This timeline slide outlines the phishing kill chain in five phases: Recon (target research via social media or breaches), Weaponize (crafting deceptive emails/SMS/sites), and Deliver (distribution via email, texts, or calls). It continues with Exploit (victim clicks or enters credentials) and Install & Actions (malware deployment for data theft or ransomware).
How Phishing Works (Kill Chain)
Phase 1: Recon: Target Research Attacker gathers intel on victims via social media, company sites, or data breaches for targeted attacks. Phase 2: Weaponize: Craft Lure Create deceptive email, SMS, or site with malicious links, attachments, or forms to trick users. Phase 3: Deliver: Email/SMS Distribute phishing payload through email, text messages, calls, or compromised legitimate services. Phase 4: Exploit: Victim Click Target interacts by clicking links, downloading files, or entering credentials, activating the exploit. Phase 5: Install & Actions: Malware Malware deploys on device; attacker steals data, deploys ransomware, or gains persistent access.
Source: Phishing Attacks & Cyber Awareness - Dixit Thummar
Speaker Notes
Explain the sequential phases of the phishing kill chain. Highlight prevention opportunities at each stage to engage the audience.