• Like
Phishing technology
Upcoming SlideShare
Loading in...5
×

Phishing technology

  • 1,794 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,794
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
151
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Phishing TechnologyPresented byPreety PapnejaB.Tech (cs) 3rd yr
  • 2. 1.Introduction2.What is Phishing3.What might be the Phisher ask for4.How does it Work5.The simplified flow of information in a phishing attack6. What should I be aware of when receiving a suspicious email?7.What do I do if I get a phishing message?8.What do I do if I am unsure about a fraudulent email message?9.Why phishing is still popular10.How to protect yourself from phishing11. References
  • 3. Phishing:Pronounced "fishing“The word has its Origin from two words “PasswordHarvesting” or fishing for PasswordsPhishing is an online form of pretexting, a kind ofdeception in which an attacker pretends to be someoneelse in order to obtain sensitive information from thevictimAlso known as "brand spoofing“Phishers are phishing artists.The purpose of a phishing message is to acquiresensitive information about a user.
  • 4. What is phishingPhishing refers to a personor a group of cyber-criminals who create animitation or copy of anexisting legitimate web pageto trick users into providingsensitive personalinformation. Responding to“phishing” emails put youraccounts at risk.
  • 5. What might the phisher ask for?Your passwordAccount number, card number, Pin, access codePersonality identifiable information like your date of birth,Social Security number or addressConfidential information like student records, financial recordsor technical informationPhishers typically present a plausible scenario and often takeadvantage of the recipient’s fear, greed. They also often present asense of urgency. Example include message that:Tell you that your account was misused by you and will bedisabledTell you your account was compromised and will be disabled
  • 6. How does phishing Phishing attacks are most commonlywork transmitted via email, but they are also transmitted via:  Instant Messaging  Social media website such as fb, MySpace and Twitter The communicational may:  Ask you to reply with specific information  Ask you to visit a web page, then ask you to share specific information  Ask you to call a phone number, which will ask you to share specific information
  • 7. The Imbedded Web Address The next way phishing works is by redirecting the victimto a seemingly legitimate website from an email. The emailmay look likeit has been sent from a bank, the InternalRevenue Service or an online financial servicesuch as PayPal, escrow or an online financialrewards system. The website that the victim is redirectedto appears in every way to be real. Upon enteringusernames, passwords or any other vital information, it isnot unlikely that the website appears to crash. This isbecause the phisher has what he needs and doesn’t wantthe victim to find out about the phony website.
  • 8. The simplified flow of information in a phishingattack is:1. A deceptive message is sent from the phisher to the user.2. A user provides confidential information to a phishingserver (normally after some interaction with the server).3. The phisher obtain the confidential information from theserver.4. The confidential information is used to impersonate theuser.5. The phisher obtain illicit monetary gain.The discussion of technology countermeasures will centeron ways to disrupt steps 1,2 and 4, as well as relatedtechnologies outside the information flow proper.
  • 9. Look for the following clues:misspelled words, unprofessional tone, bad grammar,or other problems with the content.Other things to look for:they are asking you to verify your confidentialinformation, will hold you liable if you dont respond,telling you that the account will be closed if you dontrespond, etc. All these are signs of a phishing message.
  • 10. Original website Phishing website
  • 11. Report and forward the original email to the Information SecurityOffice at security@utep.edu.Do not reply to the sender of theemail.What do I do if I am unsure about a fraudulent emailmessage?Following these steps to minimize your chances of becoming avictim of fraud:1.Do not click on any links listed within the email message.2.Do not open any attachments included in the email.3.Forward the email message to The Information Security Office.4.Review your credit card and bank statements, and your bills, forunauthorized charges or withdrawals.5.Never enter personal information using a pop-upscreen. Legitimate companies will provide secure web forms foryou to fill out.
  • 12. Phishing had been widely used at least half a decade ago but it still remains as oneof the popular methods to scam internet users .Many of us might still be wonderingwhy there are so many victims out there even though we had been taught from timeto stay aware of a phishing scam. There are five reasons here why phishing is still apopular trick and below are the reasons.#1- it tricks the victim with fear:one of the most common method is to trick the victim by sendingthem an email and tell them that their internet banking account isbeing compromised and need to click on a link to resolve the issue.Once the user followed the link, the user will be redirected to someforged website that looks similar to the banking website whichrequires the user to input his/her username and password. Once thatform is sent, all the data will be transmitted to the attacker controlledserver.
  • 13. #2-it tricks the victim with special interest: Some scammers use the scenario such as winning lottery or viewingadult material to create a temptation for the victim to click on a linkthat redirects to the phishing site.#3-it is not a rocket science technology:Phishing attacks involves creating a forged website and it might bedifficult to certain people. However if it is compare to hacking abanking server, creating website is not that complicated. Thereforemany novice or intermediate scammer will choose to use thephishing method over any other method in their hacking project.#4-it can be launched via many types of communication channel:phishing can happen not only by simply building a forged websiteand anticipate for the victim to come to you. It can also involvesending emails to lure them to the forged website.
