Home Page Navigation Contents Contact Sitemap Search

Beware of HTML phishing

There is currently a particularly treacherous type of phishing doing the rounds – HTML Phishing. Unlike classic phishing attacks, the faked login-page employed is embedded directly into an HTML attachment.

This is how HTML phishing works

In contrast to an usual phishing attack, e-mails contain an attached HTML file in these cases. Once opened, your browser will display a professionally designed and very credible-looking website. Users are then asked to enter their credentials here. In reality though, data are transferred straight to the attackers. In addition, such HTML files might contain scripts causing additional damage to your device.

HTML phishing is particularly dangerous because the fake website is opened locally and there is no typical web address shown in the browser bar. Many security filters have difficulty recognising HTML attachments, and their professional appearance considerably increases the message’s credibility.

How to protect yourself

Make sure to always remain sceptical if you receive any unexpected HTML attachments. Credentials should only be entered on well-known, secure websites. In case of doubt, we recommend you check a message is authentic using official contact channels.

HTML phishing has been developed from classic phishing attacks and is particularly treacherous due to them combining visual authenticity with psychological pressure. Alertness, caution and consistent action are the most important means to preventing such attacks.

Further information (on other phishing variations, too) can be found here.

What else would you like to learn about security when e-banking?

Register for a course now
and learn more:

Basic course

Find out about current Internet threats and some easy protective measures, and how to securely use e-banking.

further information

Course mobile banking/payments

Find out about mobile banking, mobile payments and how to securely use these apps.

further information

Course on cryptocurrencies

Cryptocurrency beginner? Find out about the most popular cryptocurrencies and the Blockchain technology behind them.

further information

Course Artificial Intelligence

Find out know how AI works, where it is being used and the opportunities and also the risks it entails – and how to protect yourself.

further information