Hubbry Logo
PhishingPhishingMain
Open search
Phishing
Community hub
Phishing
logo
8 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Phishing
Phishing
from Wikipedia
Not found
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
Phishing is a cyber attack technique in which perpetrators impersonate trustworthy entities to deceive individuals into divulging sensitive information, such as usernames, passwords, or financial details, often via fraudulent s, text messages, or websites that mimic legitimate sources. This social engineering method exploits human vulnerabilities like trust and urgency rather than technical exploits, making it a persistent despite advancing defenses. Brand phishing attacks commonly impersonate well-known companies, with Microsoft being the most frequently spoofed brand, followed by Google, Apple, Amazon, and services such as PayPal or DHL. According to Check Point Research's Brand Phishing Reports (2024), Microsoft accounted for 20-30% of brand phishing attempts in various months, while Vade's Q2 2024 Phishing and Malware Report indicated Microsoft was impersonated in 29% of phishing attacks, followed by Google, Apple, Amazon, and DHL. The practice traces its origins to the mid-1990s, when hackers used automated tools like AOHell to steal America Online credentials by posing as AOL staff via instant messages and emails. Over time, phishing evolved alongside digital communication, shifting from dial-up services to targeting e-commerce sites and financial institutions by the early 2000s, with attacks incorporating malware distribution and sophisticated spoofing. Common variants include spear phishing, which personalizes lures for high-value targets; vishing, involving deceptive phone calls; and smishing, using SMS to prompt harmful actions. Phishing's prevalence underscores its effectiveness, with over 90% of organizations experiencing attacks in 2024 and more than 38 million incidents detected globally that year, contributing to average costs exceeding $4.88 million per phishing-initiated event. In the first quarter of 2025 alone, phishing reports surged to over one million, reflecting adaptations like AI-enhanced and polymorphic evasion tactics that challenge filters and user awareness. Despite mitigation efforts through , phishing's low barrier to entry and high yield sustain its dominance in , often serving as an entry point for and larger breaches.

Definition and Characteristics

Core Definition and Mechanisms

Phishing is a cyber attack technique wherein perpetrators impersonate legitimate entities to deceive individuals into divulging sensitive information, such as login credentials, financial details, or , typically through electronic communications like , text messages, or websites. This method constitutes a form of social engineering, exploiting human trust and psychological vulnerabilities rather than technical exploits alone. The term "phishing" derives from the analogy of "" for valuable information using baited lures. At its core, phishing operates through a sequence of deceptive steps: first, attackers craft messages that mimic authentic sources, often spoofing sender identities or domains to evade initial scrutiny. Victims are then prompted to interact—such as clicking hyperlinks leading to counterfeit websites, downloading malicious attachments, or directly supplying data—under pretexts of urgency, authority, or reward. Successful interactions result in either direct theft of entered information on fake login pages or deployment of that compromises the victim's device for further exploitation. Key mechanisms hinge on perceptual manipulation and behavioral triggers; for instance, emails may replicate official branding and language to foster , while urgency cues like "account suspension" compel hasty responses without verification. Unlike brute-force or scanning, phishing prioritizes the element as the , with success rates amplified by low or fatigue among targets. This approach enables scalable attacks, as minimal customization can yield widespread results across mass distributions.

Key Characteristics and Distinctions

Phishing attacks fundamentally rely on social engineering, wherein perpetrators impersonate legitimate entities—such as financial institutions, government agencies, or colleagues—to deceive recipients into divulging confidential information, clicking malicious links, or downloading harmful attachments. This deception exploits human vulnerabilities like trust, fear, or curiosity rather than inherent technical flaws in systems, distinguishing phishing from exploits targeting software vulnerabilities. Common indicators include urgent or threatening language, such as warnings of account suspension or overdue payments, generic greetings lacking personalization, and requests for sensitive like passwords or details, which legitimate organizations rarely solicit via unsolicited communications. A core mechanism involves crafting messages that mimic authentic communications, often through spoofed addresses or forged headers, to initial and prompt immediate action without verification. Empirical studies indicate variable success rates, with untargeted phishing emails achieving click-through rates of approximately 3-5% in controlled tests, though susceptibility rises to over 30% for repeated exposures in organizational settings due to fatigue or inadequate training. Unlike automated propagation, which spreads independently via network vulnerabilities, phishing requires active victim participation, underscoring its dependence on psychological manipulation over computational force. Phishing is distinct from related tactics like vishing (voice phishing via phone calls) or smishing (SMS-based phishing), which adapt the deception to non-email channels but share the impersonation core, whereas involves DNS manipulation to redirect legitimate traffic to fraudulent sites without user deception. It differs from broader cyber threats such as deployment through drive-by downloads, which may not require user consent, or brute-force attacks on credentials, emphasizing phishing's reliance on engineered plausibility rather than probabilistic guessing or zero-day exploits. This human-centric approach explains phishing's prevalence, accounting for the plurality of reported cyber incidents in federal data, including over 114,000 phishing/vishing/smishing/pharming complaints in 2019 alone.

Types of Phishing Attacks

Mass-Market Phishing

Mass-market phishing, also known as generic or bulk phishing, involves the indiscriminate distribution of fraudulent messages to vast audiences, typically via , with the intent of deceiving recipients into divulging sensitive information or performing actions that benefit the attacker. These campaigns rely on high volume rather than personalization, sending identical or minimally varied lures to millions of potential victims in hopes that a small percentage will respond. Common tactics in mass-market phishing include spoofing sender addresses to mimic trusted entities such as banks, government agencies, or popular services like , Google, Apple, Amazon, and DHL, often urging immediate action on fabricated issues like account suspensions, overdue payments, or security alerts. The most commonly spoofed brands in phishing attacks are typically Microsoft, Google, Apple, Amazon, and DHL (or PayPal in some reports), with Microsoft often ranking #1. According to Check Point Research's Brand Phishing Reports (2024), Microsoft is consistently the top impersonated brand, accounting for 20-30% of brand phishing attempts in various months, followed by Google, Apple, and Amazon. Vade's Q2 2024 Phishing and Malware Report shows Microsoft impersonated in 29% of phishing attacks, followed by Google, Apple, Amazon, and DHL. Messages frequently contain malicious links leading to counterfeit websites that harvest credentials or attachments embedding . For instance, emails purporting to be from financial institutions may request verification of details under threat of account closure. Success rates are low—typically under 1%—but the scale compensates, with over 3.4 billion phishing emails dispatched daily worldwide, comprising about 1.2% of total email traffic. Prevalence has surged with digital adoption; in 2024, phishing attacks inflicted $12.5 billion in global losses, a 25% rise from the prior year, though mass-market variants contribute to this through sheer quantity rather than sophisticated targeting. Unlike spear-phishing, which accounts for over 71% of targeted incidents, mass-market efforts prioritize and botnets for distribution, evading filters via obfuscated URLs or polymorphic content. Victims often include non-technical users, with 94% of infections traced to phishing origins, underscoring the tactic's role in broader ecosystems. Defensive measures emphasize user education and technical filters, as mass-market phishing exploits over zero-day vulnerabilities. Organizations report filtering out most attempts, yet residual successes drive ongoing financial and breaches, with average per-incident costs reaching $4.88 million in 2024.

