YOGYAKARTA Phishing is one of the crimes in cyberspace that must be watched out for amid the massive development of digital technology. Not a few have suffered losses due to this cyber crime. So what is phishing?

To find out this question, see the following reviews.

What's Phishing? About Phishing Control and Case Examples

Quoted by VOI from the official website of the Directorate General of State Assets of the Ministry of Finance (DJKN Kemenkeu), what is meant by phishing is an effort to obtain information on someone with a portage technique.

Phishing perpetrators usually target personal data (name, age, address), account data (username and password), and financial data (credit card and account information).

Phishing is another form of phishing, which comes from fishing English which means fishing.

Phising aims to lure people to provide personal information voluntarily without realizing it for the purpose of crime.

For example, in mid-March, the Ministry of Finance's DJKN was once troubled by the appearance of a site called international.com which has a ddan view of content similar to the auction site.go.id. In fact, the site includes the Ministry of Finance logo and the DJKN page title. In fact, the auction.go.id is the official website belonging to the DJKN of the Ministry of Finance.

What's Phishing? About How Phishing Work

Phishing perpetrators usually introduce themselves as an authorized party or institution. They insert it in a narrative spread by criminals, and lead victims to click on the link.

In addition, phishing actors also use fake websites or emails that are very similar to the original web to make it look convincing. The goal is to trick victims into collecting data that can be used for crimes.

Information on the data obtained by perpetrators from phishing actions can be directly used to deceive victims. Or, it can also be sold to other parties to commit irresponsible actions such as account misuse.

What's Phishing? About Phishing Messages Ciri-Ciri

Adapting the official website of Bank BCA, the characteristics of phishing messages include:

Phishing perpetrators always include words or phrases asking someone to provide and enter sensitive data such as the word sansi, PIN, or OTP, credit card number/debit, the validity period of credit card and CVV/CVC (3 points behind credit card). What you need to remember, the banking sector has never asked customers for sensitive data.

To deceive the victim, phishing perpetrators usually disguise themselves as a company agency or friend of a potential victim. With a false identity, the perpetrator hopes that the potential victim will immediately believe in the perpetrator's order to provide sensitive data.

Phishing perpetrators also include fake links or files to be downloaded by victims. The perpetrators usually provide the lure that the attachment is access to get discounts, view news and so on.

The contents of the E-mail sent by phishing actors usually ask victims to make decisions quickly for various reasons, such as the promo validity period will end soon, transactions that steal, inform business opportunities with big profits and so on.

What's Phishing? About How to Overcome Phishing

Launching the official website of the DJKN of the Ministry of Finance, here are tips to avoid phishing resilience:

Secret information stored on gadgets is prone to being stolen through phishing crimes. Therefore, carry out a thorough security check on gadgets regularly. As much as possible, check application usage history, strange files, and gadhet temperatures every time you have free time.

So that you don't become a victim of phishing attacks, save login information carefully. Don't let you pass login info in any place, such as public computers or on other people's cellphones. In addition, use a unique password for your account.

The next way to deal with phishing is to ignore all suspicious email or text messages. If the sender claims to be someone else, try contacting the original person.

SSL (Secure Socket Layer) is an important component that the website must have. SSL can protect Web accessors from online attacks.

Cara Memberdakan website SSL tanpa SSL adalah dari protokol aksesnya. Website dengan SSL protokol aksesnya adalah “https://”, bukan https://

Tips to avoid phishing are not receiving calls from unknown numbers. If you receive the call, first listen to what the interests of these foreigners are. If the reporting party asks for sensitive data, immediately ignore it.

Never be tempted by gifts offered via email or text messages. The reason is, phishing perpetrators often offer big gifts to deceive victims.

The last way to deal with phishing is to install phishing and malware protective applications. Such applications, are widely spread across the internet, both mobile and computer applications.

Thus is the information about what phishing is, along with the characteristics and ways to overcome it.


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)