Phishing Attacks and How to Prevent Them

Phishing is a type of cyberattack where criminals try to steal your data by pretending to be a legitimate service or entity.

Editorial Staffs

There may be many fish in the sea, but there are even more in the digital ocean. That is, perhaps, why phishing is the favorite pastime of so many cybercriminals. The problem in this scenario is that they’re phishing for your data.

What is Phishing?

Phishing is a type of cyberattack where criminals try to steal your data. They send you an email pretending to be a legitimate service or entity. From there, you’re diverted to an external website and asked to provide certain information, such as your username and password.

The problem is that the website you’ve been diverted to isn’t legitimate. It will be a site that looks legitimate but belongs to cybercriminals. They can see any information you enter on this site and use it to access your account.

Five Modern Types of Phishing Attacks Every Malaysian Business Should Know

Top Industries Targeted by Phishing Attacks in 2024
Top Industries Targeted by Phishing Attacks in 2024 according to Zscaler ThreatLabz 2025 Phishing Report — Manufacturing, Services, and Education lead the chart, highlighting sectors with complex supply chains, high digital activity, or outdated defenses as primary targets for cybercriminals.

Phishing today goes far beyond shady emails. Cybercriminals have drastically evolved their tactics — using voice calls, AI-generated deepfakes, SMS, fake websites, and even live chat widgets to trick victims into handing over sensitive data or funds.

Here are the most common — and dangerous — forms of phishing Malaysian businesses face in 2025:

1. Email Phishing: Still a Threat, But Now AI-Powered

Email phishing remains widespread — but the game has changed. Today’s attackers use GenAI tools to craft grammatically flawless, highly persuasive messages that mimic legitimate organizations, including banks, telcos, and government bodies like LHDN or MySejahtera.

These emails often:

  • Ask you to verify your account or reset your password
  • Warn of “unauthorized login attempts”
  • Link to CAPTCHA-protected phishing sites that appear secure

Real-life scenario

A user receives an urgent email from “Maybank,” complete with a CAPTCHA-protected link that leads to a lookalike Maybank2u login page. AI-generated content and HTTPS give it false legitimacy — making it easy to fall for.

2. Spear Phishing: Hyper-Personalized and Harder to Detect

Spear phishing uses publicly available info (e.g., LinkedIn, press releases) to craft tailored messages. With the help of AI, attackers mimic tone, formatting, and signature blocks, making the email feel authentic.

Often aimed at mid-level executives or finance teams, these emails are built for trust — and urgency.

Example: A finance manager receives an email appearing to be from the CEO, requesting an urgent payment for a vendor in Singapore. The language is formal, the logo is right, and the signature matches — but it’s a clone sent from a slightly altered domain.

3. Whaling: Top Executives Targeted with Deepfakes

Whaling targets senior leadership — CEOs, directors, CFOs — with highly convincing emails, voice calls, or even video messages.

In 2025, attackers now use deepfake voice and video impersonation to pose as trusted colleagues or partners during Zoom calls or voicemail requests.

Scenario: A Malaysian real estate CEO receives a voice note from someone sounding like their regional partner, asking for approval on a high-value fund transfer. It’s later discovered the voice was AI-generated using cloned audio samples from YouTube.

4. Smishing: From Fake Bank Apps to Courier Scams

SMS-based phishing (smishing) continues to surge in Malaysia, especially with scams involving:

  • Fake banking apps (e.g., CIMB, RHB)
  • Courier delivery updates (e.g., PosLaju, DHL)
  • Government cash assistance programs (e.g., eMadani)

Attackers use short links and push urgency like “Your parcel is being returned” or “Tap here to claim your rebate.”

Local alert: Bank Negara and MCMC have repeatedly warned the public about malware-laced APKs sent via smishing — which can silently hijack credentials and intercept SMS OTPs once installed.

5. Business Email Compromise (BEC): Patience + Precision = Millions Lost

BEC attacks are among the most financially devastating forms of phishing. Unlike spray-and-pray methods, attackers:

  • Gain access to real business accounts
  • Lurk silently for weeks, watching conversations
  • Strike when a payment or invoice is due

They inject small but costly edits — like a change in bank account number — into ongoing threads.

Real case: A logistics company in Johor unknowingly paid RM580,000 to a scammer when an attacker, having breached their vendor’s email, modified a legitimate invoice email just before payment.

Example of a Phishing Attack

You receive an email from Maybank telling you your account has been compromised. You’re asked to click a link and log into your Maybank account to reset your password. You duly follow the instructions.

Example of a Phishing Attack
Banks and other companies today frequently warn users about phishing attempts.

