Today’s internet technology is so prevalent that it has improved the quality of people’s lives in a variety of ways, such as online social networking and banking. Security risks to systems and networks are continually evolving because of the development of Internet technologies. Phishing is one such major issue, in which attackers try to steal the user’s credentials by using bogus emails, websites, or both. The creation of solutions to counter phishing attacks is a top priority for both businesses and academics. Therefore, it is crucial for businesses to focus on end-user education while preventing phishing threats. Consequently, our paper’s goal is demonstrate the different approaches to clone the webpage. We will start by going into great depth into the background of phishing attacks and the motivation of the perpetrators. Then, we will give a taxonomy of the many sorts of phishing.