Email threats

What is phishing in cybersecurity? Definition, examples, and how to stop it

November 20, 2025

What is phishing in cybersecurity? Definition, examples, and how to stop it
On this page
Ready to see Sublime 
in action
Get a demo
Authors

Introduction

Phishing remains one of the most effective and costly cyber threats in the world. Despite decades of training and multiple layers of email security, attackers keep finding ways to deceive users and bypass filters.

Modern phishing is not limited to fake login pages. Today, attackers use OAuth consent requests, QR codes, and legitimate cloud services to steal credentials or gain access without ever delivering a payload. These attacks are sophisticated, automated, and difficult to detect with traditional tools.

This article defines phishing in cybersecurity, explains how phishing works, and outlines practical ways to detect and stop it.

What is phishing?

Phishing is a type of social engineering attack where an attacker impersonates a trusted entity to trick someone into revealing sensitive information or taking a harmful action.

In the past, phishing mostly involved emails that linked to fake login pages. Modern phishing has evolved into a broad category of techniques that exploit both human trust and technical blind spots:

  • OAuth phishing (consent phishing): Users are asked to approve access for a malicious app that connects directly to legitimate services like Microsoft 365 or Google Workspace.
  • Credential phishing : Emails contain links to fake login pages that harvest credentials. Advanced attacks (ex: adversary in the middle) will pass the credentials to the proper auth server to confirm they’re correct, including MFA codes.
  • QR code phishing (quishing): Emails contain QR codes that, when scanned, lead users to credential harvesting or malware-hosting sites.
  • Callback phishing: Messages prompt the victim to call a fake support number, where attackers socially engineer access over the phone.
  • ICS  phishing: Attack that embeds malicious links or payloads inside calendar invitations (.ics files) to bypass email security. Events are often added automatically to users’ calendars, enabling callback phishing or links to credential-harvesting sites.

Phishing works because it manipulates context and urgency, not just technology.

How phishing works: From delivery to compromise

Every phishing campaign follows a predictable lifecycle. Understanding these stages helps security teams identify where defenses often fail.

1. Delivery

Attackers distribute phishing emails that appear legitimate, often leveraging brands like Microsoft, Docusign, PayPal, and more.. These emails frequently come from compromised or newly registered domains designed to mimic trusted senders.

2. Engagement and deception

The message encourages users to take an immediate action, such as clicking a link, scanning a QR code, or opening an attachment. Language often creates urgency or authority, making users act before thinking.

3. Credential capture or payload execution

After engagement, users are redirected to a credential harvesting page or a payload download. In OAuth phishing, no credentials are stolen directly. Instead, the victim grants access permissions that allow attackers to read emails, exfiltrate data, or maintain persistent access.

4. Post-compromise actions

Once the attacker has access, they use it to escalate privileges, move laterally, or launch new phishing attempts from within the organization. In business email compromise (BEC) attacks, they may impersonate executives or vendors to request wire transfers or sensitive data.

Types of phishing attacks

Credential phishing

Emails that lead to fake login portals designed to steal usernames and passwords.

OAuth phishing (Consent phishing) 

Attackers trick users into granting a malicious app permissions to their Microsoft 365 or Google Workspace account. This bypasses the need for a password entirely, allowing attackers to read emails, exfiltrate data, or maintain persistent access via API tokens.

Spear phishing

Highly targeted attacks crafted using personal or organizational context. These are often aimed at specific employees or executives.

Callback phishing (hybrid vishing)

Attackers send emails claiming a subscription is renewing or a charge is pending and instruct the victim to call a support number. When the victim calls, the attacker uses social engineering to steal payment details or convince them to install remote access software.

QR code phishing (quishing):

Attackers embed malicious links inside QR codes, often in PDF or image attachments. Because the link is not visible as text, it can bypass traditional URL analysis and, when scanned on a mobile device, send users to phishing sites on unmanaged endpoints.

ICS phishing

Attackers send malicious calendar invitations (.ics files). When the event is added, the description includes phishing links or callback instructions that bypass email body inspection and land directly in users’ calendars.

