Phishing Detection Evasion Techniques
A collection of phishing techniques used to evade detection.
Read the blog postAbout this resource
This database is a collection of modern phishing detection evasion techniques, breaking down the methods that attackers are using at different stages of a phishing attack culminating in account takeover (i.e. stealing sessions, credentials, etc.). Each stage groups the techniques observed against a phase of activity that is designed to overcome a layer of security control — for example, the identification and blocking of malicious URLs, or analysing pages for malicious content.
Techniques Matrix
Click on any cell in the table below to learn more about specific phishing techniques:
Get involved
This is naturally a work in progress and we plan to add and update techniques where relevant, as attacks evolve. If you'd like to contribute, you can find the matrix here.
You might also like...
We previously released the SaaS Attacks matrix, a MITRE-inspired resource for red and blue teams helping them to move away from endpoint-centric thinking when it comes to running attack simulation exercises and testing security defenses.