Targeted Phishing Variants

Targeted phishing attacks differ from mass-market variants by employing and research into specific victims, leveraging details such as names, roles, recent events, or organizational hierarchies to craft convincing lures that exploit trust and urgency. This customization raises success rates significantly, with spear-phishing emails comprising less than 0.1% of total volume but accounting for 66% of breaches originating from phishing. Attackers often gather intelligence via , , or prior leaks to mimic legitimate communications, making detection harder than generic campaigns. Spear phishing represents a core targeted variant, focusing on individuals or small groups within an , such as IT administrators or department heads, using tailored messages that reference personal or professional context to induce actions like credential submission or downloads. For instance, an attacker might pose as a colleague requesting urgent file access, incorporating details from the target's profile. Businesses reported a 150% year-over-year increase in spear-phishing incidents in recent assessments, underscoring its prevalence against mid-level personnel. Unlike broad phishing, spear efforts prioritize quality over quantity, often yielding higher payoffs through direct access to sensitive systems. Whaling, a specialized form of spear phishing, targets high-profile executives like CEOs or CFOs—termed "whales" for their value—aiming to extract funds, , or approvals via impersonation of peers or authorities. These attacks exploit the autonomy of senior leaders, who may authorize large transactions without standard verifications; for example, in 2016, Ubiquiti Networks lost $46.7 million after an executive was deceived into wiring funds to fraudulent accounts. Another case involved in 2016, where attackers phished W-2 forms for 10,000 employees by spoofing an executive's email. Whaling demands extensive reconnaissance, including executive travel schedules or board communications, to fabricate urgency, such as fabricated merger deals or legal threats. Business email compromise (BEC) overlaps with whaling and spear phishing but emphasizes financial fraud through email spoofing of trusted business contacts, often requesting wire transfers or invoice changes. The FBI's Internet Crime Complaint Center reported $2.77 billion in BEC losses across 21,442 U.S. incidents in 2024, contributing to cumulative global exposed losses exceeding $55 billion since tracking began. A notable BEC whaling incident at Crelan Bank in 2016 resulted in €70 million stolen via targeted executive deception. These schemes thrive on minimal technical exploits, relying instead on social engineering to bypass controls, with 64% of businesses encountering BEC attempts in 2024 averaging $150,000 per incident. Recovery rates remain low due to irreversible transfers, highlighting the causal link between targeted personalization and outsized economic damage.

Non-Email Phishing Modalities

Non-email phishing exploits communication channels and delivery methods beyond electronic mail, leveraging mobile devices, telephony, social platforms, and physical media to deceive victims into divulging sensitive information or executing harmful actions. These modalities capitalize on the ubiquity of smartphones and personal interactions, often bypassing email filters and user wariness toward unsolicited messages. Attackers employ social engineering tactics tailored to the medium's immediacy and perceived legitimacy, such as urgent alerts via text or calls mimicking trusted entities. Smishing, or SMS phishing, involves fraudulent text messages urging recipients to click links, download attachments, or provide credentials under pretexts like account alerts or prize notifications. Attackers may prefer smishing over email phishing because SMS filters are less advanced, facilitating easier evasion, and it enables quicker targeting due to high open rates and immediacy, despite email phishing's overall prevalence. These attacks surged 328% in recent years, reflecting attackers' adaptation to mobile dependency. In 2023, smishing contributed to heightened breach risks, with texts often spoofing banks or delivery services to prompt immediate responses. Vishing, voice phishing via telephone, features callers impersonating officials, tech support, or colleagues to extract data through scripted conversations exploiting authority or urgency. Vishing attacks increased 260% from 2022 to 2023 and surged 442% between the first and second halves of 2024, driven by and AI-enhanced voice synthesis. Notable incidents include scammers posing as IRS agents demanding payment, leading to millions in losses annually. Quishing employs QR codes in public spaces, posters, or messages, directing scanners to malicious sites mimicking legitimate portals for credential theft. This method gained traction post-2020 with contactless trends, evading traditional digital scrutiny by blending physical and digital deception. Attackers often overlay fake codes on real signage, such as parking payment prompts, to harvest login details. Social media phishing occurs through platforms like , , or X (formerly Twitter), where fake profiles, ads, or direct messages distribute malicious links or requests disguised as friend connections, job offers, or event invites. These attacks exploit trust networks, with shortened URLs masking destinations; in , such tactics accounted for significant credential compromises amid rising platform usage. On platforms like X, primary risks involve social engineering where users are tricked into entering credentials, passwords, or connecting wallets on fake pages via malicious links, leading to account takeover, stolen funds, or drained cryptocurrency; phishing dominates scams on X, often disguised as support messages, deepfakes, or verified impersonations. Physical modalities, including USB drop attacks, involve leaving malware-infected drives in accessible locations like parking lots to entice curious finders into plugging them in, triggering automatic execution of payloads such as . Studies show recovery rates exceeding 50% in controlled drops, underscoring human curiosity's role; attackers label drives enticingly, e.g., "Confidential Data," to boost infection likelihood.

