www.dnsbelgium.be
Open in
urlscan Pro
2a02:e980:8f::2a
Public Scan
Submitted URL: https://www.dnsbelgium.be/phishing
Effective URL: https://www.dnsbelgium.be/en/smart-online/12-phishing-methods
Submission: On November 27 via api from BE — Scanned from DE
Effective URL: https://www.dnsbelgium.be/en/smart-online/12-phishing-methods
Submission: On November 27 via api from BE — Scanned from DE
Form analysis
6 forms found in the DOM<form>
<fieldset>
<legend class="visuallyhidden">Consent Selection</legend>
<div id="CybotCookiebotDialogBodyFieldsetInnerContainer">
<div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonNecessary"><strong
class="CybotCookiebotDialogBodyLevelButtonDescription">Necessary</strong></label>
<div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper CybotCookiebotDialogBodyLevelButtonSliderWrapperDisabled"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessary"
class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
</div>
<div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonPreferences"><strong
class="CybotCookiebotDialogBodyLevelButtonDescription">Preferences</strong></label>
<div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferences" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
data-target="CybotCookiebotDialogBodyLevelButtonPreferencesInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
</div>
<div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonStatistics"><strong
class="CybotCookiebotDialogBodyLevelButtonDescription">Analytics</strong></label>
<div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatistics" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
data-target="CybotCookiebotDialogBodyLevelButtonStatisticsInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
</div>
<div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonMarketing"><strong
class="CybotCookiebotDialogBodyLevelButtonDescription">Marketing</strong></label>
<div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketing" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
data-target="CybotCookiebotDialogBodyLevelButtonMarketingInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
</div>
</div>
</fieldset>
</form>
<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessaryInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span
class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>
<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferencesInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonPreferences"
checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>
<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatisticsInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonStatistics"
checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>
<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketingInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonMarketing" checked="checked"
tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>
<form class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyContentCheckboxPersonalInformation" class="CybotCookiebotDialogBodyLevelButton"> <span
class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>
Text Content
* Consent * Details * [#IABV2SETTINGS#] * About THIS WEBSITE USES COOKIES We use cookies to personalise content, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. Consent Selection Necessary Preferences Analytics Marketing Show details * Necessary 19 Necessary cookies help make a website usable by enabling basic functions like page navigation, language choice and access to secure areas of the website. The website cannot function properly without these cookies. * Cookiebot 1 Learn more about this provider 1.gifUsed to count the number of sessions to the website, necessary for optimizing CMP product delivery. Maximum Storage Duration: SessionType: Pixel Tracker * Fwebservices.be 2 Learn more about this provider laravel_session [x2]This cookie is used internally by the website’s owners, when uploading or renewing website content. Maximum Storage Duration: 1 dayType: HTTP Cookie * LinkedIn 2 Learn more about this provider bcookieUsed in order to detect spam and improve the website's security. Maximum Storage Duration: 1 yearType: HTTP Cookie li_gcStores the user's cookie consent state for the current domain Maximum Storage Duration: 180 daysType: HTTP Cookie * Matomo 1 Learn more about this provider mtm_cookie_consentDetermines whether the user has accepted the cookie consent box. Maximum Storage Duration: SessionType: HTTP Cookie * New Relic 1 Learn more about this provider JSESSIONIDPreserves users states across page requests. Maximum Storage Duration: SessionType: HTTP Cookie * Vimeo 2 Learn more about this provider __cf_bmThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website. Maximum Storage Duration: 1 dayType: HTTP Cookie _cfuvidThis cookie is a part of the services provided by Cloudflare - Including load-balancing, deliverance of website content and serving DNS connection for website operators. Maximum Storage Duration: SessionType: HTTP Cookie * dnsbelgium.be 3 incap_ses_#Preserves users states across page requests. Maximum Storage Duration: SessionType: HTTP Cookie nlbi_#Used to ensure website security and fraud detection. Maximum Storage Duration: SessionType: HTTP Cookie visid_incap_#Preserves users states across page requests. Maximum Storage Duration: 1 yearType: HTTP Cookie * survey.dnsbelgium.be 4 _uuidStores the white label domain to speed up the start-up process of