Content:

Who is the Fisher

Fisher - this is a scammer specializing in special kind of cybercrime - phishing. The task of the offender is to collect personal data of users by inventing various tricks. The activity of phishers in meaning is close to scammers' scams, using a variety of tricks that take out information from subscribers, and also resembles fishing using bait, which is reflected in the term phisher.

Standard Fisher Fraud Scheme:

  • creating a copy of the popular site or him pages using a similar domain name;
  • adding a data capture form to a fake site;
  • mailing messages by email, SMS, chat in instant messengers, messages in social networks or push notifications containing text calling to go by link to a fake page of the site and fill out the form.

The reason for the user to go to the link may be the promotion, winnings, urgent help, the need to confirm the data after updating the system, etc.

кто такой фишер картинка

Most often, phishers request the following information.:

  • login and password for login;
  • passport details;
  • contacts;
  • details of payment cards and accounts.

This data is subsequently used by intruders for sale, mass mailing spam on social networks, transferring funds to third-party accounts, concluding financial transactions on behalf of the user.

Sometimes a user is required to download a file with a malware that reads and redirects user data or infects the system viruses.

Get a free consultation from an SEO expert on your site

How to recognize the work of a Fisher

Usually, in newsletters, scammers, as in the case of telephone fraud, try to intimidate or influence greed. The goal is to lull vigilance and motivate for instant action.. Such messages most often distinguish urgency, surprise, incredible profitability of the offer. In case of attempts to motivate fear, stories about problems with relatives, attempts to secure information or money are invented. 

Fisher protection methods

Only users themselves can protect themselves from attacks by phishers. Stick to such recommendations:

  1. Do not click on suspicious buttons and links.
  2. Check the correct URL site and availability secure protocol https.
  3. Regularly update browser and use additional software tools.