

It is useful to be familiar with a few of these vectors of phishing attacks to be able to identify them. In this article we will see a little-known method to steal credentials on Facebook and Google based on a famous hacking tool called SET toolkit (Social engineering Toolkit) combined with the multiplatform tunneling Ngrok. Once you enter your credentials on them, they will collect and take advantage from them. Attackers tend to create fake websites that are virtually identical to the legitimate ones. One of the most common vectors in this kind of cyber-attack is targeting Facebook and Google accounts by sending a suspicious message or link that asks for a personal information (such as an email, a phone number or a password). Most of the times, the attacker tricks the victims by posing as a reputable source or an important institution they are familiar with. These attacks attempt to gain an access to personal accounts and information.

Phishing attacks are typically in form of malicious emails or fake websites.
