The document provides an overview of phishing techniques used over the past decade based on investigations by an RSA FraudAction forensic analyst. It describes how phishing campaigns are typically set up and distributed, as well as various technical methods used, including: generating random folder paths to host phishing sites and avoid detection; encoding phishing pages in email attachments or URLs; and using Man-in-the-Middle techniques to forward stolen credentials to legitimate sites behind the scenes. The document outlines common motivation and cash-out methods for phishers, such as selling stolen data or using money mules. It also discusses evolving tactics like multi-branded tax refund scams and deploying phishing sites in bulk across numerous domains and paths.