How Phishing Attacks Work (And How to Spot Them Every Time)

Phishing is responsible for 36% of all data breaches and costs businesses $4.76 billion annually. But it doesn't just target corporations — individuals receive an average of 14 phishing emails per month. Here's how these attacks work and how to never fall for one.

What Is Phishing, Really?

Phishing is a social engineering attack where criminals impersonate a trusted entity — your bank, your employer, a shipping company, a government agency — to trick you into revealing sensitive information or installing malware.

Unlike brute-force attacks that target technology, phishing targets human psychology. It exploits urgency ("Your account will be locked in 24 hours"), fear ("Suspicious login detected"), authority ("This is from the IRS"), and curiosity ("You have a pending package").

And it works. According to Proofpoint's 2025 State of the Phish report, 71% of organizations experienced at least one successful phishing attack in 2024. For individuals, the numbers are even worse — most people encounter phishing attempts daily without recognizing them.

Types of Phishing Attacks

Email Phishing

The most common type. Mass-distributed emails that impersonate brands like Amazon, Microsoft, PayPal, or your bank. They typically contain a link to a fake login page that captures your credentials. Modern email phishing is increasingly sophisticated — using real company logos, matching email templates, and even valid SSL certificates.

Smishing (SMS Phishing)

Phishing via text message. Common lures include fake delivery notifications ("Your USPS package is held — click to reschedule"), bank alerts ("Unusual activity detected on your account"), and toll/fine notices. Smishing exploits the trust people place in text messages and the small screen size that makes URL inspection difficult.

Vishing (Voice Phishing)

Phone-based phishing where callers impersonate banks, the IRS, tech support, or law enforcement. AI voice cloning has made vishing dramatically more convincing — attackers can now clone a person's voice from just a few seconds of audio, enabling scams where "your boss" or "your family member" calls asking for urgent help.

Spear Phishing

Targeted phishing aimed at a specific individual using personal information gathered from social media, data breaches, or company websites. A spear phishing email might reference your actual job title, recent purchases, or colleagues' names, making it extremely convincing.

Whaling

Spear phishing targeting high-value individuals — executives, finance directors, or business owners. These attacks often impersonate legal counsel, auditors, or board members and request wire transfers or sensitive data.

Clone Phishing

Attackers take a legitimate email you've already received, clone it exactly, replace the link or attachment with a malicious version, and resend it from a spoofed address. Since you've "already seen" the email, you're less likely to scrutinize it.

Anatomy of a Phishing Attack: Step by Step

Understanding how phishing works behind the scenes helps you spot it. Here's what a typical email phishing attack looks like from the attacker's perspective:

  1. Target selection: Attackers either cast a wide net (mass phishing) or research specific targets using LinkedIn, social media, and breach databases.
  2. Infrastructure setup: They register a lookalike domain (e.g., "amaz0n-security.com" or "paypal-verify.net"), set up a convincing fake login page, and obtain an SSL certificate so the site shows the padlock icon.
  3. Email crafting: The email is designed to create urgency or fear. Common templates: account suspension warnings, security alerts, invoice/payment requests, delivery notifications, or prize winnings.
  4. Delivery: The email is sent from a spoofed or compromised address. Advanced attacks use legitimate email services or compromised business accounts to bypass spam filters.
  5. Credential harvesting: When the victim clicks the link and enters their credentials, the fake page captures them and either stores them or forwards them to the attacker in real-time.
  6. Account compromise: The attacker logs in to the victim's real account within minutes, often changing the password and recovery settings to lock the victim out.
  7. Exploitation: Depending on the account type: financial theft, data exfiltration, further phishing from the compromised account, or ransomware deployment.
Key Insight: The average phishing site exists for only 15 hours before being taken down, according to the Anti-Phishing Working Group. Attackers know speed is essential — they set up, harvest credentials, and disappear before security teams can respond. This is why automated phishing detection tools that check URLs in real-time are more effective than blocklists alone.

Red Flags: How to Spot Phishing Every Time

No single red flag is definitive, but multiple flags together are a near-certain indicator of phishing. Train yourself to check for these:

Email Red Flags

SMS/Text Red Flags

Phone Call Red Flags

Block Phishing Automatically

Malwarebytes Browser Guard and Norton Safe Web block phishing sites in real-time before you can enter your credentials.

See Our #1 Antivirus: Norton 360 Get Malwarebytes Browser Guard (Free)

How to Verify Suspicious Messages

When you receive a message that might be phishing, follow this verification process:

  1. Don't click any links or call any numbers in the message.
  2. Open a new browser tab and navigate directly to the company's official website by typing the URL yourself.
  3. Log in to your account normally and check for any alerts or messages. If there's truly an issue, you'll see it in your account dashboard.
  4. Call the company using the number on their official website (not the number in the suspicious message) if you want verbal confirmation.
  5. Search for the exact message text online. If it's a known phishing campaign, you'll find reports from other users or security researchers.

This takes about 60 seconds and eliminates virtually all phishing risk. The key rule: never trust the message itself as the verification method. Always go to the source independently.

Tools That Block Phishing Attacks

While human vigilance is important, automated tools catch what your eyes miss — especially with increasingly sophisticated AI-generated phishing.

