ScamLens

फ़िशिंग और क्रेडेंशियल चोरी

Deceptive emails, messages, and websites designed to steal login credentials and sensitive information

18 scam types covered

Overview

This complete guide covers every variant of फ़िशिंग और क्रेडेंशियल चोरी that ScamLens analysts have catalogued. Each entry below links to a detailed breakdown of tactics, identification signs, and step-by-step protection. Use the cross-reference to choose the most relevant scenario, or report a suspicious site directly through the verification box.

Risk Level Distribution

Critical
7
39%
High Risk
10
56%
Medium
1
6%
Low
0
0%

All Scam Types in This Category

DNS Hijacking Scams: How Attackers Redirect Your Traffic

Critical

Attackers manipulate domain settings to redirect website visitors to fraudulent sites, stealing credentials and payment information.

Read full guide →

Email Account Compromise (EAC): How Hackers Hijack Your Inbox

Critical

Cybercriminals gain unauthorized access to email accounts to steal data, impersonate victims, and defraud contacts for financial gain.

Read full guide →

Man-in-the-Middle Attack: Complete Protection Guide

Critical

Cybercriminals intercept communications between you and legitimate services to steal credentials, financial data, and personal information.

Read full guide →

Pharming (DNS Redirect) Scam: Complete Protection Guide

Critical

Pharming attacks redirect your web traffic to fraudulent sites without your knowledge, stealing credentials and financial data.

Read full guide →

SIM Swapping Scams: Complete Protection Guide

Critical

Criminals hijack your phone number to steal money, cryptocurrency, and personal accounts by transferring your number to their device.

Read full guide →

Spear Phishing Attacks: Targeted Email Fraud Explained

Critical

Highly personalized email attacks using researched information to trick specific individuals into revealing credentials or transferring funds.

Read full guide →

Whaling Attacks: How Executives Lose Millions to Targeted Phishing

Critical

Sophisticated phishing attacks targeting C-suite executives and high-level decision-makers to steal credentials or authorize fraudulent wire transfers.

Read full guide →

Browser-in-Browser Attack: The Invisible Phishing Threat

High Risk

Sophisticated phishing technique that creates fake browser login windows to steal credentials from unsuspecting users.

Read full guide →

Calendar Invite Phishing: How Scammers Exploit Your Schedule

Medium

Fraudsters send malicious calendar invitations containing phishing links or fake meeting requests to steal credentials and sensitive data.

Read full guide →

Clone Phishing: When Legitimate Emails Turn Dangerous

High Risk

Scammers duplicate legitimate emails from trusted sources, replacing links with malicious ones to steal credentials and financial data.

Read full guide →

Credential Stuffing Attacks: How Hackers Exploit Your Passwords

High Risk

Credential stuffing attacks exploit leaked passwords to break into your accounts. Learn how to identify and prevent this rapidly growing threat.

Read full guide →

Evil Twin WiFi Attack: How Fake Hotspots Steal Your Data

High Risk

Scammers create fake WiFi networks that mimic legitimate hotspots to intercept your passwords, financial data, and personal information.

Read full guide →

OAuth Consent Phishing: Identity Theft Through App Permissions

High Risk

Cybercriminals trick victims into granting malicious apps access to email, cloud storage, and corporate systems through legitimate OAuth screens.

Read full guide →

Quishing (QR Code Phishing): A Complete Protection Guide

High Risk

Scammers use fake QR codes to steal credentials, payment info, and personal data by redirecting victims to malicious websites.

Read full guide →

Search Engine Phishing (SEO Poisoning): Complete Guide

High Risk

Scammers manipulate search results to lure victims to fake websites that steal credentials, financial data, or install malware.

Read full guide →

Session Hijacking Scams: Stealing Active Logins

High Risk

Attackers intercept your active login sessions to access accounts without needing your password, often going undetected for days.

Read full guide →

Smishing (SMS Phishing): Text Message Scams Explained

High Risk

Fraudulent text messages designed to steal personal information, passwords, and financial data through deceptive links and urgent requests.

Read full guide →

Vishing (Voice Phishing): Phone Scams That Steal Your Data

High Risk

Fraudulent phone calls impersonating legitimate organizations to steal personal information, credentials, and money through social engineering.

Read full guide →

Universal Protection Steps

  1. 1 Verify the domain or wallet address through ScamLens before paying or signing in.
  2. 2 Confirm the company's legal entity using government registries (SEC, Companies House, NAFMII, etc.).
  3. 3 Never share OTPs, seed phrases, or remote-access codes — no legitimate party will ask for them.
  4. 4 Slow down: every legitimate process tolerates a 24-hour cooling-off period.
  5. 5 If money has already moved, contact your bank, exchange, and local cybercrime unit within the first 6 hours.

Where to Report — भारत

राष्ट्रीय साइबर अपराध रिपोर्टिंग पोर्टल

गृह मंत्रालय का साइबर अपराध हेल्पलाइन (1930) और रिपोर्टिंग पोर्टल।

CERT-In

इलेक्ट्रॉनिक्स एवं सूचना प्रौद्योगिकी मंत्रालय के तहत साइबर सुरक्षा एजेंसी।

राष्ट्रीय उपभोक्ता हेल्पलाइन

उपभोक्ता मामलों के विभाग द्वारा संचालित शिकायत हेल्पलाइन।

RBI Sachet (वित्तीय धोखाधड़ी)

भारतीय रिजर्व बैंक का अनधिकृत संस्थाओं की रिपोर्ट के लिए पोर्टल।

Verify a website or wallet

Related Categories