Emerging and Hybrid Forms

Artificial intelligence has enabled emerging phishing variants that generate hyper-personalized content at scale, incorporating details from , recent news, or corporate events to mimic legitimate communications. For instance, AI tools can produce thousands of tailored emails per minute, optimizing phrasing for higher engagement rates and evading detection through natural language variation. Deepfake audio and video, including voice cloning for vishing, have risen 15% in impersonation attacks targeting executives over the past year. These tactics leverage generative AI to create for callback scams or video calls, scaling social engineering beyond manual efforts. Quishing, or phishing, represents another recent modality where attackers embed malicious s in s, PDFs, or physical posters, directing scans to fraudulent sites that harvest credentials or install . In 2025, common implementations include password-protected PDFs with hidden s or calendar invites prompting scans for "urgent updates." Phishing-as-a-service platforms have proliferated, allowing non-experts to deploy AI-enhanced kits for credential theft or precursors, with abuse of legitimate URL shorteners complicating inline detection. Multi-channel sequences, such as followed by or voicemail lures, further hybridize delivery to single-vector filters. Hybrid phishing attacks integrate credential phishing with deployment in unified campaigns, often using s that offer dual payloads: a benign-looking link for alongside embedded executables or drive-by downloads. Observed in 2025, these combine social engineering with technical exploits like targeting in environments to propagate such as Qakbot. In hybrid work settings, attackers exploit access post-initial phishing, blending vectors with mobile SMS or app notifications to escalate privileges. AI-augmented hybrids, such as those mimicking job portals or luxury scams across and phone, demonstrate causal chains where initial deception funnels victims into persistent access.

Techniques and Tactics

Communication Deception Methods

Communication deception methods in phishing primarily involve forging elements of the message to mimic legitimate communications, thereby eroding user suspicion. Attackers exploit vulnerabilities in protocols and by altering , such as the "From" field or display name, to impersonate trusted entities like banks or government agencies. This spoofing technique disguises the true origin of the message, making it appear to originate from a familiar or authoritative source. Sender forgery extends to manipulating email headers, where attackers insert falsified data or reply-to addresses to reinforce the illusion of authenticity. In addition to textual deception, phishers incorporate visual mimics, such as replicated , signatures, or formatting consistent with the impersonated organization's branding, to enhance credibility. This extends to false branding on phishing websites, where scammers impersonate celebrities or trusted figures, such as claiming to be "Elon Musk’s Official Crypto Casino", to build false trust and lure users into providing personal information or making deposits. Domain-level deception complements these tactics through the use of attacks or typosquatted domains that visually resemble legitimate ones, such as replacing "o" with "0" in a . Beyond email, similar methods apply to (smishing) and (vishing), where or text sender manipulation creates false provenance. These techniques rely on the absence or circumvention of protocols like SPF, DKIM, and , which verify sender legitimacy but are not universally enforced. Empirical analysis of phishing campaigns reveals that over 90% incorporate some form of sender impersonation to bypass initial scrutiny. Phishing emails frequently include unsubscribe links as a deception tactic, mimicking legitimate opt-out options to encourage clicks. These links may redirect users to phishing sites aimed at stealing credentials, installing malware, or harvesting personal data. While not every unsubscribe link is malicious, recent cybersecurity analyses estimate a non-negligible risk, with one study finding that approximately one in 644 such clicks leads to a potentially malicious website.

Technical Exploitation Techniques

Phishers exploit weaknesses in email protocols through sender spoofing, forging the "From" header in (SMTP) transmissions to impersonate trusted sources. This technique succeeds because SMTP lacks built-in authentication for the envelope sender, allowing attackers to insert arbitrary addresses without verification, though Domain-based Message Authentication, Reporting, and Conformance (DMARC) policies can align (SPF) and (DKIM) checks to detect mismatches. Spoofing extends to reply-to and display names, evading basic filters by mimicking legitimate formatting, with attackers often routing through open relays or compromised mail servers to obscure origins. Credential harvesting occurs via cloned websites that replicate legitimate login interfaces using copied , Cascading Style Sheets (CSS), and to mirror visual and functional elements. These clones often feature sparse, inconsistent, and poorly translated content about the brand's history, missions, or safe materials, along with low-effort generic images and layouts that superficially mimic the brand while directing users to unrelated fraudulent activities such as cryptocurrency scams. Attackers deploy automated tools or manual extraction to duplicate forms, hosting them on domains registered via —slight misspellings of real sites—or internationalized domain names (IDNs) exploiting homograph attacks with visually similar characters (e.g., Cyrillic 'а' resembling Latin 'a'), as well as mismatched domains incorporating random letters and cheap top-level domains (TLDs) like .top that are unrelated to the legitimate brand, or by placing brand names in subdomains or URL paths on non-official domains, such as a non-Facebook domain with "facebook" in the path or subdomain claiming to provide support services. These sites capture submitted data through server-side scripts like handlers that log POST requests to attacker-controlled databases. Obfuscated hyperlinks in phishing messages use techniques such as URL encoding, IP literals instead of domain names, or multi-stage redirects to bypass blacklists and antivirus scanners. Malicious payloads delivered via email attachments exploit software parsing flaws, such as buffer overflows in Adobe Reader or macros enabling (VBA) code execution. Attachments disguised as invoices or updates contain embedded executables or scripts that, upon opening, install keyloggers, , or , often leveraging zero-day vulnerabilities if unpatched. JavaScript-based exploits on phishing pages may invoke browser APIs for clipboard hijacking or session token theft, while iframe overlays superimpose fake forms over real sites in man-in-the-browser attacks. Phishers further enhance legitimacy by acquiring low-cost Secure Sockets Layer (SSL) certificates from public certificate authorities, displaying padlocks despite fraudulent content, as validation typically requires only domain control proof rather than site legitimacy. Advanced variants incorporate dynamic techniques like to evade static analysis or QR codes embedding shortened, malicious URLs that redirect to phishing endpoints upon scanning, complicating mobile detection. These methods collectively exploit gaps in client-side validation, relying on user interaction to bridge technical delivery with .