Once you’re done, the criminal will have your username, old password, and the “new” password.

Notable Statistics and Phishing Incidents in Malaysia

Phishing emails today are getting incredibly sophisticated. They so closely mimic legitimate businesses that often, even experienced users can’t tell them apart. To better protect clients from dangerous emails, we are moving towards AI-assisted detection and blockage.

Bernard Tan

CallNet Senior Systems Engineer

Across 2022, Southeast Asia experienced over 43 million phishing attacks. Of those, 8.2 million targeted Malaysians. While we love being at the top, ranking as the number two country targeted by phishing attacks isn’t something to celebrate.

Other phishing incidents in Malaysia include:

  • In 2023, Cybersecurity Malaysia warned of a phishing site link being spread via Telegram. The site mimicked MyKasih Sumbangan Asas Rahmah (SARA).
  • Hacker group Dark Pink tried to steal confidential military data. They used phishing attacks to target the emails of several Malaysian defense agencies.
  • The Royal Malaysian Police arrested eight individuals in 2022 for providing Phishing-as-a-Service. The group had been active for years and even sold stolen credentials.

How to Protect Yourself From Phishing Attacks

Phishing emails are no longer easy to spot. Today’s attackers use AI to craft flawless, convincing messages, hijack legitimate accounts, and even use tools like CAPTCHA, voice calls, or deepfake videos to build trust and bypass traditional security checks.

Even worse: Some phishing pages now bypass 2FA by stealing session cookies — making MFA alone no longer enough.

Here’s how to defend yourself and your organization against the latest phishing threats:

  • Always Be Skeptical — Even of Familiar Names Phishing is no longer limited to fake domains. Attackers often compromise legitimate accounts and continue email threads that seem trustworthy. If an email contains an unusual request, question it, even if the sender appears legitimate.
  • Inspect the Email Address and Tone Look closely at both the sender’s address and how the message is written. AI-generated emails often appear flawless but may use overly formal or urgent language. Be alert to slight domain changes, odd sentence structures, and inconsistent branding or email signatures.
  • Avoid Clicking on Links Without Verification Many phishing campaigns now use realistic-looking sites hidden behind CAPTCHA pages. Instead of clicking, hover over links to preview them. Type trusted URLs directly into your browser, and avoid using links sent via email or SMS unless you’re sure they’re safe.
  • Use Advanced Security Tools Basic antivirus is no longer sufficient. Use security solutions that include real-time threat detection, SSL/TLS inspection, and browser isolation to analyze suspicious websites safely. Choose platforms that can detect and block newly registered phishing domains and AI-generated attacks.
  • Enable MFA — But Don’t Rely on It Alone While MFA remains a vital defense, some phishing kits can intercept one-time codes and session cookies. Strengthen your security by enabling device-based authentication, session monitoring, and contextual access controls such as location or device fingerprinting.
  • Verify Contact Details Through Official Sources Do not trust phone numbers or links found in unexpected emails. Instead, verify requests by contacting the person or company through a known phone number or website. This is especially important for financial, legal, or vendor-related communications.
  • Monitor Your Accounts Regularly Check your financial and critical service accounts for unusual activity on a regular basis. Set up login alerts where available, and review your account history for changes to contact details or payment settings.
  • Conduct Phishing Simulations and Staff Training For organizations, regular phishing simulations and security awareness training are essential. Modern phishing involves not just emails but also calls, text messages, and even fake video or voice communications. Equip your team to recognize and report these threats early.

phishing Protections for Small business & enterprises

The conclusion of a successful phishing expedition can be extremely painful for victims. Once they provide cybercriminals with the necessary data, they likely won’t know something is wrong until it’s too late.

To enhance your defense against phishing attacks, it’s crucial to consider solutions from renowned cybersecurity brands. Prominent brands like Cisco specialize in preventing phishing by using advanced detection techniques and offering robust security measures that can be integrated into your existing cybersecurity protection.

Be proactive, and you can run your business with peace of mind. Don’t wait until it’s too late. For more detailed strategies and tools against phishing attacks, talk to our cybersecurity expert at Callnet Solution.

Schedule for a free consultation call today

Article By Editorial Staffs

The Editorial Staff at Callnet Solution brings together a seasoned team of IT professionals, collectively boasting over two decades of expertise in enterprise IT management, cloud solutions, and cybersecurity. Since its inception in 2016, Callnet Solution has emerged as a premier IT service provider in Malaysia, renowned for its innovative solutions and commitment to excellence in the tech industry.
Editorial Staffs

More Learning Resources