanisms

The technical mechanisms of phishing attacks form a multi-layered and complementary set of methods ranging from seemingly simple identity spoofing to deep system manipulation. These mechanisms serve two primary purposes: directing the victim toward a fraudulent interaction and bypassing or neutralizing security controls during that interaction. In this context, the creation of fake web pages, domain spoofing (including typosquatting), URL obfuscation and the use of link-shortening services, and the misuse of SSL/HTTPS indicators constitute fundamental technical maneuvers. When examined in detail, it becomes evident that attackers do not merely replicate appearances but also manipulate browser behavior, email header protocols, and network routing mechanisms to instill trust in victims; for example, techniques such as using JavaScript to display a legitimate URL in the address bar or separating the visible anchor text from the target URL are commonly employed.


Domain spoofing techniques play a central role in the success of phishing; typosquatting exploits minor typographical errors to register domains that capitalize on user carelessness, while DNS-based attacks (pharming) directly target the name resolution process to redirect users to an address under the attacker’s control that appears legitimate. These attacks, achievable through hosts file manipulation or DNS poisoning, can capture login credentials even when no obvious anomalies are present in the email or link sent to the victim; thus, technical manipulation provides a vector that disables user awareness. Parallel to this, phishing kits offer standardized and automatable infrastructure, bundling functions such as fake page creation, data collection forms, backend redirections, and sometimes even log storage into a single package; the accessibility of these kits lowers the technical barrier to entry and enables large-scale attacks.


URL shortening and obfuscation techniques facilitate user clicks by concealing the true destination of a link; shortened URLs mask the target address, while more sophisticated methods employ multi-stage redirection chains to evade detection and analysis mechanisms. Misinterpretation of HTTPS indicators is also a significant exploitation area: users frequently perceive the “lock” icon as a sign of security, and attackers can abuse this by using fake or improperly configured certificates; furthermore, weaknesses in the verification processes of legitimate certificate authorities are exploited to make attackers appear trustworthy. From a technical defense perspective, this highlights that merely implementing TLS is insufficient; the importance of certificate chain validation, certificate transparency, and mechanisms for detecting invalid certificates must also be emphasized.


Malware types used in phishing are an inseparable component of its technical mechanisms: keyloggers, screen recorders, or web trojans delivered via attachments or drive-by downloads monitor user sessions, capture authentication credentials, and sometimes enable exploitation of latent vulnerabilities within internal networks. Malware-based phishing does not merely steal credentials; once established, it creates a foundation for lateral movement, session hijacking, and broader data exfiltration operations. Therefore, the technical success metric is not merely the compromise of a single session but the continuity of the attacker’s access and its potential for propagation within the network.


When quantifying the contribution of these technical mechanisms to phishing success, a useful simplified model is the formulation P(success) = P(reach) × P(convince) × (1 − P(detect)), where P(reach) represents the attacker’s probability of reaching the victim, P(convince) denotes the probability of convincing the victim, and P(detect) indicates the probability of technical or user-based detection. Technical mechanisms primarily aim to increase P(reach) and P(convince), while defensive measures seek to reduce the overall attack success probability by increasing P(detect). This perspective demonstrates that technological advancements and tools provide measurable advantages to attackers, but these advantages can be counterbalanced by strengthening detection and verification mechanisms.

Social Engineering and Psychological Aspects

Regardless of how robust the technical infrastructure of a phishing attack may be, its true effectiveness relies on the manipulation of human psychology. The social engineering dimension enhances the likelihood of success by exploiting individuals’ perceptual limitations, emotional responses, and cognitive habits. In this context, phishing must be evaluated not merely as a computational problem but as a security issue intersecting with behavioral science and psychology.


Attackers manipulate victims’ decision-making mechanisms through strategies such as building trust, arousing curiosity, instilling fear, or appealing to empathy. For instance, a sense of urgency may prompt users to click on email links they would normally question, or the impersonation of a familiar person or institution may exploit feelings of trust. The effectiveness of these techniques is directly related to the victim’s cognitive biases and emotional state. The predictability of human behavior provides attackers with a reliable foundation; factors such as high workloads, inattention, or anxiety are critical variables that increase the likelihood of attack success.


A simple probabilistic formula can be proposed to conceptualize this process: P(success) = f(E, C, T). Here, E represents the strength of emotional manipulation (e.g., fear, curiosity, empathy), C denotes the victim’s level of cognitive awareness and attention, and T signifies the temporal context of the attack (e.g., peak working hours or crisis periods). This formula demonstrates that the success of phishing attacks depends less on technical deception than on targeting the human factor at the right moment with the appropriate emotional triggers.


The most common tendency in social engineering-based phishing attacks is the exploitation of trust. Trust is a fundamental mechanism individuals develop in daily life to reduce cognitive load; a familiar logo, an official-looking email address, or an authoritative tone lowers the user’s threshold for questioning. Similarly, curiosity is triggered by messages linked to current news, crises, or extraordinary events, prompting users to respond quickly. Fear is activated through threats such as account closure, data deletion, or financial loss. The empathy factor is exploited through charity campaigns or disaster scenarios, appealing directly to the victim’s emotional reflexes.


