Protecting Hawaii’s Kūpuna Since 1997

If you think you've been scammed, CALL NOW! Oahu: 808-586-7281, Toll Free: 1-800-296-9422

Here Phishy, Phishy – 19 Sneaky Phishing Scams to Know About

From Hilo to Hanalei, scammers don’t care where you live — they just want your information. In today’s digital world, phishing scams have become one of the most common online threats, and they come in many forms. Knowing how to recognize these attacks can help protect your household, your business, and your community.

Whether you’re a student, a caregiver, or one of our cherished kūpuna, here are 19 common phishing scams to look out for in Hawaiʻi and beyond. Share this list with your friends and family — awareness is our best defense.


Phishing in Hawaiʻi: Why It Hits Close to Home

Some scams use fake Wi-Fi networks at airports or coffee shops. Others impersonate Hawaiian Electric or a local credit union to gain your trust. A few even use Hawaiian words or names to appear more familiar and credible.

Phishing scams take advantage of our island values — our sense of trust, community, and aloha. But by learning the signs and types, we can protect ourselves and our loved ones from getting caught in the net.


19 Types of Phishing Scams to Know

1. Spear Phishing

A targeted attack aimed at a specific person, often within an organization. Scammers research their victims first, learning names, titles, and contact details.
Example: An employee receives an email about signing a “new handbook.” The link leads to a fake login page designed to steal credentials.


2. Vishing (Voice Phishing)

Uses phone calls or voicemails to trick victims into sharing information.
Example: Attackers pretend to be a family member or bank representative asking to “verify your account.”


3. Email Phishing

The most common form. The scammer sends an email that looks legitimate and asks you to click a link or reply with personal details.
Example: Hackers used fake LinkedIn messages to target Sony employees and stole over 100 terabytes of data.


4. HTTPS Phishing

Scammers send “secure-looking” links (with HTTPS) that lead to fake sites.
Example: A hacker group sends a nearly empty email with a link that opens a fake login page, stealing company credentials.


5. Pharming

Malicious software redirects you to a fake version of a trusted site.
Example: A worldwide attack redirected users to false banking websites to steal financial data.


6. Pop-Up Phishing

Fake pop-up warnings claim your device has an issue, prompting you to call support or download “security software.”
Example: A fake AppleCare renewal pop-up installs malware when clicked.


7. Evil Twin Phishing

Hackers create fake Wi-Fi hotspots that look real. Once you connect, they capture your data.
Example: Attackers used false airport networks to collect travelers’ login details.


8. Watering Hole Phishing

Hackers infect websites frequently visited by a target group to spread malware.
Example: The U.S. Council on Foreign Relations’ website was once compromised in such an attack.


9. Whaling

Targets executives or business owners with personalized scams.
Example: A hedge fund founder lost $800,000 after clicking a fake Zoom meeting link.


10. Clone Phishing

A hacker copies a legitimate email you’ve already received and resends it with a malicious link.
Example: An attacker replicated a previous business email and swapped in a fake “update” link.


11. Deceptive Phishing

Scammers impersonate well-known companies, warning users of “account issues.”
Example: Fake Apple emails claimed accounts were blocked and asked users to “validate” their credentials.


12. Social Engineering

Uses manipulation and fear to pressure victims into revealing personal details.
Example: Someone posing as a bank employee urges you to confirm your card information to prevent it from being “locked.”


13. Angler Phishing

Happens on social media when fake profiles engage customers and request private details.
Example: Hackers pretended to be Domino’s Pizza on Twitter, offering “refunds” that required account info.


14. Smishing (SMS Phishing)

Text messages that contain fake links or urgent requests.
Example: Victims received messages pretending to be from American Express, directing them to a fake login page.


15. Man-in-the-Middle (MiTM) Attacks

Hackers intercept communication between two parties to steal data.
Example: Unsecured Wi-Fi connections allowed attackers to steal users’ credit information on a financial app.


16. Website Spoofing

Fake websites mimic real ones to capture login details.
Example: A fraudulent Amazon site looked identical to the real one but had a slightly different URL.


17. Domain Spoofing

Hackers imitate legitimate web domains or emails.
Example: A fake LinkedIn domain collected user credentials and sold them online.


18. Image Phishing

Malicious code is hidden in images that install malware when clicked.
Example: Attackers embedded code inside online ad images that infected devices instantly.


19. Search Engine Phishing

Fake ads or websites appear in search results to trick users into sharing payment info.
Example: Scammers created fraudulent “Booking.com” ads that stole login details from unsuspecting travelers.
(Source: Fortinet Cyber Glossary)


Protecting Hawaiʻi’s ʻOhana

Phishing can happen to anyone — but knowledge is power. Here’s how to protect yourself and your loved ones:


https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks#

Phishing scams may be getting smarter, but Hawaiʻi’s people are smarter — and stronger — when we look out for each other. By learning the signs, sharing resources, and staying informed, we can protect our community and keep our digital ʻohana safe.

Coming Up: Protect Yourself and Your Loved Ones from Getting Phished.

Receive News, Alerts & Updates via Email