Security Education

7 Phishing Tricks Attackers Use

Recurring phishing lure patterns mapped to chain mechanics, observable signals, and response decisions.

Problem this page solves

Phishing reports often classify a message as "suspicious" but do not identify the lure mechanism or the decision point it targeted. This page maps recurring lure patterns to chain stages so containment and escalation can follow observed evidence.

Reader outcome

After this page, you should be able to:

  • classify common phishing lures by mechanism, not theme
  • map each pattern to where it acts in the phishing chain
  • select response actions with explicit escalation gates

Mechanism-first pattern model (common lure mechanics and chain location)

Use the same chain stages defined in Why Phishing Works: Delivery -> Interaction -> Credential capture -> Session establishment -> Post-access actions.

Lure mechanicTypical operator-facing examplePrimary chain stage(s) affected
Authority impersonation"IT admin" or executive sender display nameDelivery, Interaction
Urgency or fear compression"Account disabled in 10 minutes"Interaction
Link misdirection / lookalike domainBranded text, attacker-controlled URLInteraction, Credential capture
Attachment execution baitInvoice/archive/doc requiring enable-contentInteraction, Post-access actions
Fake security verification"Confirm unusual login" flowCredential capture, Session establishment
Conversation hijack / vendor thread spoofReply-like email in business thread styleDelivery, Interaction
Payment or invoice workflow spoofBank-detail change or urgent payment requestInteraction, Post-access actions

Pattern-to-signal table (directly observable indicators)

PatternDirectly observable indicators
Authority impersonationdisplay name vs actual sender mismatch; reply-to domain divergence; unusual sending infrastructure in headers
Urgency or fear compressionshort action deadline; threat language without case/ticket reference; pressure to avoid normal verification path
Link misdirection / lookalike domainhover target mismatch; non-canonical domain; URL redirects to newly registered or unrelated host
Attachment execution baitarchive or macro-enabled file; double extension; endpoint telemetry showing open/execution attempt
Fake security verificationlogin page not on canonical provider domain; unexpected MFA prompt context; user reports credential entry to non-standard flow
Conversation hijack / vendor thread spoofmessage style mimics ongoing thread but missing prior thread IDs; subtle sender-domain variation; request scope shift
Payment or invoice workflow spoofchange-of-bank-details request; off-process payment urgency; mismatch with known procurement cadence

Practical response decisions per pattern with escalation gates

Gate definitions:

  • Gate A (exposure-only): no click, no file open, no credential or MFA interaction
  • Gate B (interaction): click or file open occurred, but no credential/MFA/session evidence yet
  • Gate C (account exposure likely): credential entry, MFA approval, or suspicious new session evidence
  • Gate D (high impact): privileged account, multi-user spread, or financial workflow impact
PatternImmediate response decisionEscalation gate
Authority impersonationpreserve email headers, verify sender via known channel, block sender/domain indicatorsGate B if user engaged; Gate D if privileged or finance approver impersonated
Urgency or fear compressionpause requested action, validate claim in trusted portal, preserve message timelineGate B on click/open; Gate C on credential/MFA interaction
Link misdirection / lookalike domainresolve URL safely, preserve redirect chain, block destination and lookalikesGate B on click; Gate C if credentials entered or auth prompt approved
Attachment execution baitquarantine sample, collect hash, review endpoint process tree and child executionGate C if execution evidence exists; Gate D if multiple endpoints or privileged host involvement
Fake security verificationcollect fake-page artifacts, review sign-in logs, revoke suspicious sessionsGate C when credential/MFA/session evidence appears; Gate D for admin account impact
Conversation hijack / vendor thread spoofpreserve full thread metadata, out-of-band verify request, monitor downstream recipientsGate C if sensitive data shared; Gate D if spread or payment workflow changed
Payment or invoice workflow spoofhold transaction/change request, verify beneficiary through known contact path, preserve approval trailGate D on any initiated transfer, account-change execution, or finance-system impact

What WitnessOps controls can support vs cannot guarantee

WitnessOps can support:

WitnessOps cannot guarantee:

  • prevention of all phishing delivery attempts
  • full reconstruction when required telemetry is missing, delayed, or altered
  • attacker intent or attribution from a single lure artifact
  • recovery of external financial transfers without third-party process outcomes

Observed vs inferred separation

  • Observed: sender/header mismatch, resolved URL, file hash, click/open telemetry, sign-in/session log, payment-change request artifact.
  • Inferred: "credentials were definitely stolen," "attacker had mailbox control," or "full blast radius is known."

Use observed artifacts to justify immediate containment. Keep inferred claims explicit until corroborated.

Trust assumptions and limits

Assumptions:

  • email, endpoint, identity, and finance telemetry is retained and time-aligned enough for sequence reconstruction
  • original artifacts are preserved before user mailbox cleanup or endpoint remediation
  • responder actions follow policy gates when tenant-wide, privileged, or financial-impact steps are proposed

Limits:

  • delayed reporting can remove short-lived artifacts (redirect chains, ephemeral pages, transient sessions)
  • adversaries may evade, suppress, or overwrite telemetry
  • some scope decisions remain probabilistic until additional corroborating evidence is collected

Next-page handoff

Continue to A Real Phishing Email for a line-by-line lure walkthrough using this same observed-signal and escalation model.