Thus, the social engineering aspect of phishing attacks constitutes a complex manipulation process rooted in the cognitive and emotional dynamics of human behavior. In this regard, technical measures alone are insufficient; increasing user awareness through education programs, fostering recognition of cognitive biases, and cultivating an organizational security culture are the most critical defense mechanisms against psychological manipulation.

Detection and Prevention Methods

Detection and prevention methods require a multi-layered approach that relies not only on technical components but also on human and organizational processes to counter the phishing threat. In this context, efforts must focus on reducing the attack’s reach and persuasive power while simultaneously increasing the probability of detection; quantitatively, the probability of attack success can be expressed as P(success) = P(reach) × P(convince) × (1 − P(detect)). This formula clearly outlines three primary objectives of defense: reducing the attacker’s probability of reaching the target (P(reach)), decreasing the probability of convincing the target (P(convince)), and increasing the probability of detection (P(detect)). An effective defense strategy necessitates simultaneous intervention across all these parameters; strengthening only one component is insufficient in the long term, as attackers adapt their tactics to exploit weaknesses in other areas.


Among technical infrastructures aimed at reducing email-based reach, implementation of email authentication protocols (SPF, DKIM, DMARC) is paramount; enforcing DMARC for an organization’s domain makes it difficult for attackers to send emails from spoofed addresses, directly impacting P(reach) and contributing to the protection of the organization’s reputation. Additionally, multi-layered filtering mechanisms at the network gateway and mail server levels, incorporating URL and content analysis, blacklists and whitelists, prevent malicious links and attachments from reaching users. In technical detection approaches, higher efficiency is achieved when signature-based and behavioral analysis methods are used together; for example, signature-based filters that detect known malicious patterns should operate in parallel with machine learning models (e.g., Naive Bayes, SVM, deep learning-based classifiers) that identify contextual anomalies in content and links, as machine learning can detect anomalies from combinations of URL structure, linguistic features, and metadata, aiding in the early identification of zero-day campaigns.


Enhancing detection capability must not be limited to technical controls; endpoint security, antivirus/security software, browser-based anti-phishing extensions, and web filters prevent potentially harmful downloads and block the spread of malicious software within the network. Measures at the DNS level play a critical role against pharming and DNS poisoning attacks; DNSSEC implementations and traditional DNS monitoring can detect anomalies in name resolution, exposing infrastructure that misdirects users. Furthermore, certificate transparency and invalid certificate detection mechanisms are vital in mitigating the impact of HTTPS lock deception, as users frequently interpret the lock icon as a sign of security.


User-focused measures play a complementary role in detection and prevention. Continuous and contextual awareness training not only enables employees to recognize phishing emails but also strengthens a culture of reporting. Encouraging reporting channels through non-punitive and accessible language provides critical data flows within the organization as an early warning mechanism. However, care must be taken in designing training and simulations: excessive or punitive phishing simulations can erode trust and reduce reporting rates; therefore, simulations must be implemented within a supportive, educational framework coordinated with human resources, as poorly incentivized metrics (e.g., “who clicked the least”) can lead employees to conceal their mistakes.


Machine learning and AI-based anomaly detection provide advanced detection capabilities in email content analysis and network behavior correlation; for example, building user behavior profiles and monitoring byte-level deviations in login patterns or data transfer activities can detect lateral movement and credential theft at early stages. However, these approaches carry challenges such as false positive/negative rates, data privacy concerns, and model overfitting; therefore, continuous retraining of ML models, transparent evaluation metrics, and human-in-the-loop validations are essential.


Intervention and improvement processes are integral parts of detection capability. An effective incident response plan must encompass isolation procedures, credential resets, recovery from backups, and timely regulatory notifications (e.g., data breach disclosures); additionally, attack reports should be submitted to organizations such as APWG, NCSC, or relevant national authorities to contribute to collective detection and tracking efforts. This holistic approach requires a dynamic and adaptive defense architecture that balances technical controls, human training, and organizational processes.

Real-World Examples 

The theoretical framework of phishing attacks gains concreteness through real-world incidents. Throughout history, numerous attacks targeting different sectors have demonstrated that phishing can affect not only individual users but also large financial institutions, government agencies, and technology giants. Analyzing these attacks is essential to understanding both the evolution of techniques used and their social and economic consequences.【1】 


The banking sector has been one of the most frequent targets of phishing. In 2007, Sweden’s Nordea Bank suffered losses exceeding 7 million kronor due to fake emails and the Haxdoor Trojan. In this attack, malware disguised as security software captured users’ credentials. Such incidents can be summarized by the formula P(loss) = f(C × V × D), where C represents the strength of the attacker’s credential spoofing technique, V denotes the victim’s defense vulnerabilities (e.g., outdated antivirus software), and D indicates the scale of the attack’s spread. The multiplicative effect demonstrates how a single user error can trigger chain reactions across multiple accounts and financial transactions.


