Know your Enemy: Phishing
This white paper includes extensive amounts of supporting information, with many hyperlinks to more detailed data on specific attacks available inline. Lastly, no confidential personal data was collected in the process of this research. In some cases, organizations involved in phishing attacks were contacted directly, or the incident data was forward to the local CERT.
The link for this article located at The Honeynet Project is no longer available.