Phishing doesn’t look like phishing anymore. It looks like your bank. Your boss. Your kid’s school. The Nigerian Princes of 2005 have been replaced by AI-generated CFOs on video calls authorizing $25 million wire transfers. Here’s how to spot the tell.

Phishing is the #1 source of account compromise and financial fraud. No technical defense replaces awareness — because the attack is aimed at you, not your software.


Types of Phishing Attacks

Type Method Target
Standard Phishing Mass email impersonating trusted brands (bank, PayPal, Amazon, IRS) Anyone
Spear Phishing Targeted email using personal details from your social media or data breaches Specific individual
Clone Phishing Exact copy of a legitimate email you previously received, with a malicious link substituted Anyone who received the original
Smishing SMS/text message phishing (“Your package is delayed — click here”) Mobile users
Vishing Voice call phishing (IRS agents, bank fraud departments, tech support scams) Phone users
Whaling Spear phishing targeting executives or high-value individuals CEOs, executives
Quishing QR code phishing — malicious QR codes on flyers, parking meters, restaurant menus, or in emails that redirect to credential-harvesting sites Anyone who scans QR codes

How to Recognize Phishing

AI-generated phishing is here. Large language models can now produce flawless phishing emails — no typos, no broken grammar, personalized with details scraped from your LinkedIn and social media. The old advice of “look for spelling errors” is dead. Focus on context and behavior instead: did you expect this email? Does the request make sense? Is there urgency pushing you to act before thinking?

Red flags in emails:

Red flags in texts (Smishing):


Prevention


If You Clicked a Phishing Link

  1. Do NOT enter any information on the page — close the tab immediately
  2. Change your password for any account the phishing attempt was impersonating
  3. Enable or verify 2FA on the affected account
  4. Scan your device with antivirus software
  5. Contact your bank if the phishing was financial — report as fraud

If you entered credentials:


Deepfakes

In 2024, a finance employee at a Hong Kong company transferred $25 million USD to attackers after a deepfake video call that appeared to show his company’s CFO and other colleagues authorizing the transfer. Every participant on the call was AI-generated. The employee had no idea until days later.

This isn’t science fiction. The technology is available and cheap.

Deepfake detection tips:

Protecting against deepfake social engineering:

The family passphrase is a low-tech solution to a high-tech problem. Set one up this week.


Reporting Phishing


Set a family passphrase today. Pick something specific, something no one outside your household would guess, and make sure everyone knows it. That’s the one action here that protects against threats no software can catch.