Psychological and Behavioral Manipulation

Phishing attacks fundamentally rely on social engineering principles, which exploit inherent human psychological vulnerabilities rather than solely technical flaws, enabling attackers to induce victims to divulge sensitive information or perform compromising actions. These manipulations target cognitive shortcuts, or heuristics, that individuals use for rapid under , often overriding rational scrutiny. Empirical studies indicate that such tactics succeed because they align with nonconscious mental processes, altering perceptions and decisions without victims' full awareness. A primary technique involves invoking authority bias, where victims comply with directives perceived as originating from credible sources, such as banks or agencies, due to ingrained to perceived experts or superiors. For instance, emails mimicking official logos and language prompt users to click links or provide credentials, as the brain defaults to trusting familiar symbols of legitimacy. Similarly, reciprocity is leveraged by offering unsolicited "gifts" like updates or prizes, exploiting the of returning favors, which compels disclosure of in response. Attackers frequently employ urgency and scarcity to trigger loss aversion, a bias where the pain of potential loss outweighs equivalent gains, prompting hasty actions like immediate password resets under threats of account suspension. This is compounded by emotional hijacking, such as "amygdala hijack," where fear or panic—induced by warnings of security breaches or financial penalties—bypasses prefrontal cortex deliberation, leading to impulsive clicks on malicious links. Curiosity-driven lures, like notifications of "suspicious activity" or exclusive deals, further exploit hyperbolic discounting, where immediate rewards are overvalued despite long-term risks. Behavioral patterns are manipulated through and familiarity, as repeated exposure to benign alerts desensitizes users, making phishing variants harder to distinguish; for example, vishing calls mimic routine interactions to elicit verbal confirmations of details. , another tactic, incorporates fabricated testimonials or "everyone is doing it" implications to normalize compliance, aligning with humans' tendency to follow perceived group in ambiguous situations. These methods demonstrate causal efficacy: phishers succeed by engineering scenarios that exploit evolved psychological adaptations for survival and , rather than novel inventions, with success rates in simulated tests exceeding 20% even among trained populations.

Historical Development

Origins in Early Computing

The roots of phishing techniques emerged from phone phreaking in the 1960s and 1970s, where hackers employed social engineering—such as impersonating telephone operators or technicians—to obtain confidential switching codes and enable free long-distance calls. This practice, which relied on deception to bypass technical controls, transitioned into early computing as phreakers adapted their methods to digital systems, using computers to generate tones or exploit early data networks. A phishing technique was first formally described in computing contexts during a 1987 presentation at the Interex conference of the International HP Users Group. Titled "System Security: A Hacker's Perspective," the paper outlined how attackers could impersonate trusted entities or services to trick users into disclosing credentials, such as passwords on minicomputer systems accessed via terminals. This approach exploited human trust rather than software vulnerabilities, targeting environments where authentication depended on shared secrets entered at consoles or early networked terminals. In the pre-internet era of mainframes and minicomputers (1970s–1980s), such deceptions remained theoretical or limited to localized incidents within organizations, as widespread user connectivity was absent. Hackers in communities around systems (BBSes), which proliferated from 1978 onward, occasionally used pseudonyms or false pretenses to gain elite access levels or extract login details, foreshadowing scalable digital fraud. However, without or public networks, these tactics did not constitute mass phishing, focusing instead on direct interaction or physical/social proximity in academic or corporate settings. The emphasis on psychological manipulation over code-breaking distinguished these origins from contemporaneous technical exploits like buffer overflows.

Growth During Widespread Internet Adoption (1990s–2000s)

Phishing attacks originated in the mid-1990s amid the expansion of dial-up services, particularly targeting , which dominated early consumer access with millions of subscribers. Hackers from the community posed as AOL staff via and , tricking users into revealing login credentials to gain free access for or distributing pirated software. The term "phishing," a play on "fishing" for sensitive data with the "ph" borrowed from , first appeared around 1995 in hacker forums, coinciding with tools like that automated credential theft through password guessing and social engineering. These early efforts exploited users' limited technical savvy and the novelty of online communication, with AOL's rapid growth—reaching over 10 million members by 1997—providing a vast pool of targets as household penetration rose from under 20% in 1995 to nearly 40% by 2000 in the U.S. By the early 2000s, phishing evolved from credential theft for access to direct financial fraud, paralleling the surge in e-commerce platforms like and . Attackers sent mass s mimicking legitimate financial institutions, urging users to "verify" accounts on spoofed websites that captured login details, numbers, and . In 2003, phishers registered numerous domains resembling trusted brands to host fake login pages, enabling scalable deception as global internet users exceeded 400 million. The worm in May 2000, which infected approximately 45 million computers via enticing email attachments, demonstrated phishing's psychological leverage and amplified awareness of email-borne threats, though it blended with social engineering. Attack volumes escalated dramatically in the mid-2000s, with phishing transitioning to organized, profit-driven operations amid adoption and email's ubiquity—U.S. households with doubled to over 60% by 2005. Between May and May 2005, an estimated 1.2 million U.S. victims suffered losses totaling $929 million, underscoring the tactic's maturation into a mass-market exploiting nascent and low public vigilance. This growth stemmed from causal factors including minimal standards, absence of widespread spam filters until tools like Gmail's launch, and users' overtrust in digital communications during the dot-com era's optimism, enabling attackers to cast wide nets with minimal technical barriers.

Maturation with Advanced Targeting (2010s)

During the , phishing evolved from broad-spectrum campaigns to highly targeted operations, with spear-phishing emerging as a dominant vector due to its reliance on personalized reconnaissance and social engineering. Attackers increasingly utilized (OSINT) from platforms, leaked databases, and corporate directories to craft messages mimicking legitimate communications from colleagues, vendors, or authorities, thereby bypassing basic filters and exploiting human trust. This maturation reflected a strategic pivot as global spam volumes plummeted—from roughly 300 billion emails daily in 2010 to 40 billion by 2011—prompting cybercriminals to prioritize quality over quantity for higher yields. Spear-phishing attacks proliferated as the preferred initial intrusion method for advanced persistent threats (APTs), enabling sustained access to networks through tailored lures that evaded detection by incorporating victim-specific details, such as recent job changes or personal events. By mid-decade, these tactics underpinned state-sponsored operations and financially motivated groups alike, with reports indicating spear-phishing's role in compromising and . The technique's efficacy stemmed from its causal alignment with behavioral vulnerabilities: personalized appeals reduced , increasing click-through rates on malicious links or attachments by orders of magnitude compared to generic blasts. Whaling, an escalated form of spear-phishing aimed at C-suite executives and high-value targets, gained traction for its potential to authorize multimillion-dollar fraudulent transactions or disclose sensitive strategies. These attacks often simulated urgent executive directives, such as fund transfers or confidential file shares, leveraging the targets' and limited scrutiny under time pressure. Early warnings about surfaced around 2011, coinciding with publicized cases of familial targeting via publicly available addresses. Quantitative trends underscored this shift: spear-phishing's prevalence surged to 64% of phishing incidents by , from 53% in , while mass phishing waned amid improved protocols. This era's innovations, including the fusion of phishing with droppers and remote access tools, amplified impacts, as seen in APT campaigns where initial spear-phishing footholds facilitated lateral movement and over months.

