Phishing Attack Framework

A phishing attack framework, in the context of cybersecurity, is a structured and organized approach or methodology used to plan, execute, and manage phishing attacks. It’s essentially a toolkit or set of tactics that actors employ to increase the effectiveness of their phishing campaigns.

This is not an actual framework, per se, as well-established adversaries already have a pretty good system that works for them. Additionally, phishing techniques are defined by MITRE ATT&CK | T1566

Here at Phish & Chips, we provide resources around a phishing attack framework that contains the following components:

  1. Target Selection (TS)
  2. Social Engineering (SE)
  3. Email Crafting (EC)
  4. Payload Delivery (PD)
  5. Command and Control (C2)
  6. Data Harvesting (DH)
  7. Evasion (Ev)
  8. Campaign Management (CM)
  9. Reporting and Analysis (RA)

Phishing attack frameworks can be highly sophisticated and may involve a combination of technical skills, social engineering tactics, and knowledge of human psychology. They are used by cybercriminals to target individuals, organizations, or even entire industries.

Get Started:

Disclaimer: It’s important for cybersecurity professionals and organizations to be aware of phishing attack frameworks and continuously update their defenses to protect against these evolving threats.

Check-out our Awareness & Training Resources while you’re at it.