the app, skipping the white label domain verification that happens on the first visit (or when this cookie is not present). Maximum Storage Duration: PersistentType: HTML Local Storage raygun4js-useridThis cookie is used to detect errors on the website - this information is sent to the website's support staff in order to optimize the visitor's experience on the website. Maximum Storage Duration: PersistentType: HTML Local Storage sa_whitelabel_survey_dnsbelgium_beUsed to indicate and recognize the device for raygun handling, the value used for recognition comes from the API. This is meant for error handling. Maximum Storage Duration: PersistentType: HTML Local Storage saAppInfoUsed to store the application version, to verify the appversion used is the most recent release. The data stored is coming from the API. Maximum Storage Duration: PersistentType: HTML Local Storage * survey.dnsbelgium.be consent.cookiebot.com 2 CookieConsent [x2]Stores the user's cookie consent state for the current domain Maximum Storage Duration: 1 yearType: HTTP Cookie * www.dnsbelgium.be 1 DNSBELGIUM_LANGUAGEThis cookie remembers the language you chose for our website to be displayed in. Maximum Storage Duration: 1 yearType: HTTP Cookie * Preferences 1 Preference cookies enable a website to remember information that changes the way the website behaves or looks, like the region that you are in. * LinkedIn 1 Learn more about this provider lidcRegisters which server-cluster is serving the visitor. This is used in context with load balancing, in order to optimize user experience. Maximum Storage Duration: 1 dayType: HTTP Cookie * Analytics 1 Analytical cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously. * Vimeo 1 Learn more about this provider vuidCollects data on the user's visits to the website, such as which pages have been read. Maximum Storage Duration: 2 yearsType: HTTP Cookie * Marketing 22 Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers. * Meta Platforms, Inc. 3 Learn more about this provider lastExternalReferrerDetects how the user reached the website by registering their last URL-address. Maximum Storage Duration: PersistentType: HTML Local Storage lastExternalReferrerTimeDetects how the user reached the website by registering their last URL-address. Maximum Storage Duration: PersistentType: HTML Local Storage _fbpUsed by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers. Maximum Storage Duration: 3 monthsType: HTTP Cookie * Google 2 Learn more about this provider Some of the data collected by this provider is for the purposes of personalization and measuring advertising effectiveness. _gcl_auUsed by Google AdSense for experimenting with advertisement efficiency across websites using their services. Maximum Storage Duration: 3 monthsType: HTTP Cookie NIDRegisters a unique ID that identifies a returning user's device. The ID is used for targeted ads. Maximum Storage Duration: 6 monthsType: HTTP Cookie * YouTube 16 Learn more about this provider #-#Used to track user’s interaction with embedded content. Maximum Storage Duration: SessionType: HTML Local Storage iU5q-!O9@$Registers a unique ID to keep statistics of what videos from YouTube the user has seen. Maximum Storage Duration: SessionType: HTML Local Storage LAST_RESULT_ENTRY_KEYUsed to track user’s interaction with embedded content. Maximum Storage Duration: SessionType: HTTP Cookie nextIdUsed to track user’s interaction with embedded content. Maximum Storage Duration: SessionType: HTTP Cookie requestsUsed to track user’s interaction with embedded content. Maximum Storage Duration: SessionType: HTTP Cookie yt.innertube::nextIdRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Maximum Storage Duration: PersistentType: HTML Local Storage yt.innertube::requestsRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Maximum Storage Duration: PersistentType: HTML Local Storage ytidb::LAST_RESULT_ENTRY_KEYUsed to track user’s interaction with embedded content. Maximum Storage Duration: PersistentType: HTML Local Storage YtIdbMeta#databasesUsed to track user’s interaction with embedded content. Maximum Storage Duration: PersistentType: IndexedDB yt-remote-cast-availableStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: SessionType: HTML Local Storage yt-remote-cast-installedStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: SessionType: HTML Local Storage yt-remote-connected-devicesStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: PersistentType: HTML Local Storage yt-remote-device-idStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: PersistentType: HTML Local Storage yt-remote-fast-check-periodStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: SessionType: HTML Local Storage yt-remote-session-appStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: SessionType: HTML Local Storage yt-remote-session-nameStores the user's video player preferences using embedded YouTube video Maximum Storage Duration: SessionType: HTML Local Storage * www.dnsbelgium.be 1 ___utmvcCollects information on user behaviour on multiple websites. This information is used in order to optimize the relevance of advertisement on the website. Maximum Storage Duration: 1 dayType: HTTP Cookie * Unclassified 0 Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. We do not use cookies of this type. Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#] List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#] Cookie declaration last updated on 23.11.24 by Cookiebot [#IABV2_TITLE#] [#IABV2_BODY_INTRO#] [#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#] [#IABV2_BODY_PREFERENCE_INTRO#] [#IABV2_LABEL_PURPOSES#] [#IABV2_BODY_PURPOSES_INTRO#] [#IABV2_BODY_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_BODY_FEATURES_INTRO#] [#IABV2_BODY_FEATURES#] [#IABV2_LABEL_PARTNERS#] [#IABV2_BODY_PARTNERS_INTRO#] [#IABV2_BODY_PARTNERS#] Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages. You can at any time change or withdraw your consent from the Cookie Declaration on our website. Learn more about who we are, how you can contact us and how we process personal data in our Privacy Statement. Please state your consent ID and date when you contact us regarding your consent. Do not sell or share my personal information Deny Allow selection Customize Allow all DNS Belgium Menu * Your domain name * Register * Manage * Secure * Smart online Search * About DNS Belgium * News * Contact * For registrars * Statistics * Working with us English * English * Nederlands * Français test Safe on the internet Open submenu Close submenu * 12 phishing methods * Fake webshops * Online fraude * Partners * More items … * 12 phishing methods * Fake webshops * Online fraude * Partners * The 12 most common phishing methods * 1. e-mail spoofing * 2. URL Phishing * 3. Clone phishing * 4. Invoice phishing * 5. Phishing by shared documents * 6. Phishing by smartphone app * 7. Phishing by pop-up * 8. Phishing by search engine * 9. Phishing by bypassing filters * 10. Catphishing * 11. Business Email Compromise * 12. The "Nigerian Prince" scam * What is phishing and how do you protect yourself against it? 12 PHISHING METHODS * The 12 most common phishing methods * 1. e-mail spoofing * 2. URL Phishing * 3. Clone phishing * 4. Invoice phishing * 5. Phishing by shared documents * 6. Phishing by smartphone app * 7. Phishing by pop-up * 8. Phishing by search engine * 9. Phishing by bypassing filters * 10. Catphishing * 11. Business Email Compromise * 12. The "Nigerian Prince" scam * What is phishing and how do you protect yourself against it? There are several forms of phishing . However, it always boils down to the same thing: a third party tries to get personal information from you - passwords, credit card numbers, etc. THE 12 MOST COMMON PHISHING METHODS 1. E-MAIL SPOOFING How does it work? The criminal uses a fake e-mail address. This makes it look like the email is from someone you know or a company you are a customer of. The criminal then asks you to click on a link, and/or log on to a site and take a particular action, such as sharing a file. Here's how to avoid it: check to see if your name is listed as the recipient, or if there are many others you don't know. If you are or not a customer of the company in question, or maybe not with that email address? In these cases, avoid following the instructions. 2. URL PHISHING How does it work? The fraudster sends you, by way of a message or an e-mail, a web address (URL) which at first sight may seem reliable. Behind the link you will find a completely different address... One of the following techniques can be used for this: * The phisher hides the address behind a "Click here" or "Subscribe" button * You can't read the web address, because it is shortened by a special program, it can look like this for example t.co/xz92drTT92 * The web address contains the name of a known company, but is misspelled, e.g. citiibank.com instead of citibank.com * The fraudster plays around with similar looking letters, such as arnazon.com instead of amazon.com, or Faceb00k.com instead of Facebook.com * The domain name looks legitimate, but is in fact a sub-domain of another domain name, for example https://inlog.dnsbelgium.be.trading.be/inlog. Here, the real domain name is trading.be, and dnsbelgium.be is a subdomain of trading.be Here's how to avoid it: check the address before clicking on a link. * Place your cursor over the link. The full link will appear on the screen. * On a mobile device, long press on the link, the whole link will pop up on the screen. * You can also right-click and copy the link to your notes. * Check the domain name. Read from right to left - the combination of words BEFORE the / is the domain extension, to the left of that you have the domain name. If it's before that it's a sub-domain. 3. CLONE PHISHING How does it work? Criminals create a perfect copy, or clone, of an email you are used to receiving, such as your credit card payment statement. They replace the link in the email with a link to their fraudulent website, or the attachment with a file containing a virus, ransomware, or spyware. Here's how to avoid it: Don't react to the e-mail if the sender's address deviates from the norm, if there are spelling mistakes in the e-mail or if the message was sent at an unusual time. 4. INVOICE PHISHING How does it work? The criminal sends you a message by email or text message, notifying you that you need to make an urgent payment on a particular account number. Often the message will contain a link to pay directly online. Some examples of messages that have been circulating recently: * Bpost will notify you that your parcel cannot be delivered until additional costs are paid. * A bailiff notifies you that you have forgotten to pay a tax, and that you must pay it urgently to the collection agency. * A French collection agency tells you that you have committed an offence in France and that they have been instructed to collect the fine. Here's how to avoid it: Check the facts. Were you really in France on the date in the message? What tax is involved? Were you really expecting a parcel from Bpost? 