Modern Escalations and Technological Integration (2020s)

The decade of the 2020s witnessed a marked escalation in phishing volume and sophistication, driven initially by the COVID-19 pandemic, which prompted a 220% surge in incidents during peak periods as attackers exploited themes like vaccines and relief programs. Phishing attacks increased by 667% in the first quarter of 2020 alone, with related scams rising 400% since March of that year. By 2024, over 38 million attacks were detected globally, culminating in nearly 1 million unique incidents in the fourth quarter, a rise of more than 100,000 from the prior quarter. The Anti-Phishing Working Group recorded 1,003,924 attacks in the first quarter of 2025, the highest since late 2023, alongside a 700% increase in malicious phishing sites since 2020, reaching nearly 1 million per month. Technological advancements, particularly (AI), have integrated deeply into phishing operations, enabling attackers to automate and personalize campaigns at scale. Generative AI tools facilitate the creation of highly convincing emails, messages, and social engineering content that evade traditional detection filters by rephrasing suspicious elements or mimicking legitimate communications. AI-driven phishing, including audio for and real-time impersonation, emerged as a top concern for 51% of leaders by 2025, amplifying effectiveness in (), which saw a 1633% surge in attacks. These tools also support development and target analysis, contributing to phishing's role in 22% of incidents in 2025. Hybrid and multi-channel tactics further escalated threats, incorporating platforms like Telegram for phishing distribution, QR codes (quishing) for bypassing visual scrutiny, and blob URLs or for obfuscation. Over 80% of phishing sites now employ encryption to appear trustworthy, while business email compromise (BEC) affected 64% of organizations, often leveraging AI for tailored executive impersonations. These integrations reflect a shift toward "malwareless" attacks, where relies on psychological manipulation augmented by rather than attachments, sustaining phishing's dominance despite defensive advancements.

Notable Incidents

Pivotal Early Cases

The earliest documented phishing attacks emerged in the mid-1990s, targeting users of America Online (AOL), the dominant internet service provider at the time with millions of subscribers. Hackers, often young enthusiasts using tools like the AOHell program released around 1994, impersonated AOL customer service via instant messages or emails to solicit usernames, passwords, and credit card details under pretexts such as account verification or billing disputes. AOHell facilitated these efforts by automating password guessing and generating fake credit card numbers for purchasing additional AOL hours, marking one of the first instances of the term "phishing" in hacking communities, derived from "fishing" for credentials and "phreaking" telephone hacks. These AOL campaigns represented a pivotal shift from isolated cracking to mass-targeted deception, exploiting the platform's closed ecosystem where users relied on AOL's and lacked widespread awareness of digital fraud. Attackers amassed thousands of valid accounts, reselling them on underground forums or using them for unauthorized access, which strained AOL's support resources and prompted early countermeasures like improved prompts by 1995. The scale escalated as phishing kits proliferated, with hackers employing social engineering scripts to mimic official AOL communications, leading to an estimated epidemic of stolen credentials by the late that foreshadowed broader vulnerabilities. A notable precursor to financial phishing occurred in June 2001 against , an early service, where attackers sent fraudulent emails posing as the company to capture credentials, though the attempt yielded limited success due to rudimentary tactics. This case highlighted phishing's expansion beyond dial-up services to , setting the stage for attacks on banks by 2003, but the incidents remain foundational for demonstrating scalable, psychology-driven credential theft without technical exploits.

Major Corporate and Government Breaches

In 2014, Entertainment suffered a significant breach initiated through spear-phishing emails targeting employees, allowing intruders—later linked by U.S. authorities to North Korean actors—to deploy and exfiltrate over 100 terabytes of data, including unreleased films, executive emails, and personal information on 47,000 individuals. The attack, detected on November 24, 2014, disrupted operations, led to the leak of sensitive content online, and incurred costs estimated at over $100 million in remediation and lost productivity. The 2016 Democratic National Committee (DNC) intrusion began with a spear-phishing sent to DNC chairman on March 19, 2016, masquerading as a password reset notice, which tricked him into revealing credentials and enabled Russian military intelligence operatives to access DNC servers. Hackers from GRU Units 26165 and 74455 exfiltrated approximately 70 gigabytes of data, including over 20,000 emails later released via , compromising voter databases and internal communications affecting 44,000 individuals. This incident, part of broader election interference efforts, highlighted vulnerabilities in political organizations despite available security tools. Twitter (now X) experienced a high-profile breach on July 15, 2020, when attackers used spear-phishing to compromise employee credentials, gaining internal tool access to hijack 130 prominent accounts including those of , , and , promoting a scam that netted $120,000 in . The social engineering targeted a small number of internal support staff via phone-based deception, bypassing multi-factor authentication weaknesses, and exposed API vulnerabilities affecting 130 million users indirectly through spread. U.S. authorities arrested perpetrators, including a 17-year-old resident, underscoring risks in internal access controls. The 2021 , disrupting 5,500 miles of fuel infrastructure serving 45% of East Coast supply, likely originated from phishing-enabled credential compromise of an outdated VPN account without , allowing DarkSide actors to deploy on May 7, 2021, and encrypt systems. The company shut down operations for five days, paid a $4.4 million ransom (partially recovered by authorities), and triggered fuel shortages costing an estimated $1 billion in economic impact, revealing critical infrastructure's reliance on basic phishing defenses. Between 2013 and 2015, Lithuanian national Evaldas Rimasauskas orchestrated phishing schemes impersonating vendors to defraud and of over $100 million via fraudulent invoices and wire transfers, exploiting to bypass financial controls in these tech giants. Convicted in 2017, the case demonstrated phishing's efficacy against even sophisticated corporations through targeted business email compromise, with losses recovered partially through international cooperation.