Malwarebytes Browser Guard (Free)

A free browser extension available for Chrome, Firefox, Edge, and Safari that blocks phishing sites, malicious ads, and scam pages in real-time. It uses a combination of blocklists and heuristic analysis to detect phishing pages that are minutes old. Browser Guard also blocks tech support scams, PUPs (potentially unwanted programs), and browser hijackers.

Why we recommend it: It's completely free, lightweight, and provides a critical layer of phishing protection that complements any antivirus.

Norton Safe Web and Norton 360

Norton Safe Web rates websites for safety before you visit them, displaying trust ratings directly in search results. Norton 360 extends this with real-time URL scanning, email phishing detection, and its SafeCam feature that blocks unauthorized webcam access — which phishing-delivered RATs (Remote Access Trojans) often exploit.

Why we recommend it: Norton's URL database is one of the largest in the industry, and its real-time analysis catches zero-day phishing sites that blocklist-based tools miss.

Password Managers as Phishing Defense

Password managers like 1Password and NordPass provide an often-overlooked anti-phishing benefit: they only auto-fill credentials on the exact matching domain. If you're on a phishing site like "paypa1.com" instead of "paypal.com," your password manager won't offer to fill your PayPal credentials — immediately alerting you that something is wrong.

Key Insight: Google's 2024 security research found that users with password managers were 13x less likely to fall for phishing attacks than users who type passwords manually. The auto-fill domain matching acts as an automated phishing detector that catches even the most convincing fake sites.

What to Do If You Clicked a Phishing Link

If you clicked a link in a phishing message, don't panic — but act quickly. Your response depends on what happened after the click.

If You Clicked But Didn't Enter Information

  1. Close the page immediately. Don't interact with any pop-ups or download prompts.
  2. Disconnect from the internet temporarily (turn off Wi-Fi) to prevent any background malware communication.
  3. Run a full malware scan with Norton or Malwarebytes. Some phishing pages attempt drive-by downloads that install malware without user interaction.
  4. Clear your browser cache and cookies to remove any tracking cookies the phishing site may have planted.
  5. Monitor your accounts for the next 48 hours for any suspicious activity.

If You Entered Credentials

  1. Change the password immediately on the real site. Go directly to the service's official website — do not use the phishing link.
  2. Change the password everywhere you reused it. Use a password manager to identify all accounts with the same password.
  3. Enable 2FA on the compromised account and all related accounts.
  4. Check for unauthorized changes to your account settings — especially recovery email, phone number, and connected apps.
  5. Revoke all active sessions using the security settings of the affected service.
  6. Report the phishing attempt to the impersonated company and to the Anti-Phishing Working Group at reportphishing@apwg.org.

If You Entered Financial Information

  1. Contact your bank or credit card company immediately to freeze or replace the card.
  2. Monitor transactions closely for the next 30-60 days.
  3. Place a fraud alert with the credit bureaus (one bureau will notify the others).
  4. Consider a credit freeze if you entered your SSN or extensive personal details.
  5. File a report with the FTC at IdentityTheft.gov.

The Rise of AI-Powered Phishing

Generative AI has changed the phishing landscape dramatically. In 2025, AI-generated phishing emails have become nearly indistinguishable from legitimate communications:

This evolution makes automated protection tools more important than ever. Human pattern recognition alone is no longer sufficient against AI-enhanced attacks. Layered defense — combining email filtering, browser protection, password managers, and security awareness — is essential.

Key Insight: SlashNext's 2025 Phishing Intelligence Report found that AI-generated phishing emails had a 60% higher click rate than traditional phishing emails. The old advice of "look for typos" is no longer reliable. Multi-layered automated protection is now a necessity, not a luxury.

Frequently Asked Questions

What should I do if I clicked a phishing link?

If you clicked a phishing link but didn't enter any information: disconnect from the internet, run a full malware scan, and clear your browser cache. If you entered credentials: immediately change the password on that account and any account sharing that password, enable 2FA, and check for unauthorized activity. If you entered financial information: contact your bank immediately to freeze the card, monitor for unauthorized charges, and consider a credit freeze.

Can phishing emails bypass spam filters?

Yes, sophisticated phishing emails regularly bypass spam filters. Attackers use techniques like sending from legitimate compromised accounts, using clean domains with no malicious history, embedding phishing links in images or QR codes, and personalizing emails to avoid pattern-based detection. This is why browser-level phishing protection (like Malwarebytes Browser Guard or Norton Safe Web) provides a critical second line of defense.

How can I tell if an email is really from my bank?

Never trust an email claiming to be from your bank at face value. Instead: check the sender's actual email address (not the display name), hover over any links to see the real URL, and look for generic greetings instead of your actual name. Most importantly, never click links in banking emails — instead, open a new browser tab and navigate directly to your bank's website or use their official app. Legitimate banks will never ask you to verify your account via email link.

Protect Yourself from Phishing Attacks

Phishing is the #1 way people get hacked. Combine awareness with automated tools for complete protection.

Get Norton 360 — #1 Antivirus Try Malwarebytes Browser Guard (Free)