What Is Phishing?

Phishing is a cyberattack in which criminals send fraudulent messages — usually emails — designed to trick recipients into revealing credentials, clicking malicious links, or transferring money. It remains the most common initial access method used in attacks against UK businesses.

See the Types

Direct Answer

Phishing is a social engineering attack in which an attacker impersonates a trusted entity — a bank, a supplier, HMRC, Microsoft — to deceive a user into taking an action that benefits the attacker. The most common outcomes are credential theft, malware installation, and business email compromise (BEC) fraud. Phishing attacks range from mass, untargeted campaigns to highly personalised spear-phishing aimed at specific individuals in an organisation. Technical controls such as email filtering, DMARC, and multi-factor authentication can reduce exposure, but security awareness training remains an important layer of defence. Phishing is the number one attack type — 85% of businesses that experienced a breach identified phishing as the cause (DSIT 2025). Phishing was the most disruptive breach for 65% of businesses.

Types of Phishing Attack

Phishing covers a range of techniques. Understanding the differences helps identify the right controls.

Email Phishing

Mass-sent fraudulent emails impersonating trusted brands. Typically direct recipients to fake login pages or prompt them to open malicious attachments.

Spear Phishing

Targeted attacks using personalised information about the recipient — their name, role, or current projects — to increase credibility and success rates.

Business Email Compromise

The attacker impersonates a senior executive or supplier to redirect payments or extract sensitive information. Often involves no malware, making it harder to detect.

Smishing & Vishing

Phishing delivered via SMS (smishing) or phone call (vishing). Attackers pose as banks, delivery firms, or IT support to extract credentials or approve fraudulent transactions.

Clone Phishing

A legitimate email previously received by the target is cloned and resent with malicious links replacing the originals. The familiarity of the message increases the likelihood of engagement.

Pharming

DNS-level manipulation that redirects users from legitimate websites to fraudulent ones without any email interaction required. Harder for users to detect.

Basic Email Security vs Anti-Phishing Controls

The difference between a standard email setup and one with layered anti-phishing controls in place.

Feature
Basic Email SetupTypical out-of-the-box
Anti-Phishing ControlsLayered defenceRecommended
SPF record configuredSometimes
DKIM signing enabled
DMARC policy enforced
Advanced threat protection / link scanning
MFA on email accounts
Staff phishing awareness training
Simulated phishing campaignsRecommended

DMARC, DKIM, and SPF are DNS-based controls that help prevent attackers from spoofing your domain. Microsoft 365 Business Premium includes Defender for Office 365, which adds link and attachment scanning.

Frequently Asked Questions

Strengthen Your Defences Against Phishing

AMVIA can audit your email security configuration, deploy DMARC and advanced threat protection, and run staff phishing simulations. Speak to our team to get started.