{"id":2825,"date":"2018-04-12T19:02:00","date_gmt":"2018-04-12T16:02:00","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=2825"},"modified":"2023-11-06T21:19:16","modified_gmt":"2023-11-06T18:19:16","slug":"phishing-vishing-smishing-pharming","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/phishing-vishing-smishing-pharming\/","title":{"rendered":"Phishing, Vishing, Smishing, Pharming &#8211; What Is the Difference"},"content":{"rendered":"<p>Recently the Internet has become an integral part of our lives. The network offers many incredible opportunities such as communication, shopping, paying bills, and various entertainments. But unfortunately not always and not everyone uses the Internet for the good of society. Due to the rapid development of numerous resources, many types of fraud have arisen that aim to obtain confidential data and use it further for personal profit. The main ones are <strong>phishing, vishing, smishing, pharming<\/strong>. However, to protect you personal data on the internet it\u2019s enough to use elementary data protection rules and to know how to recognize the common threats and how to combat them. And this exactly what will be discussed in this article.<br><a name=\"Phishing\"><\/a><\/p>\n<h2 style=\"text-align: center;\">Phishing<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2826\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1.jpg\" alt=\"Phishing, Vishing, Smishing, Pharming - What Is the Difference\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1.jpg 442w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-1-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><a href=\"https:\/\/www.protectimus.com\/blog\/what-is-phishing-and-how-not-to-fall-into-its-nets\/\">Phishing<\/a> is one of the most commonly used methods of Internet fraud at this time. It is a kind of obtaining secret information by an attacker who uses the well-known methods of <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a> to make the users to open their personal data themselves. This can be the number and code of a bank card, phone number, login, password, and email address from certain services. Mainly phishing is used to get access to users&#8217; online banking accounts or e-wallets, with the further possibility of funds withdrawal to the fraudster account.<\/p>\n<p>So how does phishing work?<\/p>\n<p>A user gets a phishing-message to his mailbox that, first of all, affects his emotions. For example, this can be a notification about a big win or, on the contrary, the notification about hacking the account with the further suggestion to follow a phishing link and to enter the authorization data. A user goes to the provided resource and &#8216;gives away&#8217; his login and password to the fraudster who, on his part, quickly operates with the information received.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2830 shadow-img aligncenter\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-example-2-1.jpg\" alt=\"Phishing, Vishing, Smishing, Pharming - What Is the Difference\" width=\"576\" height=\"368\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-example-2-1.jpg 576w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-example-2-1-300x192.jpg 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/p>\n<p><\/p>\n<p>There are several specific examples of Internet phishing:<\/p>\n<ol>\n<li>Attackers send out millions of messages on behalf of a well-known company to various emails with the request to confirm their login and password. When you click the provided URL you can see the authorization page that is absolutely identical to the page on the original resource. The trick, most likely, is hidden in the link to the site. The domain should be very similar to the real one but differ in several symbols. A similar kind of phishing messages can be also found in different social networks.<\/li>\n<li>Phishers can use shortcomings in the SMTP protocol to send emails with the fake &#8220;Mail From:&#8221; line. Responding to such a letter the user sends the answer directly to the offender.<\/li>\n<li>It is also necessary to be cautious during participating in Online Auctions and sales since the goods offered for sale even though the legal resource can be paid through a third-party fraudulent website.<\/li>\n<li>Many users face fictitious Internet organizations that request donations.<\/li>\n<li>Online shops with extremely accessible prices for branded goods can also be counterfeited. As a result, there is a chance to pay for a product that will never be received since it never existed.<\/li>\n<\/ol>\n<p><a name=\"Vishing\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">Top 7 Tips How to Protect Yourself from Phishing Scams<\/a><\/p>\n<h2 style=\"text-align: center;\">Vishing<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2827\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1.jpg\" alt=\"Phishing, Vishing, Smishing, Pharming - What Is the Difference\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1.jpg 422w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-2-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>Vishing (vishing &#8211; voice+phishing) is another variety of phishing that also uses methods of social engineering, but with the help of a phone call.