Skip to content

Exploring the Evolution and Impact of Phishing Scams Throughout Time

Delve into the origins and evolution of phishing, uncovering its peculiar spelling, its historical growth, the development of tactics, and other captivating elements.

Exploration of Phishing: Methods, Evolution, and Impact
Exploration of Phishing: Methods, Evolution, and Impact

Exploring the Evolution and Impact of Phishing Scams Throughout Time

Phishing scams have evolved over the years, becoming one of the most devastating cyberattacks, causing severe losses for various organizations across sectors. This article delves into the history and evolution of phishing, its impact, and potential solutions to protect your organization.

The first large-scale phishing attack was recorded in the mid-1990s, targeting AOL users with fake messages to steal passwords. One of the earliest and most notable campaigns occurred around 1995, exploiting the trust of AOL users to gain access to their accounts 1.

Phishing gained widespread notice with the Love Bug attack in May 2000, which spread malware and affected mailboxes worldwide. The term "phishing" was coined by hacker Khan C. Smith, inspired by the term "phreaking" 2. The "ph" spelling of phishing is derived from the term "phreaking," which involves fraudulently using an electronic device to avoid paying for telephone calls.

As the internet grew, so did the sophistication of phishing scams. Cybercriminals started adopting HTTPS more often to give users a false sense of security 3. Today, according to Google, 9 in 10 cyberattacks start with a phishing email 4.

Phishing is often the gateway to other cyberattacks like ransomware, business email compromise (BEC), account takeover (ATO), and others. In the 2000s, phishing became more mainstream, with cybercriminals seeking new ways to bypass security measures and a wider awareness of phishing among internet users 5.

The growth of social media offered cybercriminals a treasure trove of sensitive information. Between May 2004 and May 2005, about 1.2 million users in the U.S. suffered losses due to phishing attacks, totaling approximately $929 million 6. Many attackers started using the PowerShell tool to hide malicious scripts in the pixels of benign-looking image files.

One of the first known phishing attacks on eCommerce websites occurred on the E-Gold website in June 2001 7. The phishing email that hacked Hilary Clinton's campaign chairman John Podesta's Gmail account in 2016 was a significant political phishing attack 8.

To combat phishing attacks, solutions like Graphus and Kaseya 365 offer protection for organizations. Graphus is an AI-driven email security solution that blocks phishing attacks before they are seen by employees 9. It deploys to Microsoft 365 and Google Workspace via API, without email traffic rerouting or lengthy installs. Graphus provides intuitive administration and precise reporting to help gain insights into the effectiveness of security, level of risks, attack types, and more 10.

Book a demo of Kaseya 365 to protect your organization from cybercrime 11. By staying vigilant and informed, organizations can mitigate the risks associated with phishing attacks and keep their data secure.

References:

  1. AOL Phishing Scam from 1995
  2. The Origin of Phishing
  3. How HTTPS is Being Used to Trick Users into Phishing Attacks
  4. The Anatomy of a Phishing Attack
  5. The Evolution of Phishing
  6. Phishing Survey: 2005
  7. First Known Phishing Attack on eCommerce Website
  8. How Russian Hackers Compromised Hillary Clinton's Campaign Chair
  9. Graphus: AI-Driven Email Security Solution
  10. Graphus: Administration and Reporting
  11. Book a Demo of Kaseya 365

Read also: