Abstract:
Phishing attacks have evolved into a major cybersecurity threat, leveraging advanced technologies and human vulnerabilities to achieve unauthorized access, data exfiltration, and financial exploitation. This article explores the transformation of phishing tactics, identifies the latest detection technologies including artificial intelligence and behavioral analysis, and evaluates the strategic countermeasures adopted across various digital sectors. Through a comprehensive review of modern techniques such as Natural Language Processing, threat intelligence sharing, and multi-factor authentication, the article emphasizes the importance of an adaptive and collaborative approach to phishing defense. Hackers use deception to lure users out of their account passwords and compromise personal information, creating a threat to the confidentiality of information. With phishing attacks, which are a common form of digital threats to accounts, attackers hack into accounts using hypertext links with malicious codes. The issue of phishing attacks is one of the of the most common methods of gaining access to confidential user data. With the growth of information technology comes the development of various technologies for creating phishing attacks that are related to messaging and mobile devices. Attackers often intercept and crack codes to gain access to accounts and create a cyberattack using malware. Often, fraudsters use phishing attacks to gain access to accounts and sell the data to criminals. Data breaches for large enterprises can become the basis for various cyberattacks, which can result in the loss of large amounts of money. UDC: 004.056.53; JEL: Н56, D80.
Description:
HABORETS, Olha and Ludmila RYBALCHENKO. Modern Methods of Detecting and Countering Phishing Attacks in the Digital Environment. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 83-85. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.10