<\/p>\n<p>This is how attackers, let\u2019s call them \u201cvishers\u201d, usually act:<\/p>\n<p>The user receives a phone call, for example, from the bank employee and the operator warns him that his banking card will be blocked if the full information about the card including its number, CVV-code, etc. is not provided by phone right now. A trustful client hearing such a &#8216;threat&#8217; immediately panics and can give out all the personal data right up to the verification code.<\/p>\n<p>During the vishing attack, the user can also be offered a purchase with a huge discount or informed about the win in any lottery. There is no point to enjoy such a bargain or such an advantageous prize, it is always worthwhile to double-check the information provided by referring to official resources.<\/p>\n<p>So it is necessary to remember to check everything. It is well worth to politely say goodbye to the person on the other end and to check the provided information with a call to the hotline of the bank, they will provide you with more accurate information.<\/p>\n<p>In any unclear situation, the main thing is not to panic. Remember &#8211; you can always check everything. Politely say goodbye to the person you are talking to and call the hotline of the organization whose representative the caller introduced himself. So you can easily understand if the call was real, or you almost became a victim of vishing.<br><a name=\"Smishing\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/the-most-common-ways-of-credit-card-fraud\/\">The Most Common Ways of Credit Card Fraud<\/a><\/p>\n<h2 style=\"text-align: center;\">Smishing<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2828\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1.jpg\" alt=\"Phishing, Vishing, Smishing, Pharming - What Is the Difference\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1.jpg 1004w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-768x768.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-610x610.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-3-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>Another type of cheating through communication services is smishing (smishing \u2013 sms+phishing). This criminal scheme aims to bring the user to follow a malicious link from the SMS message.<\/p>\n<p>A Smishing message can have a form of notification from a well-known bank, familiar company or it may be an information about sudden winning a lottery etc. In the case of SMS to detect a trick is more difficult than with phishing via email, because the messages are short and have not so much information except for the link itself.<\/p>\n<p>Most likely it can be an offer to click the link and enter data or just call or send back the message that would bring extra expenses. It\u2019s is necessary to remember that any such message should be cause for concern. Never reply to such kind of SMS messages and double-check the information with a call to the hotline of an actual service.<br><a name=\"Pharming\"><\/a><\/p>\n<h2 style=\"text-align: center;\">Pharming<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2829\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1.jpg\" alt=\"Phishing, Vishing, Smishing, Pharming - What Is the Difference\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1.jpg 470w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/04\/Phishing-Vishing-Smishing-Pharming-4-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>Fraudsters understand that classic phishing should become less effective in the near future. A lot of users are already aware of the danger they can face on the various resources and keep the security rules. In consequence of this an absolutely new type of fraud, called pharming<strong>,<\/strong> was invented. Its main principle is a secret redirection of users to third-party websites.<\/p>\n<p>So how does pharming work?<\/p>\n<p>The main peculiarity of pharming is the unobvious substitution of the original website for fraudulent, allowing an attacker to acquire the confidential user\u2019s data. All this is done by using the DNS cache on the end user&#8217;s device or on the provider&#8217;s network equipment. After the exchange, the attacker should only wait until the client authorizes on a certain resource.<\/p>\n<p>The virus turns on its activity only at the moment when the user opens the necessary page. Usually, pharming is applied to online banking or other payment systems through which money transactions are performed.<\/p>\n<p>It is rather difficult to be secured from pharming as the site substitution process goes unnoticed. Pharming software can work both from the browser cache and directly as a virus on your PC. Thus, to protect yourself from pharming, you need not only to learn to recognize phishing emails, but also be careful when installing the software. It is necessary to be extremely cautious when reading emails, and when downloading any software from the Internet.