Recent High-Impact Events (2020–2025)

In July 2020, attackers conducted a spear-phishing campaign targeting employees with access to internal tools, tricking at least one into divulging credentials via phone-based social engineering. This enabled the hijacking of high-profile accounts including those of , , , and , which posted identical scam messages promising to double sent . The incident netted approximately $120,000 in illicit funds before accounts were locked, exposing vulnerabilities in internal access controls and prompting to suspend legacy verification and enhance employee training. A 17-year-old from was later identified as a key perpetrator, with accomplices including a British national who pleaded guilty in 2023. In January 2022, the LapsushackinggroupphishedasupportengineeratSitel,athirdpartyvendorfor[Okta](/page/Okta)s[customersupport](/page/Customersupport),compromisingcredentialstoaccessOktasadminconsoleandviewfilesfor134customersoverseveralweeks.ThisbreachfacilitatedsubsequentattacksondownstreamorganizationsusingOktaforidentitymanagement,includingdatatheftand[ransomware](/page/Ransomware)precursors,thoughOktareportednodirectcustomertenantcompromises.Theincidenthighlightedrisksin[supplychain](/page/Supplychain)supportsystems,leadingOktatomandatehardwaretokensforsupportstaffanddisclosethebreachafterLapsus hacking group phished a support engineer at Sitel, a third-party vendor for [Okta](/page/Okta)'s [customer support](/page/Customer_support), compromising credentials to access Okta's admin console and view files for 134 customers over several weeks. This breach facilitated subsequent attacks on downstream organizations using Okta for identity management, including data theft and [ransomware](/page/Ransomware) precursors, though Okta reported no direct customer tenant compromises. The incident highlighted risks in [supply chain](/page/Supply_chain) support systems, leading Okta to mandate hardware tokens for support staff and disclose the breach after Lapsus screenshots surfaced publicly. A related "0ktapus" phishing campaign in mid-2022 targeted Okta users via fake verification texts, compromising entities like and . On September 10, 2023, the group executed a vishing attack against , impersonating a corporate executive to deceive the IT helpdesk into resetting for a linked employee account. This granted initial network access, enabling ALPHV/BlackCat deployment that disrupted operations across MGM's Las Vegas properties, including slot machines, hotel check-ins, and digital payments, for over a week. The attack caused an estimated $100 million in direct losses without payment, as MGM prioritized system restoration over negotiation, and exposed 10.6 million guest records including payment details. Similar tactics hit concurrently, underscoring persistent efficacy of voice-based social engineering against helpdesk protocols. In 2024, phishing-enabled campaigns continued to escalate, with business email compromise variants contributing to billions in global losses, though specific high-profile incidents like the February attack involved unconfirmed initial phishing amid stolen credentials and remote access exploits. Overall, phishing attacks surged, with the Anti-Phishing Working Group recording over 1 million unique incidents in Q1 2025 alone, often leveraging AI for personalized lures.

Impacts and Consequences

Economic and Financial Toll

Phishing attacks impose substantial direct and indirect financial burdens on individuals, businesses, and governments, encompassing stolen funds, remediation expenses, and lost productivity. In 2024, the FBI's (IC3) recorded over 298,000 complaints related to phishing and spoofing, contributing to total losses of $16.6 billion across all categories, with phishing serving as a primary vector for schemes like business email compromise (BEC). BEC alone, a sophisticated phishing variant, accounted for adjusted losses exceeding $2.9 billion in 2023, with similar patterns persisting into 2024 amid rising complaint volumes. These figures likely understate the true toll, as victim underreporting and incomplete loss attribution are common in official tallies. The average financial impact per phishing-initiated reached $4.88 million globally in 2024, marking a 10% increase from $4.45 million in 2023, according to IBM's of a Data Breach Report; this encompasses detection, response, notification, and post-breach costs, with phishing ranking as the costliest initial at 16% of breaches analyzed. Large organizations faced average annual phishing-related losses of $15 million, equivalent to roughly $1,500 per employee, driven by recurring attacks and compromises. In the U.S., phishing attacks exerted an estimated $3.5 billion economic impact in 2024, including direct theft and indirect expenses like fraud reversal and legal fees. Broader projections highlight escalating trends, with some analyses estimating phishing's global cost could approach $250 billion by 2024 when factoring in downstream effects like deployment, though such figures rely on extrapolations from underreported incidents and vary by methodology. Verizon's 2025 Data Breach Investigations Report notes phishing's in 14% of analyzed breaches, often amplifying financial through theft enabling wire or , with median payouts from such vectors dropping to $115,000 amid refusal rates rising to 64%—yet overall remediation burdens persist. These costs disproportionately affect sectors like and healthcare, where phishing exploits yield high-value , underscoring phishing's as a low-barrier, high-return enabler of economic disruption.

Security and Data Integrity Effects

Phishing attacks erode organizational by exploiting human vulnerabilities to circumvent perimeter defenses such as firewalls and intrusion detection systems, enabling unauthorized access to networks and systems. In the Verizon 2025 Data Breach Investigations Report, phishing was identified as a contributing factor in 16% of the 12,195 confirmed analyzed from 22,052 security incidents, often serving as the initial vector for broader intrusions. This access frequently results in credential compromise, with phishing and stolen credentials together implicated in nearly 80% of breaches according to prior Verizon analyses, allowing attackers to impersonate legitimate users and bypass through techniques like or SIM swapping. Data integrity suffers as phishing-delivered payloads, including and , enable attackers to tamper with information assets. The 2025 Cost of a Data Breach Report notes that phishing, the most common initial at 16% of incidents, correlates with breach costs of $4.91 million, partly due to the remediation of altered or corrupted following malware infections that modify files, inject backdoors, or encrypt datasets for . For instance, ransomware strains like those from phishing-initiated infections not only deny but also risk permanent data alteration if backups are overwritten or exfiltrated is manipulated for campaigns. In healthcare, phishing has precipitated breaches where records were accessed and potentially falsified, undermining clinical decision-making and . Broader security implications include the facilitation of lateral movement within networks, where compromised endpoints serve as pivots for and mechanisms that degrade overall system trustworthiness. Reports indicate that 60% of breaches involve human elements like phishing susceptibility, amplifying risks to when targeted at vendors, as seen in doubled third-party breach involvement per the 2025 Verizon DBIR. AI-enhanced phishing, comprising 37% of AI-involved breaches, further complicates by generating hyper-personalized lures that increase success rates, leading to undetected and cumulative data corruption over time.

