Phishing links: what they are and how to protect yourself

In today's digital world, the threat of phishing is becoming an increasingly serious problem. In 2022 alone, the National Bank of Ukraine identified about 4,500 phishing resources, most of which masqueraded as social help sites. At the same time, according to research by the NBU and Opendatabot, more than 18.5% of users have already fallen victim to such attacks.

A phishing link is a specially created URL that leads to a fake website that visually imitates a real resource. The term "phishing" comes from the English word "fishing", which very accurately describes the principle of fraudsters - they, like fishermen, take the bait and wait for the unwary user to get hooked.

The history of phishing began in 1996, when the Internet was just gaining popularity. The first attacks were conducted via e-mail, where the scammers posed as employees of America Online. Since then, the methods have become much more sophisticated, and the scale of the problem has grown exponentially. Today, the damage caused by phishing attacks amounts to billions of hryvnias annually.

How phishing attacks work

The mechanism of a phishing attack is based on a combination of technical means and social engineering. Fraudsters create an exact copy of a well-known website, such as a banking portal or a social network page. It is almost impossible to distinguish such a site from the real one at first glance - the same logos, colors, fonts and design elements are used.

The psychological techniques used by attackers are carefully thought out. They play on basic human emotions: greed, fear, curiosity. For example, they offer to receive non-existent state compensation or warn about an allegedly impending blocking of a bank account. Under stress or in a hurry, a user may not notice minor inconsistencies in the website address or connection security.

A typical attack scenario is as follows: a user receives a message about the need to urgently "confirm" his data on the website of a bank or other service. After clicking on the link, the user enters a fake website where he or she enters his or her confidential data - login, password, card number or CVV code. This information is instantly in the hands of fraudsters.

The goals of attackers may be different:

  • Gaining access to bank accounts and payment cards
  • Stealing credentials from social networks and email accounts
  • Obtaining personal data to sell
  • Introducing malware

At the same time, modern phishing attacks are becoming more and more targeted. Attackers carefully study the potential victim, using information from public sources to make the deception as plausible as possible. For example, they may use first name and middle name, mention their place of work or recent card transactions.

It is worth noting that phishing attacks are often timed to coincide with specific events or seasons. During the pandemic, phishing sites mimicking COVID compensation portals were common. During tax reporting season, scammers masquerading as the IRS become more active. And in the run-up to the holidays, the number of fake online stores with "unbelievable discounts" is growing.

Main types of phishing attacks

Modern scammers use various channels to conduct phishing attacks. Each method has its own peculiarities and requires specific protection measures. Email phishing remains the most common type of attack, but new ways to deceive users are emerging.

Email phishing is usually disguised as official mailings from banks, payment systems, or government agencies. The characteristic feature of such emails is to create a false sense of urgency. Fraudsters claim that the account will be blocked if the data is not confirmed within 24 hours, or offer to receive non-existent compensation before a certain date. At the same time, emails are sent from domains that look like official domains - for example, support@privat-bank.net instead of the bank's official address.

Phishing in social networks is becoming increasingly sophisticated. Attackers create exact replicas of profiles of famous brands or popular personalities, after which they launch "promotions" or "giveaways". Users are invited to click on a link and "register" for participation by entering their data. Hacked friends' accounts are particularly dangerous, as users become vigilant when they receive a message from someone they know.

SMS phishing, or smishing, uses text messages to spread malicious links. A typical example is a winning or blocked card message with an urgent call to click on a short link. The danger of smishing is that SMS is perceived by users as a more reliable communication channel than email.

Voice phishing (vishing) is an attack using phone calls. Fraudsters present themselves as bank or government officials and try to obtain confidential information under various pretexts. Often such calls are combined with phishing links - the attacker asks you to go to a website supposedly to confirm your identity.

Methods of disguising phishing links

Phishing link masking techniques are constantly improving. Modern scammers use sophisticated technical solutions to bypass the protection mechanisms of browsers and email clients.

URL spoofing is done in several ways. The simplest is the use of similar characters in the domain name. For example, instead of the Latin letter "o" can be used the number "0", and the letter "l" is replaced by the number "1". Thus, privat24.ua can turn into pr1vat24.ua. At a quick glance, it is difficult to notice such a substitution.

Long URLs with many parameters are often used for disguise. The real address of a phishing site is hidden somewhere in the middle of such a link, and it starts with the name of a well-known domain. For example: facebook.com.secure-login.evil-site.com. An inattentive user sees only the beginning of the address and considers the link safe.

Redirects and intermediate pages allow you to hide the final address of the phishing site. The user follows a short link that leads to a fraudulent resource through several redirects. Each redirect can check browser settings, IP address, and other characteristics to determine whether the user clicked on the link or whether it is a security check attempt.