  • 14. Besides that, a phishing scam uses as well the manipulation of aURL and post it as a comment or forum to trick them to theforged website. Apart from using the computer knowledge to lure thevictim, phishing can also be done via phone calls. The conclusion isthis type of scam can be done via multiple channels and multipletechniques.#5-Compromising one account is not the end.After stealing one’s credentials is not the end, but it can be thebeginning. Why is it so? Internet users nowadays have manyonline accounts for instance Facebook , Twitter, and LinkedIn.In common, most users will use the same username andpassword for each of the account so that remembering them isnot an issue. Hence this can lead to the users’ credentials thathad been stolen can be used as well for other accounts by thescammers.
  • 15. How to Protect Yourself from PhishingThe following 10 steps will help protect yourself. Whilstwe have researched and made recommendations ofsoftware that will assist you, Fraud Watch Internationalmakes no warranties or guarantees about the products.1. Never Click on Hyperlinks within emailsWhy?Hyperlinks within emails are often cloaked, or hidden.The text you see as a hyperlink may not be where thehyperlink takes you.Recommendation:If you are unsure of the source of the email, you shouldnot click on hyperlinks within emails that are apparentlyfrom a legitimate company for personally sensitive
  • 16. information Instead, directly type in the URL in the Internetbrowser address bar, or call the company on a contact numberpreviously verified or known to be genuine.2. Use Anti-SPAM Filter SoftwareWhy?Some studies have shown around 85% of all email sent is SPAM,with a majority fraudulent. This can be costly and timeconsuming to end users who receive them. Effective SPAMfilters can reduce the number of fraudulent emails consumersare exposed to.3. Use Anti-Virus SoftwareWhy?To protect against Trojan and worm attacks, anti-virus softwarecan detect and delete virus files before they can attack acomputer.
  • 17. It is important to keep all anti-virus software up to datewith vendor updates. These virus programs can searchyour computer and pass this information to fraudsters.4. Use a Personal FirewallWhy?Firewalls can monitor both incoming and outgoingInternet traffic from a computer. This can protect thecomputer from being hacked into, and a virus beingplanted, and can also block unauthorized programs fromaccessing the Internet, such as Trojans, worms andspyware.
  • 18. 5. Keep Software Updated (Operating Systems & Browsers)Why?Fraudsters and malicious computer hackers are continually findingvulnerabilities in software operating systems and Internet Browsers.Software vendors are constantly updating their software to fix thesevulnerabilities and protect consumers.Recommendation:Always ensure operating and browser software is kept up to date usinglegitimate upgrades and patches issued by the software vendor. Visityour operating system vendors website for update information, andsubscribe to any automatic updating service.6. Always look for "https" and a padlock on a site that requestspersonal informationWhy?Information entered on an Internet Web Site can be interceptedby a third party. Web Sites that are secure protect against thisactivity
  • 19. Recommendation:When submitting sensitive financial and personal information on theInternet, look for the locked padlock on the Internet browsers status baror the “https://” at the start of the URL in the address bar. Although thereis no guarantee of the sites legitimacy or security if they are present, theabsence of these indicates that the web site is definitely not secure.7. Keep your Computer clean from SpywareWhy?Spyware & Adware are files that can be installed on your computer,even if you dont want them, without you knowing they are there!They allow companies to monitor your Internet browsing patterns,see what you purchase and even allow companies to inundate youwith those annoying "pop up" ads!If youve downloaded some music, files or documents and suddenlystarted getting annoying ads popping up on your screen, you coulddefinitely be infected with Spy Ware and/or Ad Ware!
  • 20. 8. Educate Yourself on Fraudulent Activity on the InternetWhy?Internet Fraud methods are evolving at a rapid rate.Consumers need to be aware they are vulnerable asfraudsters are persuasive and convincing; many victimsthought they were too smart to be scammed.Consumers should educate themselves on InternetFraud, the trends and continual changes in fraudulentmethods used. Fraud Watch International offersconsumer education as a free service to the Internetcommunity.
  • 21. 9. Check Your Credit Report Immediately, for Free!Why?If you have responded to a fraudulent email, youmay be at risk of identity theft. A virus could have beenimplanted within the email, which may find and pass onsensitive personal information about you to fraudsters, orif you have provided fraudsters with any personalinformation, you may be at risk of Identity Theft. Youshould check your credit report, and subscribe to a creditreport monitoring service, to be alerted if your personalinformation is used fraudulently.
  • 22. 10. Seek Advice - If you are unsure - ask us!Why?If unsure as to the legitimacy of an email, consumers should seekadvice from the legitimate corporation using verified contactdetails. For other potentially fraudulent emails, consumers canseek advice from Fraud Watch International by forwarding theemail with their questions to us. This is a free service to assist inthe prevention of Internet Fraud.Recommendation:You can seek advice from Fraud Watch International byforwarding the email with your questions toscams@fraudwatchinternational.com .
  • 23. www.identity-theft-scenarios.com/how-does-phishing-work.htmlwww.microsoft.com/security/online-privacy/phishing-symptoms.aspxwww.kbase.gfi.com/showarticle.asp?id=kbid002585www.antiphishing.orgwww.phishing1122.blogspot.comwww.planb-security.netwww.londonancestor.com
  • 24. Thank You