Table of Contents

  1. What Is Phishing and Why It Still Works
  2. Email Phishing
  3. SMS Phishing (Smishing)
  4. Social Media Phishing
  5. Spear Phishing and Whaling
  6. How to Verify URLs and Domains
  7. Reading Email Headers Like a Pro
  8. Password Managers: Your First Line of Defense
  9. Two-Factor Authentication Done Right
  10. How to Report Phishing
  11. Complete Anti-Phishing Checklist

What Is Phishing and Why It Still Works in 2026

Phishing is the act of impersonating a trusted entity -- a bank, a tech company, a government agency, a colleague -- to trick you into revealing sensitive information such as passwords, financial data, or personal details. Despite being one of the oldest types of cybercrime, phishing remains the most successful attack vector in 2026, responsible for over 90% of data breaches worldwide.

The reason phishing endures is simple: it targets the human, not the machine. You can have the most advanced firewall, the most secure operating system, and the strongest encryption in the world, but none of that matters if you hand your credentials to an attacker because you thought you were logging into your real bank account.

Modern phishing has evolved far beyond the poorly written emails of the early 2000s. Today's phishing attacks use AI-generated text that is grammatically perfect and contextually relevant. They clone websites pixel by pixel. They spoof email addresses with surgical precision. They even intercept two-factor authentication codes in real time. The era of spotting phishing by looking for typos is over.

This guide covers every major phishing vector active in 2026, teaches you how to verify the authenticity of communications and websites, and provides concrete tools and practices to make yourself a much harder target. Whether you are protecting personal accounts, cryptocurrency wallets, or corporate systems, these principles apply universally.

The Golden Rule of Phishing Prevention

Never click a link to log in. Instead, always navigate directly to the website by typing the URL in your browser or using a bookmark you created yourself. This single habit defeats the vast majority of phishing attacks.

1. Email Phishing

Email phishing is the most common form of phishing and the one most people think of first. The attacker sends an email that appears to come from a trusted source -- your bank, Amazon, Apple, Microsoft, a crypto exchange -- and attempts to get you to click a link, download an attachment, or reply with sensitive information.

Common Email Phishing Tactics

Account compromise alerts. "We detected suspicious activity on your account. Click here to verify your identity." This creates urgency and fear, overriding critical thinking. The link leads to a cloned login page that captures your credentials.

Payment and invoice scams. "Your payment of $499.99 has been processed. If you did not authorize this transaction, click here to dispute." Victims panicking about an unexpected charge click without thinking and land on a credential harvesting page.

Package delivery notifications. "Your package could not be delivered. Click here to update your shipping information." With the rise of e-commerce, these are extremely effective because most people are expecting a delivery at any given time.

Password reset requests. "Someone requested a password reset for your account. If this was not you, click here to secure your account." Ironic, since clicking the link is what actually compromises the account.

CEO and executive impersonation. Emails appearing to come from a company's CEO asking an employee to wire funds, purchase gift cards, or share sensitive data. These are often well-researched and highly targeted.

How to Identify Phishing Emails

Example: Spotting a Phishing Email

From: [email protected] (notice "app1e" with a number 1 instead of the letter l)

Subject: "Urgent: Your Apple ID has been locked"

Link URL: https://apple-id-verify.suspicious-domain.com/login

Legitimate Apple emails come from @apple.com or @email.apple.com domains and link to apple.com

2. SMS Phishing (Smishing)

Smishing -- SMS phishing -- uses text messages instead of emails to deliver phishing attacks. This vector has exploded in recent years because people tend to trust text messages more than emails, phone screens make it harder to examine URLs, and mobile devices often lack the security tools available on desktops.

Common Smishing Tactics

Bank fraud alerts. "ALERT: Unusual transaction on your account. If you did not make this purchase, call this number or click this link." The link leads to a fake bank login page. The phone number connects to a scammer pretending to be bank support.

Package delivery failures. "UPS: Your package needs updated delivery information. Visit [link]." These messages often include a shortened URL that masks the actual malicious destination.

Tax refund notifications. "IRS: Your refund of $3,247.00 is ready. Verify your identity to receive it: [link]." Government agencies do not communicate refund information via text message.

Crypto exchange alerts. "Coinbase: Withdrawal of 2.5 BTC initiated from your account. If unauthorized, verify here: [link]." This exploits the fear of losing cryptocurrency to drive immediate, unconsidered action.