5. PHISHING BY SHARED DOCUMENTS How does it work? The fraudsters send you a well-written message that your colleague has shared a document with you via Dropbox, OneDrive or WeTransfer. If you click on the link in the message, you will land on a website copied from the service in question. The site asks for your name and password from the service in question, or from your Microsoft365 account. Here's how to avoid it: Don't give your name and password. Normally you are logged in to these services on your computer all the time. Not sure? Contact your colleague and check whether he or she has sent you a document. 6. PHISHING BY SMARTPHONE APP How does it work? Fraudsters develop a simple application, but add in the small print that the application must also have access to data in your cloud. You potentially keep your address book (names, phone numbers, email addresses) there. With this data fraudsters can attack your contacts. Here's how to avoid it: Only download applications from official services. Look at the reviews before installing the application. If the application asks for access to your personal data, your contacts, your location, check if this access is really necessary for the application to work. 7. PHISHING BY POP-UP How does it work? You are visiting a normal website. Suddenly, a pop-up appears with the message that you need a particular software for your video for example. If you click on it, the software starts downloading. In Malvertising this technique is often used. For more information: 'Malvertising fraud'. Here's how to avoid it: Close the window. Sometimes the window does not disappear by clicking on Escape or on the cross in the upper right corner. Close the entire page. 8. PHISHING BY SEARCH ENGINE How does it work? Fraudsters build a perfect copy of a well-known company's website. They buy advertising space on Google: every time a user searches for this company, the ad from this fraudulent site will appear. If you type the company's name into Google, the attackers' website will appear at the top of the search results, among the sponsored links. Here's how to avoid it: Google ads are recognisable by the word "Ad" written next to the link. Avoid these ads. Be especially wary of being lured by extra discounts and great offers. If you know the company's web address, just type it into the address bar. 9. PHISHING BY BYPASSING FILTERS How does it work? Your email and antivirus filters alert you when you click on a suspicious link to open it in your browser . The attacker then makes the link unclickable and asks you to copy and paste the link into your browser. This allows the fraudster to bypass the filters. Here's how to avoid it: Don't copy a link you don't trust. 10. CATPHISHING How does it work? The fraudster creates a fake online profile. Through a dating site, the fraudster tries to contact you and establish a (romantic) relationship. In this way, the fraudsters can use this information in other phishing attacks. Or they can get money from you, pretending to be in love with you. Here's how to avoid it: Be suspicious when your contact immediately asks you for very personal information. The fact that your contact postpones a planned meeting until the last minute should also be a red flag. So should pathetic stories about a sudden need for money, a sick family member, ... 11. BUSINESS EMAIL COMPROMISE How does it work? Fraudsters first try to find out as much information as possible about a company's CEO through spear phishing. They then target a key person in the finance or accounting department of that company. They pretend to be the CEO, and ask for a payment to be made. Here is how to avoid it: Check that the account number of the payment matches previous payments. Contact the financial manager yourself and ask if the payment order is correct. 12. THE "NIGERIAN PRINCE" SCAM How does it work? The fraudster pretends to be the solicitor of a rich deceased person who left you the inheritance. But before you receive the inheritance you have to provide your bank details... Here's how to avoid it: Never give your bank details or account number to strangers. WHAT IS PHISHING AND HOW DO YOU PROTECT YOURSELF AGAINST IT? * WHAT HAPPENS DURING PHISHING? What is phishing? What is the goal of fraudsters? How do they trap people, and who is the most likely target? More about phishing * 5 TIPS FOR GUARDING AGAINST PHISHING Phishing is a form of cybercrime that has been strongly on the rise in recent years. In essence, criminals abuse your trust to steal personal data. Read more * Your domain name * Advantages * Your own website * Your personal e-mail addres * Register * Valid domain name * A good domain name * Domain name nicked? * Find registrar * Phishing simulation * Manage * Update * Delete/Renew * Change registrar * Change holder * Complaints * Disputes * Secure * Prevention and control * Domain Guard * Domain Shield * DNSSEC * Safebrowsing * Smart online * 12 phishing methods * Fake webshops * Online fraude * Partners * About DNS Belgium * Organisation * History * Strategy * Annual reports * News * Contact * For registrars * Become a registrar * Services * Status page * Documents * Communication * Statistics * Working with us * * * * * Twitter @dnsbelgium * Facebook DNS Belgium * LinkedIn dns-belgium * Disclaimer * Privacy * Accessibility statement * * Site made by Wieni