# Phishing **MITRE ATTACK layer: Initial Access** Phishing is a social engineering attack where an attacker impersonates a trusted entity to trick a user into revealing credentials, approving malicious access, or executing an action they otherwise would not. It exploits human trust rather than technical vulnerabilities. ## How is Phishing abused Attackers deliver convincing emails, messages, or links that redirect victims to fake login pages, malicious attachments, or OAuth consent screens. Once the user interacts, attackers harvest credentials, steal session tokens, or gain delegated access, often bypassing MFA and traditional security controls. ## Why Phishing matters Phishing remains the most common initial access vector for enterprise breaches. A single successful phishing interaction can lead to account takeover, lateral movement across SaaS applications, Business Email Compromise, or ransomware deployment without triggering security alerts. ## Real-world example ### HM Revenue & Customs (UK) Phishing Fraud — £47 million stolen In 2025, UK tax authority HMRC disclosed that organised criminals executed a phishing attack targeting around 100,000 taxpayers’ online accounts. The attackers used fraudulent access to HMRC online accounts to redirect refunds or perform unauthorized submissions, ultimately extracting £47 million from the public purse. The agency later corrected accounts and initiated criminal investigations, though concerns were raised about delayed disclosure. [Source](https://www.ft.com/content/18c1af2c-0104-4cba-b106-6a2e8e50b93c?utm_source=chatgpt.com) ## Related topics ### Spear Phishing [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/spear-phishing.html) ### Business Email Compromise [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/business-email-compromise.html) ### Man-in-the-Middle Attack [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/man-in-the-middle-attack.html) ## Additional Resources ### Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)