A particularly sophisticated method of disguise is the use of compromised legitimate sites. Fraudsters place malicious code on a real site that has a good reputation and a secure connection. The user sees a familiar address and a green lock in the browser, but certain actions redirect to a phishing page.

Leave an application

Enter your name and email, our managers will contact you as soon as possible.

Signs of phishing sites

A phishing site can be recognized by a number of characteristic signs. Even with a cursory inspection of the page, an attentive user is able to notice suspicious details that indicate fraud.

The first thing to pay attention to is the address bar of the browser. Legitimate banks and payment systems always use a secure HTTPS connection, indicated by a lock icon. The absence of this icon when requesting sensitive data is a clear sign of phishing. At the same time, the mere presence of HTTPS does not guarantee security, as modern scammers have learned to obtain free SSL certificates.

The domain name of a website often contains clues about its fakeness. Official resources of large organizations use short, easy-to-remember addresses. If the address contains random numbers, additional words or strange abbreviations, it is a reason to be wary. For example, instead of pay.ukr.net, fraudsters may use pay-ukr-secure.net or ukr-net.payment.com.

The quality of the site's execution can also give away phishing. Professionally designed websites of large companies do not contain spelling errors, and all interface elements display correctly on different devices. Phishing sites are often found on phishing sites:

  • Violations in page layout
  • Incorrect fonts
  • Outdated logos
  • Interface language mix

Ways to protect against phishing

Effective protection against phishing requires a comprehensive approach that combines technical means and proper habits of safe online behavior. At the same time, it is important to remember that the methods of scammers are constantly improving.

Modern browsers include built-in phishing protection mechanisms. They check the sites you visit against a constantly updated database of malicious resources. If a suspicious site is detected, the browser displays a warning. However, you should not rely entirely on automatic protection - new phishing sites appear faster than databases are updated.

Special attention should be paid to checking links received via e-mail or messengers. Even if the message came from someone you know, their account may have been hacked. Before clicking on the link, it is recommended to:

  • Check the full URL by hovering the cursor over the link
  • Use shortened link checking services
  • If in doubt, open the site manually via bookmarks

To protect confidential data, it is extremely important to use different passwords for different services. If one account is compromised, attackers will not have access to the rest. The optimal solution is to use a password manager that generates and stores complex unique passwords for each site.

Two-factor authentication significantly increases security even in the event of a successful phishing attack. Even if fraudsters get the login and password, they will not be able to access the account without access to the second factor (usually a code from an SMS or authenticator app). It's especially important to include two-factor authentication for banking and payment services.

Regular software updates also play an important role in protecting against phishing. Updates often contain fixes for vulnerabilities that can be exploited by attackers. This applies not only to the operating system and browser, but also to all applications that access the Internet.

What to do if you are a victim of a phishing attack

If you find yourself the victim of a phishing attack, it's important to act quickly and consistently. The first hours after the incident are especially critical, as fraudsters are eager to use the data they have obtained as quickly as possible.

If your bank card is compromised, you should immediately contact your bank and block all transactions. Most Ukrainian banks provide the possibility of emergency card blocking via mobile application or hotline. It is important to inform a bank employee about the fact of a phishing attack - this will help the security service to prevent similar incidents in the future.

If your social network or e-mail account is hacked, you should immediately change your password if you still have access. It is important to use a different device, as malware may be installed on the compromised computer. The new password must be complex and have nothing in common with the previous one.

If access to the account has already been lost, it is necessary to:

  • Contact the service support service
  • Prepare documents confirming ownership of the account
  • Warn contacts about hacking through other communication channels
  • Check tied payment instruments

Security tips

Building a solid phishing defense system starts with good internet usage habits. The key principle is a healthy skepticism towards any unexpected offers, especially if they require urgent action.

A strong password is the foundation of digital account security. Current recommendations for creating passwords include:

  • At least 12 characters long
  • Use of different case letters, numbers and special characters
  • No personal information in the password
  • Unique for each service

Two-factor authentication significantly increases the security of accounts. When setting it up, it is important to:

  • Keep backup access codes
  • Use multiple confirmation methods
  • Check tethered devices regularly
  • Disconnect lost devices immediately

Cybersecurity education resources help you stay on top of current threats. The National Bank of Ukraine regularly publishes information about new types of fraud on its official website. It is also useful to follow cybersecurity news in specialized publications and Telegram channels.

When using public Wi-Fi networks, you should:

  • Avoid logging into banking applications
  • Use a VPN connection
  • Disable automatic connection to networks
  • Verify site security certificates

Regularly updating all software is critical for security. Recommended:

  • Enable automatic system updates
  • Check for antivirus software updates
  • Keep your browser and extensions up to date
  • Uninstall unused programs

In today's digital world, phishing remains one of the biggest threats to user security. However, by following basic security rules and paying close attention to suspicious links, the risk of falling victim to fraudsters is significantly reduced.

Other articles

Other services

Get in touch
Messengers