Broader Societal Ramifications

Phishing attacks contribute to widespread erosion of in digital communications and institutions, as victims increasingly question the authenticity of emails, websites, and official interactions. In the financial sector, advanced phishing has led to significant , with reports indicating that repeated incidents exacerbate skepticism toward banks and payment systems, potentially reducing online transaction volumes. This skepticism extends to entities, where phishing-enabled breaches undermine confidence in public services, fostering a broader reluctance to engage digitally with authorities. Victims of phishing often experience profound psychological effects, including heightened anxiety, diminished self-confidence, and long-term emotional distress akin to trauma from . Studies document that successful scams trigger self-doubt and job performance declines among affected employees, while broader scam victimization correlates with persistent issues such as depression and social withdrawal. These individual harms aggregate into societal costs, straining resources and reducing overall productivity, as affected persons exhibit avoidance behaviors toward technology. Phishing disproportionately impacts vulnerable populations, widening the and entrenching social inequalities. Older adults and those with low face elevated risks due to limited familiarity with online threats, leading to higher victimization rates and reinforcing exclusion from digital economies. This vulnerability pattern amplifies socioeconomic disparities, as low-income or less-educated groups suffer repeated exploitation, hindering their access to essential online services like banking or healthcare. On a geopolitical level, state-sponsored phishing campaigns enable and influence operations, destabilizing and frameworks. Nation-state actors deploy spear-phishing to infiltrate networks for gathering or , as seen in campaigns targeting government and to advance political agendas. Such activities erode trust in global digital infrastructure, prompting escalatory responses like heightened and international cyber norms debates, while blurring lines between and warfare.

Prevention and Mitigation

User-Centric Approaches

Phishing awareness training constitutes a primary user-centric , focusing on educating individuals to identify deceptive communications through recognition of common indicators such as urgent "last chance" language or tight deadlines, mismatched URLs including custom subdomains, or unsolicited requests for sensitive information. Programs often incorporate interactive modules and simulated phishing emails to reinforce learning, with repeated exposure shown to improve detection rates. For instance, a 2025 study on embedded phishing training found it reduced individual clicking probability by approximately 20% when users encountered targeted simulations shortly after failing an attempt. Empirical data underscores the impact of ongoing regimens over one-time sessions. A 2025 KnowBe4 analysis of global organizations reported an 86% average reduction in phishing click rates within 12 months of implementing combined with phishing simulations, particularly benefiting initially vulnerable users. Conversely, isolated awareness efforts yield modest gains; Microsoft's Digital Defense documented only a 3% decrease in click rates from without simulations, highlighting the necessity of behavioral to counter to real threats. Factors influencing include user demographics and traits, with younger or more impulsive individuals showing slower improvements despite . Practical user behaviors further mitigate risks when integrated with . Individuals should independently verify sender legitimacy by contacting organizations via official channels rather than replying to or clicking in suspicious messages, a method recommended in cybersecurity guidelines to bypass spoofed domains. For suspicious promotional emails, users should scrutinize indicators such as sender domain mismatches with official domains, timing aligned with holidays to exploit urgency, or use of fake receipts or deals designed to trick recipients into clicking links; users should not click any links or images, as they may direct to fraudulent sites seeking login credentials or payment details; instead, visit the official website directly by typing the URL into the browser to confirm promotions, forward the email to national cyber security agencies or anti-phishing groups, or mark it as spam; and if subscribed to newsletters, check the account status on the official site. Upon receiving a suspicious email asking to confirm an email address, users should not click any links to avoid validating the address or risking phishing exposure; instead, mark the email as spam in the email provider to filter future ones, delete the email, and block the sender if more arrive; optionally, inspect for an unsubscribe link but avoid interacting to prevent confirming the email is active. For suspicious text messages from unknown senders, including those mimicking card authorization alerts, users should not reply to avoid confirming the number is active, block the number, refrain from clicking any links or entering provided codes for uninitiated transactions, and report persistent, threatening, or fraudulent messages to their carrier, the FTC at reportfraud.ftc.gov, or relevant anti-fraud authorities such as the Canadian Anti-Fraud Centre at antifraudcentre.ca; upon receiving a suspicious card authorization SMS, contact the bank immediately via official channels (e.g., the number on the card or verified website) to report the incident, block the card, and request a replacement, monitor the account for unauthorized activity and pursue chargebacks for any suspicious charges, and change passwords for affected linked accounts such as online banking or email. To counter phone hacking via texts or malicious pictures, users should maintain updated phone software to address vulnerabilities, avoid clicking unknown links or downloading attachments from strangers that may harbor malware, and in contexts like dating apps, employ in-app features for picture sharing while suggesting video calls for identity verification. When accessing bank websites, recommended practices include typing the URL directly into the browser, using links from verified official sites, or bookmarks; avoiding hyperlinks from emails or messaging apps; and confirming the site's security through the HTTPS protocol and padlock icon in the address bar. If a link is received via email or similar channels, users should instead visit the official bank site and navigate manually to the relevant section. Enabling (MFA) on accounts adds a layer against credential phishing, as it requires additional verification beyond passwords, though users must avoid phishing lures that target MFA prompts themselves. Additional habits include using unique, strong passwords per service to limit breach propagation and promptly reporting potential phishing to IT teams, fostering a non-punitive reporting culture that encourages vigilance without fear of reprisal. Despite these approaches, persistent human vulnerabilities persist, as studies indicate even trained users fail to detect novel phishing variants at rates exceeding 40% in some scenarios, underscoring the limits of reliance on individual amid evolving tactics like AI-generated . Comprehensive programs thus prioritize continuous, adaptive simulations over static education to sustain long-term resilience.