Multi-factor authentication interception. "Your verification code is 847291. If you did not request this, your account may be compromised. Call [number]." The scammer is attempting to log in to your account in real time and needs the code you just received. They call or text pretending to be support and ask you to read them the code.

How to Protect Against Smishing

3. Social Media Phishing

Social media platforms -- X (Twitter), Instagram, Facebook, LinkedIn, Discord, Telegram -- are prime hunting grounds for phishing attacks. Attackers exploit the social trust inherent in these platforms, where people expect to interact with strangers and are accustomed to clicking links shared by others.

Attack Vectors on Social Media

Fake customer support accounts. When you publicly complain about a service on X, scammers posing as the company's support team immediately DM you with a "help" link. These fake support accounts often have usernames like "@BankSupport_Help" or "@CoinbaseAssist" and may even have a blue checkmark (purchased, not verified).

Compromised accounts sharing malicious links. When a friend or influencer's account is hacked, the attacker posts phishing links to their followers. Because the content comes from a trusted source, engagement rates are dramatically higher than with unknown accounts.

Fake giveaways and contests. "RT and click this link to claim your prize!" These are especially prevalent in the crypto space, where fake giveaways impersonate major projects and personalities. The "claim" page is a wallet-draining contract or credential harvesting site.

LinkedIn job scams. Fake recruiters offer attractive job opportunities and direct victims to fill out "application forms" that collect personal information, or to download "job description" files that contain malware.

Discord and Telegram bot phishing. Malicious bots in crypto Discord servers and Telegram groups post fake announcements about airdrops, token migrations, or security updates. These messages include links to phishing sites designed to steal wallet credentials or trick users into signing malicious transactions.

Protection Strategies

4. Spear Phishing and Whaling

While standard phishing casts a wide net, spear phishing is a targeted attack aimed at a specific individual or organization. Whaling is the subset that targets high-value individuals -- C-suite executives, crypto whale wallets, or high-net-worth individuals. These attacks are meticulously researched, highly personalized, and devastatingly effective.

A spear phishing email might reference your real colleagues by name, mention a project you are actually working on, or cite a real event you recently attended. The attacker has done their homework -- often spending days or weeks gathering information from LinkedIn, social media, corporate websites, and data breaches -- to craft a message that is nearly impossible to distinguish from a legitimate communication.

How Spear Phishing Attacks Are Crafted

  1. Reconnaissance. The attacker identifies the target and gathers information from public sources: LinkedIn profile, company website, social media, conference attendance, published articles, and data from previous breaches.
  2. Pretext creation. Using the gathered intelligence, the attacker crafts a believable scenario. For example, an email from a known business partner referencing a real ongoing project and attaching a "contract revision" that is actually malware.
  3. Delivery. The message is sent from a spoofed email address that closely mimics a trusted contact, or from a compromised legitimate account. The technical headers may even pass basic email authentication checks.
  4. Exploitation. The target, believing the message is legitimate because it contains accurate personal and contextual details, clicks the link or opens the attachment. Credentials are stolen, malware is installed, or funds are transferred.

Defense Against Spear Phishing

5. How to Verify URLs and Domains

The ability to read and verify URLs is perhaps the single most important anti-phishing skill you can develop. Every phishing attack ultimately relies on directing you to a malicious URL. If you can reliably distinguish real URLs from fake ones, you are immune to the vast majority of phishing attempts.

Anatomy of a URL

Understanding URL structure is essential. Consider: https://accounts.google.com/signin/v2/identifier

The critical skill is identifying the actual domain. The domain is the last two parts before the first single forward slash. In https://accounts.google.com/login, the domain is google.com. Everything before it (accounts.) is a subdomain controlled by the domain owner.

Common URL Tricks Used by Phishers

URL Spoofing Techniques

https://google.com.evil-site.net/login -- The domain is evil-site.net, NOT google.com. The "google.com" part is just a subdomain.

https://g00gle.com/login -- Uses zeros instead of the letter "o" (homoglyph attack).

https://google.corn/login -- Uses "rn" which looks like "m" in many fonts.

https://accounts-google.com/login -- A hyphenated variant. The domain is "accounts-google.com", not "google.com".

https://[email protected]/login -- Uses the @ symbol to make "google.com" appear as a username, while the actual destination is "evil-site.net".

Always read the domain from right to left, starting at the first single /

Verification Steps

  1. Read the domain carefully. Start from the rightmost part of the hostname (before the first /) and work left. The last two segments (e.g., "google.com") are the actual domain.
  2. Check for homoglyphs. Letters that look similar in certain fonts: l/I/1, O/0, rn/m, vv/w. Zoom in if necessary.
  3. Look up the domain. Use WHOIS (who.is) to check when the domain was registered and who owns it. Phishing domains are typically very new.
  4. Check the SSL certificate. Click the padlock icon in your browser. Verify the certificate was issued to the expected organization.
  5. Use VirusTotal. Paste any suspicious URL into virustotal.com to check it against dozens of security databases.

6. Reading Email Headers Like a Pro

Email headers contain the technical metadata of a message -- where it actually came from, which servers handled it, and whether authentication checks passed or failed. Learning to read headers is an advanced but powerful anti-phishing skill.

Key Header Fields to Check

Return-Path and Envelope-From. These show the actual sending address, which may differ from the "From" address displayed in your email client. If the Return-Path domain does not match the From domain, the email is likely spoofed.

SPF (Sender Policy Framework). Look for Received-SPF: pass or spf=pass in the Authentication-Results header. SPF verifies that the sending server is authorized to send email for the claimed domain. A "fail" or "softfail" is a strong indicator of spoofing.

DKIM (DomainKeys Identified Mail). Look for dkim=pass in Authentication-Results. DKIM verifies that the email content has not been tampered with and was signed by the claimed domain's key.

DMARC (Domain-based Message Authentication, Reporting & Conformance). Look for dmarc=pass. DMARC ties SPF and DKIM together and tells receiving servers how to handle messages that fail authentication.

Received headers. These show the path the email took from sender to recipient. Read them from bottom to top (bottom is the originating server). Unusual routing through unexpected countries or unknown servers is suspicious.

How to View Email Headers

7. Password Managers: Your First Line of Defense

A password manager is one of the most effective anti-phishing tools available, and most people do not realize why. The obvious benefit is generating and storing strong, unique passwords. But the anti-phishing benefit is even more important: a password manager will not autofill your credentials on a phishing site.

When you save credentials for google.com in your password manager, it associates those credentials with that exact domain. If you land on g00gle.com or google.com.evil-site.net, the password manager will not offer to fill in your Google credentials because the domain does not match. This is an automatic, foolproof phishing detection mechanism that works even when your eyes are deceived.

How to Use Password Managers Effectively

Pro Tip: The Autofill Test

If you arrive at a login page and your password manager does not offer to autofill your credentials, stop. This may mean you are on the wrong site. Verify the URL character by character before entering anything manually.

8. Two-Factor Authentication Done Right

Two-factor authentication (2FA) adds a second layer of security beyond your password. But not all 2FA is created equal, and some forms provide significantly more protection against phishing than others.

Types of 2FA, Ranked by Security

1. Hardware security keys (FIDO2/WebAuthn) -- Best. Physical devices like YubiKey or Google Titan that you plug in or tap to authenticate. These are the gold standard because they are phishing-resistant by design. The key cryptographically verifies the domain of the site you are authenticating with. If you are on a phishing site, the key will not authenticate, period. No user error can override this protection.

2. Authenticator apps (TOTP) -- Good. Apps like Google Authenticator, Authy, or the authenticator built into your password manager generate time-based one-time codes. These are significantly better than SMS because they cannot be intercepted through SIM swapping. However, they are still vulnerable to real-time phishing attacks using tools like Evilginx, where the attacker proxies your session and captures the TOTP code as you enter it.

3. Push notifications -- Acceptable. Services like Duo or Microsoft Authenticator that send a push to your phone asking you to approve or deny the login. Vulnerable to "MFA fatigue" attacks where the attacker repeatedly triggers push notifications until the victim approves one out of frustration or confusion.

4. SMS codes -- Poor. One-time codes sent via text message. Vulnerable to SIM swapping (where an attacker convinces your carrier to transfer your phone number to their SIM), SS7 protocol exploits, and social engineering of carrier support staff. Never use SMS 2FA for cryptocurrency accounts or any high-value account.

2FA Best Practices

9. How to Report Phishing

Reporting phishing attacks serves two purposes: it helps take down phishing infrastructure and prevents other people from falling victim. Every report matters.

Where to Report

What to Include in a Report

Complete Anti-Phishing Checklist

Your Anti-Phishing Security Checklist

Protect Yourself and Others

Report suspicious sites, verify before you click, and share this guide with anyone who needs it. Check scam.ink to search our scam database.

Search Scam Database Follow @SpunkArt13

"Phishing does not exploit software vulnerabilities. It exploits human trust. The only patch is education." -- @SpunkArt13