Your SlideShare is downloading. ×
0
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Phishing

2,190

Published on

Phishing intro, methodology, types, effects, identification, avoidance

Phishing intro, methodology, types, effects, identification, avoidance

Published in: Technology, Design
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,190
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
178
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. PHISHING ORIGINS The first documented use of the word"phishing" took place in 1996. Most peoplebelieve it originated as an alternative spellingof "fishing," as in "to fish for information"
  • 2. What is PHISHING“Phishing is an illegal activity using socialengineering techniques to fraudulentlysolicit sensitive information or installmalicious software.” Phishing attempts to obtain sensitive information such asusernames, passwords, personal information, militaryoperations details, financial information and so on. Phishing emails can also include malicious links orattachments.
  • 3. Emotional Triggers Exploited byPhishing Greed Fear Heroism Desire to be liked Authority
  • 4. Example Suppose you check your e-mail one day and find amessage from your bank. Youve gotten e-mail fromthem before, but this one seems suspicious,especially since it threatens to close your account ifyou dont reply immediately. This message and others like it are examplesof phishing, a method of online identity theft. In addition to stealing personal and financial data,phishers can infect computers with viruses.
  • 5. Tools and Tactics Using IP addresses instead of domain names in hyperlinks thataddress the fake web site. Registering similar sounding DNS domains and setting up fake websites that closely mimic the domain name of the target web site. Embedding hyperlinks from the real target web site into the HTMLcontents of an email about the fake phishing web site, so that theusers web browser makes most of the HTTP connections to thereal web server and only a small number of connections to the fakeweb server.If the users email client software supports auto-rendering ofthe content, their client may attempt to connect automatically to thefake web server as soon as the email is read, and manual browsersmay not notice the small number of connections to a maliciousserver amongst the normal network activity to the real web site.
  • 6. Effects of Phishing Identity theft Internet fraud Financial loss to the original institutions Difficulties in Law EnforcementInvestigations Erosion of Public Trust in the Internet.
  • 7. STATISTICSIndustries most affected by phishing:oFinancialoPayment ServicesoGamingoRetailoSocial Networks
  • 8. STATISTICSNumber of brands effected
  • 9. Types of Phishing Deceptive - Sending a deceptive email, in bulk, with a “call to action”that demands the recipient click on a link. Malware-Based - Running malicious software on the user’s machine. Content-Injection – Inserting malicious content into legitimate site. Man-in-the-Middle Phishing - Phisher positions himself between theuser and the legitimate site. Search Engine Phishing - Create web pages for fake products, getthe pages indexed by search engines, and wait for users to enter theirconfidential information as part of an order, sign-up, or balancetransfer.
  • 10. Identifying a phishing scamPhishing scams tend to have commoncharacteristics which make them easy to identify. Spelling and punctuation errors. Include a redirect to malicious URL’s whichrequire you input usernames and passwords toaccess. Try to appear genuine by using legitimateoperational terms, key words, company logosand accurate personal information. Fake or unknown sender.
  • 11. Identifying a phishingscam(ctd) Scare tactics to entice a target to provide personal informationor follow links. Sensational subject lines to entice targets to click on attachedlinks or provide personal information.
  • 12. Example
  • 13. Example• Yahoo link URL spoofing• A fake or forged URLwhich impersonates alegitimate website.• Requests credit cardinformation• Threatens serviceinterruption
  • 14. Example
  • 15. How to avoid a phishing scamProtect yourself from phishing scams: Think before you open Beware the unknown sender or sensational subject line. Be suspicious of any email with urgent requests forpersonal financial information Regularly check your bank, credit and debit cardstatements to ensure that all transactions are legitimate Install latest anti-virus packages Inspect the address bar and SSL certificate Digitally sign and encrypt emails where ever possible.
  • 16. How to avoid a phishingscam(ctd) Do not follow links included in emails or textmessages, use a known good link instead. Do not follow links to unsubscribe from spam,simply mark as spam and delete.. You will never get a free iPad, don’t fill anythingout!
  • 17. Anti-Phishing Working Group(anti-phishing.org ) The organization provides a forum to discuss phishingissues, define the scope of the phishing problem in termsof hard and soft costs, and share information and bestpractices for eliminating the problem. The APWG has over 2300+ members from over 1500companies & agencies worldwide. Member companiesinclude leading security companies such as○ Symantec○ McAfee○ Kaspersky Financial Industry members include○ VISA○ Mastercard○ American Bankers Association.
  • 18. REFERENCES http://www.antiphishing.org/reports/apwg_report_november_2006.pdf http://72.14.235.104/search?q=cache:-T6-U5dhgYAJ:www.avira.com/en/threats/what_is_phishing.html+Phishing+consequences&hl=en&gl=in&ct=clnk&cd=7 Phishing-dhs-report.pdf Report_on_phishing.pdf http://www.cert-in.org.in/training/15thjuly05/phishing.pdf http://www.antiphishing.org
  • 19. YOUR PASSWORD, YOUR DATA, YOUR LIFE!!!!

×