Technological Countermeasures

Technological countermeasures against phishing encompass software and protocol-based defenses designed to detect, block, or mitigate phishing attempts at various stages, including , web browsing protections, and enhancements. These tools leverage blacklists, heuristics, algorithms, and cryptographic verification to identify malicious content without relying solely on user vigilance. Email authentication protocols form a foundational layer by preventing domain spoofing, a common phishing vector. (SPF) authorizes sending IP addresses for a domain, (DKIM) provides cryptographic signatures for message integrity, and Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds on both to enforce policies like quarantine or rejection of failing emails. Implementation of these protocols has significantly reduced impersonation-based phishing, with DMARC enabling domain owners to monitor and control unauthorized use. Browser-integrated protections, such as , scan URLs against vast databases of known threats and issue real-time warnings to users attempting to visit phishing sites. Systems like Google Safe Browsing, Microsoft Defender, and VirusTotal employ brand protection rules to detect patterns where brand names appear in URL paths but the domain is unrelated and not official, such as a non-Facebook domain claiming to provide Facebook support. Integrated into browsers like Chrome and , this service safeguards over five billion devices daily by blocking access to dangerous pages. Users enabling enhanced modes in Chrome experience 35% fewer phishing incidents, though attackers employ evasion tactics like to bypass blacklists. Multi-factor authentication (MFA), particularly phishing-resistant variants using hardware tokens or like FIDO standards, thwarts credential harvesting by requiring factors not susceptible to interception, such as device-bound or security keys. Unlike or app-based one-time passwords vulnerable to SIM swapping or real-time phishing, these methods eliminate shared secrets, rendering stolen credentials useless without physical access. Government agencies recommend phishing-resistant MFA for high-value accounts to counter evolving attacks. Machine learning and AI-driven detection systems analyze patterns in emails, URLs, and user behavior to flag anomalies, outperforming traditional rule-based filters against sophisticated campaigns. In 2025, AI tools process features like linguistic anomalies and sender reputation, achieving high accuracy in enterprise environments, though adversarial AI used by attackers complicates detection arms races. Leading solutions integrate these into gateways and , adapting to threats like AI-generated phishing content. In the United States, phishing is prosecuted primarily under existing federal statutes such as the (18 U.S.C. § 1030), which criminalizes unauthorized access to computers and obtaining information through fraud, with penalties including fines and imprisonment up to 10 years for aggravated offenses. Wire fraud statutes (18 U.S.C. § 1343) also apply to phishing schemes involving interstate communications, enabling convictions for deceptive electronic solicitations leading to financial loss. Most states have enacted specific anti-phishing laws treating such acts as misdemeanors, with penalties varying by jurisdiction but often including fines and short jail terms for first offenses. The (FTC) investigates phishing as consumer fraud, encouraging reports via ReportFraud.ftc.gov to build databases for enforcement actions, though it lacks a dedicated federal anti-phishing statute. Notable prosecutions include a federal case where five defendants linked to an international phishing ring using spam emails were convicted, resulting in sentences for roles in stealing credentials and financial data. More recently, in November 2024, the U.S. Department of Justice charged five individuals in a scheme targeting corporate employees via phishing text messages, seeking to steal sensitive information for . The FBI's (IC3) coordinates investigations, reporting over 300,000 phishing complaints annually, facilitating asset seizures and international extraditions in cross-border cases. Internationally, the Council of Europe's Budapest Convention on Cybercrime (2001), ratified by over 60 countries, requires signatories to criminalize phishing-equivalent offenses like illegal access and data interference, promoting mutual legal assistance and extradition. In the , phishing-induced data breaches trigger penalties under the General Data Protection Regulation (GDPR, effective 2018), with fines up to 4% of global annual turnover for failures in securing personal data against such attacks. The EU signed the Convention against Cybercrime in October 2025, which explicitly addresses phishing as a core offense, aiming to harmonize global definitions and enhance cross-border cooperation. Organizations respond to phishing through mandatory employee training programs emphasizing recognition of indicators like urgent demands or suspicious links, often incorporating simulated attacks to measure and improve detection rates. Policies typically require reporting suspected incidents within hours and prohibit clicking unverified attachments, with repeat failures in simulations leading to disciplinary measures or retraining. The U.S. National Institute of Standards and Technology (NIST) recommends multi-layered defenses in its guidelines, including email filtering and user education aligned with the Cybersecurity Framework (updated 2024), to categorize phishing susceptibility on a scale assessing message realism and urgency. Standards like ISO/IEC 27001:2022 mandate controls for phishing prevention, such as access restrictions and awareness campaigns, adopted by corporations to certify information security management systems. The UK's National Cyber Security Centre (NCSC) advises organizations to deploy technical mitigations like domain-based message authentication while minimizing user disruption through targeted filtering. Post-incident protocols, per and similar frameworks, involve isolating affected systems, forensic analysis, and notifications to minimize propagation.

Effectiveness Critiques and Limitations

Despite substantial investments in anti-phishing programs, empirical studies indicate minimal long-term reductions in user susceptibility to attacks. A 2025 study analyzing enterprise data found no statistically significant impact from annual cybersecurity awareness or embedded phishing simulations on click-through rates or reporting behaviors, with trained users showing click rates comparable to untrained ones. Similarly, researchers at the examined over 100,000 simulated phishing emails sent to employees and concluded that routine programs failed to prevent falls for scams, as click rates remained consistent regardless of prior exposure or instruction. These findings align with broader analyses revealing low engagement with materials—often below 20% completion rates—and potential unintended effects, such as desensitization or overconfidence leading to riskier behaviors in some cohorts. Simulated phishing tests, a common user-centric tactic, face critiques for oversimplifying real threats and fostering a false sense of . Such exercises typically replicate basic lures but neglect advanced tactics like AI-generated personalization or multi-channel attacks (e.g., followed by ), resulting in trained users underestimating novel variants. A scoping of anti-phishing modalities reported post-training click-through rates averaging 10-20% in controlled settings, but real-world wanes as attackers adapt faster than static simulations can evolve. Moreover, mandatory programs in high-risk sectors like healthcare yielded only marginal improvements, with click rates dropping temporarily but rebounding within months due to forgetting curves and cognitive overload from repetitive content. Technological countermeasures, including filters and browser warnings, exhibit evasion vulnerabilities amid attacker innovations. While filters block obvious phishing—reducing successful compromises from 46% in 2022 to 25% by 2025 per IBM's analysis—they struggle against AI-enhanced lures that mimic legitimate communications with high fidelity, leading to a resurgence in attacks incorporating generative tools for hyper-personalized content. Take-down efforts for malicious sites prove largely ineffective, as phishing pages often transmit stolen credentials in seconds before removal, with the documenting over 1 million unique attacks in Q1 2025 alone despite widespread deployment of blacklists and heuristics. (MFA) mitigates credential theft but is bypassed via social engineering or , underscoring that no single tech layer eliminates the human vector, which accounts for over 90% of breaches. Organizational and legal responses encounter scalability and enforcement limitations. Compliance-driven policies, such as mandatory reporting, yield low adherence—under 5% of incidents self-reported—due to fear of repercussions or unawareness, perpetuating undetected chains. Regulations like GDPR impose fines but fail to deter prolific actors in jurisdictions with lax oversight, as evidenced by persistent high-volume campaigns from state-affiliated groups. Collectively, these gaps explain why 94% of organizations reported phishing victimization in , up from prior years, highlighting that mitigations lag behind adaptive threats rooted in psychological exploitation rather than purely technical flaws.

References

Add your contribution
Related Hubs
User Avatar
No comments yet.