Here’s how it works:
The cyber attackers will use original emails and create a cloned (or almost identical) version.
Clone phishing emails may claim to be a resend of the original ones or an updated version of it.
What will be different: the attachment or links are replaced with a malicious version of the legit ones.
Clone phishing appear to come from the original sender and use a fake reply-to address.
It’s a strategy that works because it exploits the trust created from the original email.
Learn more about phishing protection from this security guide.