Why traditional secure email gateways miss phishing

Traditional secure email gateways (SEGs) rely on static indicators such as URL reputation, sender IP, or attachment hashes. Modern phishing attacks exploit the gaps those systems cannot see.

Key reasons SEGs miss phishing include:

  • Use of legitimate infrastructure such as Google Drive, SharePoint, or Dropbox for delivery.
  • Dynamic redirections that appear safe during scanning but resolve to malicious pages later.
  • QR code delivery that hides malicious links from link inspection tools.
  • OAuth-based attacks that use legitimate consent pages to bypass URL filtering entirely.

When detections are opaque, defenders cannot verify why a message was flagged or missed, which slows response and creates false confidence.

Sublime addresses this by providing detection transparency. Security teams can see exactly which rules or models triggered a verdict, trace message lineage, and adjust logic immediately. Learn more about how Sublime enables explainable detection in our detection transparency overview.

Real-world phishing example: Xfinity credential theft via malicious Zoom documents

In a recent phishing campaign analyzed by Sublime Security, attackers impersonated Zoom to steal Xfinity customer credentials. The emails appeared to contain a shared Zoom document, but the attached HTML files redirected users to a counterfeit Xfinity login page designed to harvest their credentials.

The attackers combined two trusted brands to increase credibility. Zoom was used to make the email appear legitimate, while Xfinity was used to capture real login details. Because the HTML attachments did not include traditional malware or obvious phishing links, many secure email gateways failed to flag them.

Sublime’s explainable detection and message lineage capabilities expose these hidden relationships across the entire attack chain. Security teams can see exactly how the malicious HTML redirects to the fake login page, understand why it was detected, and quickly deploy targeted detection rules to block similar threats in the future.

Read Sublime’s full breakdown of the phishing campaign: Phishing for Xfinity credentials with malicious Zoom docs.

How to prevent and protect against phishing

1. Strengthen detection and visibility

Use adaptive, explainable detection that evaluates message context, not just content. Sublime’s AI-powered models analyze sender behavior, message lineage, and intent to identify phishing even when it uses trusted domains.

2. Automate triage of user-reported messages

Encourage users to report suspicious messages, but avoid manual backlog. Sublime automatically analyzes, classifies, and routes user-reported emails, saving analysts hours per day.

3. Improve authentication and access hygiene

Adopt phishing-resistant MFA, hardware security keys, and least-privilege access policies. Regularly review OAuth app permissions and revoke unused or suspicious connections.

4. Proactively hunt for threats

Attackers continuously evolve. Sublime enables teams to search historical message data, investigate potential campaigns, and deploy new rules immediately, without vendor delays or blind spots.

Frequently asked questions (FAQs)

What is phishing in simple terms?

Phishing is when someone pretends to be a trusted person or company to trick you into revealing sensitive information, such as passwords or payment details.

How can you identify a phishing email?

Check for subtle inconsistencies: misspelled or lookalike domains, unexpected attachments, urgent or unusual requests, and links that lead outside trusted domains. Be especially cautious with QR codes or “callback” scams prompting you to call a number. Sublime detects and explains these threats automatically.

What is the difference between phishing and spear phishing?

Phishing targets a broad audience, while spear phishing is customized for specific individuals or organizations using personal details to appear legitimate.

Why is phishing still successful?

Phishing succeeds because it manipulates human behavior rather than exploiting technical flaws. Even with advanced filters, attackers can use legitimate services or novel delivery methods that fool both users and systems.

How can Sublime help stop phishing?

Sublime detects and explains phishing attacks in real time with adaptive AI, providing full transparency into every decision. Teams can see why messages were flagged, how security agents came to their decisions, and automate triage for user-reported messages.

Conclusion

Phishing is no longer limited to simple credential theft. It now blends automation, trusted infrastructure, and behavioral manipulation to outsmart static defenses.

To stop phishing effectively, defenders need visibility, explainability, and control. Sublime provides all three, helping security teams detect, investigate, and respond to threats faster than attackers can adapt.

Ready to see how Sublime can detect and stop modern phishing?
👉 Get a demo or Start free.

About the authors

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern