1. Attacker:
- Creates a fraudulent email that looks like it’s from a legitimate source such as a bank, social media platform, etc.
- The attacker uses the victims’ information to gain access to confidential information.
2. Phishing E-Mail:
- Sent to the user.
- Adding urgency and a malicious link or attachment.
3. User:
- Receives the phishing email and may interact with the malicious link or attachment.
4. Phishing Website:
- The attacker gathers crucial credentials from the user.
5. Real Website:
- The attacker uses the obtained credentials to access confidential information.