Pretexting

[2] [4] [11] [12] [13] [14] [17]

In such an attack, the attacker creates scenarios to engage the victim in divulging personal information. For example, the pretext might be winning the lottery, emergency help for a friend, need to pay tax or an offer of free service or job.

Water holing

[2] [7] [10] [11] [12] [17]

In this attack, attackers compromise a site that the victim visits very frequently, rather than targeting the victim directly.

Pop-up window

[3] [13] [14]

In such an attack, a pop-up window will appear on the victim’s screen repeatedly informing about the connection lost or alert about the virus detection. Victim when reacts to pop-up windows, malicious program is executed that forwards login details to attackers.