Attacks on e-government and corporate systems also reveal the complex nature of phishing. In 2011, a spear phishing attack on the security firm RSA exploited a vulnerability in Adobe Flash to gain access to the company’s SecurID two-factor authentication infrastructure. This attack, targeting a single employee, created a cascading effect that led to the exposure of critical supplier data within the U.S. defense industry. This example illustrates that phishing affects not only individual users but also corporate ecosystems and possesses the potential to infiltrate critical infrastructure.


Large-scale data breaches are direct outcomes of phishing. The 2014 attack on Sony Pictures began with a phishing campaign targeting senior executives via fake emails, ultimately resulting in the exfiltration of over 100 terabytes of sensitive data and hundreds of millions of dollars in losses. Here, phishing served only as the initial step, while the primary destructive impact stemmed from long-term data leakage and reputational damage. This situation can be explained by the formula P(impact) = P(success) × I, where P(success) represents the probability of the attack’s success and I denotes the corporate and financial value of the exposed data.


Between 2013 and 2015, Facebook and Google were defrauded of nearly $100 million by a Lithuanian attacker using fake invoice emails. The method exploited manipulations of trust relationships within corporate payment chains. This case demonstrated that even organizations with the most sophisticated security infrastructures remain vulnerable to phishing attacks targeting the human element.


These real-world examples illustrate that phishing involves far more than technical methods; social engineering, cognitive biases, and organizational vulnerabilities are decisive in attack success. Simultaneously, these examples reveal that attackers continuously develop new methods, compelling organizations to protect themselves not only through technical measures but also through comprehensive security policies and user awareness programs.

Legal and Regulatory Framework

Phishing attacks are not merely technical and psychological phenomena; they also carry legal and regulatory dimensions. When these attacks lead to the theft of individuals’ credentials, banking data, or corporate secrets, they result not only in direct economic losses but also in legal liabilities. Therefore, they must be addressed within a broad framework encompassing international regulations, national legislation, internal organizational policies, and sanctions. The fundamental aim of regulatory approaches is to protect users’ rights while compelling organizations to build more secure systems. To understand legal mechanisms, one can refer to an abstract risk model: R = P(i) × C, where R represents the level of legal risk, P(i) denotes the probability of a potential violation, and C signifies the magnitude of legal and financial obligations arising from such a violation. This formula illustrates that regulations fundamentally focus on reducing both the likelihood of incidents and the consequences of those that occur.


One of the most widely discussed international frameworks is the European Union’s General Data Protection Regulation (GDPR). GDPR aims to prevent the unlawful acquisition of personal data and imposes significant notification obligations and financial penalties on organizations in the event of a data breach linked to phishing. Similarly, in the United States, the California Consumer Privacy Act (CCPA) focuses on protecting consumer data and includes regulations aimed at preventing identity theft resulting from phishing. Such global regulations not only limit the processing of personal data but also compel companies to establish robust authentication mechanisms and data breach reporting systems.


In Türkiye, the regulatory framework is shaped by Law No. 6698 on the Protection of Personal Data (KVKK). KVKK mandates preventive measures against unlawful processing or unauthorized access to personal data and imposes on organizations both administrative and technical obligations. The leakage of personal data due to phishing attacks results in organizations facing administrative fines and potential compensation liabilities under KVKK. Additionally, the Turkish Criminal Code addresses the criminal dimension of phishing under offenses such as fraud and unauthorized access to information systems. This demonstrates that phishing is not merely a cybersecurity issue but also a direct criminal act with penal consequences.


Internal organizational policies are complementary elements of the regulatory framework. Organizations’ information security policies include frameworks that encourage employees to report suspicious emails, mandate multi-factor authentication, and are supported by regular awareness training. The goal here is not merely to comply with legislation but also to demonstrate reliability and accountability to regulatory bodies.


In conclusion, the legal and regulatory framework against phishing attacks constitutes a multi-layered structure that operates alongside technical measures, aiming to protect individuals’ rights and enhance organizational accountability. Regulations such as GDPR, CCPA, and KVKK seek to reduce the risks posed by attacks while also highlighting the necessity for international and national cooperation. The formulated risk approach emphasizes two core principles underlying regulatory frameworks: reducing the probability of attack occurrence and limiting the damage if an attack occurs. In this context, legal regulations are regarded as an inseparable dimension of cybersecurity strategy.

Citations

Author Information

Avatar
AuthorBeyza Nur TürküJanuary 7, 2026 at 7:09 AM

Discussions

No Discussion Added Yet

Start discussion for "Phishing Attack" article

View Discussions

Contents

  • History and Evolution

  • Types of Phishing Attacks

  • Technical Mechanisms

  • Social Engineering and Psychological Aspects

  • Detection and Prevention Methods

  • Real-World Examples

  • Legal and Regulatory Framework

Ask to Küre