‘Permission Phishing’ or ‘Consent Phishing’: When hackers phish without stealing credentials, but with permissions instead. ‘Permission phishing’ is aimed at stealing permissions, and not at stealing passwords. The apps seeking permission appear harmless, but once permissions are granted, it can wreak havoc and gives access to hoards of sensitive data. In simple words, a hacker leads you to an app that asks you to grant permissions, and once permissions are granted, all underlying data and your authorisation are available to the hacker instantly and remain available until the token or permission is available to the hacker.