<br><a name=\"How to protect yourself from Phishing, Vishing, Smishing, Pharming\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/9-useful-data-protection-tips-during-online-shopping\/\">9 Data Protection Tips for Safe Online Shopping<\/a><\/p>\n<h2 style=\"text-align: center;\">How to protect yourself from Phishing, Vishing, Smishing, Pharming<\/h2>\n<p>How not to get caught on the hook of hunters for profit? First of all, you should always follow the following recommendations when using the Internet and any other communication resources:<\/p>\n<ul>\n<li>Every time pay attention to the sender and subject of the message. If they look suspicious, just delete these emails or SMS;<\/li>\n<li>Do not click the suggested links in emails and messages from an unknown sender;<\/li>\n<li>Never reply to messages requesting personal information;<\/li>\n<li>Watch for mistakes in the text, if you find them, most likely the letter is a hoax;<\/li>\n<li>Files attached to an unknown message that have .exe, .msi, .bat, .pif, .com, .vbs, .reg, and .zip extensions can install malicious software, there is no point to open them.<\/li>\n<\/ul>\n<p>It would not be superfluous also to pay attention to the following possibilities of protection from phishing, smishing, vishing, and pharming:<\/p>\n<ol>\n<li>The most popular browsers such as Mozilla Firefox, Google Chrome, Microsoft Edge, Safari, have antiphishing systems with a list of malicious sites and this system warns the user about the visit to a malicious site. Similar antiphishing systems are used on many other resources such as social networks, etc.<\/li>\n<li>Antivirus software provides a quite reliable protection. It is only necessary to install updates on time. These updates allow preventing the virus infiltration on the device and alert the users when they follow malicious links.<\/li>\n<li>Various spam filters that are used by email services automatically sift messages received from phishers.<\/li>\n<li>Be sure to use <a href=\"https:\/\/www.protectimus.com\/blog\/how-does-2-factor-authentication-work\/\">two-factor authentication<\/a> wherever it\u2019s possible. If all your accounts are additionally protected with <a href=\"https:\/\/www.protectimus.com\/blog\/otp-generation-algorithms-and-token-types\/\">one-time passwords<\/a>, this will complicate the lives of intruders. The lifetime of the one-time password is limited &#8211; no more than 60 seconds, so to gain access to the user account, the phisher needs to be more inventive and fast. It&#8217;s not so easy to get your login and password, and one-time password at the same time and still have time to enter your account or to make an illegal transaction in such a short time.<\/li>\n<\/ol>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">10 Most Popular Two-Factor Authentication Apps Compared<\/a><\/p>\n<h2 style=\"text-align: center;\">Conclusions<\/h2>\n<p>So, what is the difference between phishing, vishing, smishing, and pharming &#8211; these so similar, but still different types of Internet fraud? The main goal is the same for all of them &#8211; to fetch confidential information, mainly through redirecting users to fake websites. But this is done in different ways:<\/p>\n<ul>\n<li><a href=\"#Phishing\">In phishing<\/a> &#8211; via e-mail.<\/li>\n<li><a href=\"#Vishing\">In vishing<\/a> &#8211; by means of a phone call.<\/li>\n<li><a href=\"#Smishing\">In smishing<\/a> &#8211; via SMS.<\/li>\n<li><a href=\"#Pharming\">In pharming<\/a> &#8211; by using the DNS cache on the end user device or the network equipment of the provider.<\/li>\n<\/ul>\n<p><a href=\"#How to protect yourself from Phishing, Vishing, Smishing, Pharming\">How to protect yourself from phishing, vishing, smishing, pharming?<\/a> Do not click on links in letters and SMS messages, do not use unlicensed software and do not download software on unfamiliar websites, use trustworthy browsers and antiviruses, activate two-factor authentication, do not trust every first caller and always recheck the information.<\/p>\n<h2 style=\"text-align: center;\">Read more:<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/gdpr-summary\/\">General Data Protection Regulation Summary<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\">Ransomware \u2013 to Pay or Not to Pay<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/trustworthy-messaging-apps\/\">Which messaging apps are trustworthy?<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/malvertising\/\">Malvertising: Can It Be Stopped?<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-choose-and-use-strong-passwords\/\">How to Choose and Use Strong Passwords<\/a><\/li>\n<li><a href=\"http:\/\/protectimus.com\/blog\/email-hacking-protection\/\">Email hacking protection<\/a><\/li>\n<\/ul>\n\n\n<p><\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Recently the Internet has become an integral part of our lives. The network offers many incredible opportunities such as communication, shopping, paying bills, and various entertainments. But unfortunately not always and not everyone uses the Internet for the good of society. Due to the rapid development of numerous resources, many types of fraud have arisen [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":4273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,15],"tags":[202,118,230,311],"class_list":["post-2825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-rd","tag-cybersecurity","tag-data-protection","tag-information-security","tag-phishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":9,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions"}],"predecessor-version":[{"id":8622,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions\/8622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4273"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=2825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=2825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}