फ़िशिंग और क्रेडेंशियल चोरी
Deceptive emails, messages, and websites designed to steal login credentials and sensitive information
Overview
This complete guide covers every variant of फ़िशिंग और क्रेडेंशियल चोरी that ScamLens analysts have catalogued. Each entry below links to a detailed breakdown of tactics, identification signs, and step-by-step protection. Use the cross-reference to choose the most relevant scenario, or report a suspicious site directly through the verification box.
Risk Level Distribution
All Scam Types in This Category
DNS Hijacking Scams: How Attackers Redirect Your Traffic
CriticalAttackers manipulate domain settings to redirect website visitors to fraudulent sites, stealing credentials and payment information.
Email Account Compromise (EAC): How Hackers Hijack Your Inbox
CriticalCybercriminals gain unauthorized access to email accounts to steal data, impersonate victims, and defraud contacts for financial gain.
Man-in-the-Middle Attack: Complete Protection Guide
CriticalCybercriminals intercept communications between you and legitimate services to steal credentials, financial data, and personal information.
Pharming (DNS Redirect) Scam: Complete Protection Guide
CriticalPharming attacks redirect your web traffic to fraudulent sites without your knowledge, stealing credentials and financial data.
SIM Swapping Scams: Complete Protection Guide
CriticalCriminals hijack your phone number to steal money, cryptocurrency, and personal accounts by transferring your number to their device.
Spear Phishing Attacks: Targeted Email Fraud Explained
CriticalHighly personalized email attacks using researched information to trick specific individuals into revealing credentials or transferring funds.
Whaling Attacks: How Executives Lose Millions to Targeted Phishing
CriticalSophisticated phishing attacks targeting C-suite executives and high-level decision-makers to steal credentials or authorize fraudulent wire transfers.
Browser-in-Browser Attack: The Invisible Phishing Threat
High RiskSophisticated phishing technique that creates fake browser login windows to steal credentials from unsuspecting users.
Calendar Invite Phishing: How Scammers Exploit Your Schedule
MediumFraudsters send malicious calendar invitations containing phishing links or fake meeting requests to steal credentials and sensitive data.
Clone Phishing: When Legitimate Emails Turn Dangerous
High RiskScammers duplicate legitimate emails from trusted sources, replacing links with malicious ones to steal credentials and financial data.
Credential Stuffing Attacks: How Hackers Exploit Your Passwords
High RiskCredential stuffing attacks exploit leaked passwords to break into your accounts. Learn how to identify and prevent this rapidly growing threat.
Evil Twin WiFi Attack: How Fake Hotspots Steal Your Data
High RiskScammers create fake WiFi networks that mimic legitimate hotspots to intercept your passwords, financial data, and personal information.
OAuth Consent Phishing: Identity Theft Through App Permissions
High RiskCybercriminals trick victims into granting malicious apps access to email, cloud storage, and corporate systems through legitimate OAuth screens.
Quishing (QR Code Phishing): A Complete Protection Guide
High RiskScammers use fake QR codes to steal credentials, payment info, and personal data by redirecting victims to malicious websites.
Search Engine Phishing (SEO Poisoning): Complete Guide
High RiskScammers manipulate search results to lure victims to fake websites that steal credentials, financial data, or install malware.
Session Hijacking Scams: Stealing Active Logins
High RiskAttackers intercept your active login sessions to access accounts without needing your password, often going undetected for days.
Smishing (SMS Phishing): Text Message Scams Explained
High RiskFraudulent text messages designed to steal personal information, passwords, and financial data through deceptive links and urgent requests.
Vishing (Voice Phishing): Phone Scams That Steal Your Data
High RiskFraudulent phone calls impersonating legitimate organizations to steal personal information, credentials, and money through social engineering.
Universal Protection Steps
- 1 Verify the domain or wallet address through ScamLens before paying or signing in.
- 2 Confirm the company's legal entity using government registries (SEC, Companies House, NAFMII, etc.).
- 3 Never share OTPs, seed phrases, or remote-access codes — no legitimate party will ask for them.
- 4 Slow down: every legitimate process tolerates a 24-hour cooling-off period.
- 5 If money has already moved, contact your bank, exchange, and local cybercrime unit within the first 6 hours.
Where to Report — भारत
राष्ट्रीय साइबर अपराध रिपोर्टिंग पोर्टल
गृह मंत्रालय का साइबर अपराध हेल्पलाइन (1930) और रिपोर्टिंग पोर्टल।
RBI Sachet (वित्तीय धोखाधड़ी)
भारतीय रिजर्व बैंक का अनधिकृत संस्थाओं की रिपोर्ट के लिए पोर्टल।
Verify a website or wallet
Related Categories
निवेश और वित्तीय धोखाधड़ी
20 scam types covered
क्रिप्टोकरेंसी और Web3 धोखाधड़ी
18 scam types covered
रोमांस और सोशल इंजीनियरिंग धोखाधड़ी
14 scam types covered
शॉपिंग और ई-कॉमर्स धोखाधड़ी
15 scam types covered
रोजगार और व्यापार धोखाधड़ी
14 scam types covered
सरकारी और अधिकारी प्रतिरूपण
12 scam types covered