SlideShare a Scribd company logo
1 of 13
China’s Phishing Problem
0In 2012 alone, China reported that 100,402 phishing websites had
been handled and removed
0There could be over 3.16 million phishing websites throughout all
of China and the various search engines
0The top phishing website types include counterfeit banking,
counterfeit prize winning information, and counterfeit shopping
Prevalent Phishing Attacks
1. Lottery Scams
2. Fake Websites
3. SMS Spam
Lottery Scams
0Over 70% of scams
0Step 1: Email or Instant Message stating you have won a prize at
website
0Step 2: Brings to fake website that pretends to be real website such
as CCTV, Taobao.com
0Step 3: Website asks user to pay income tax or notary fee before
accepting their prize
Fake Websites
0“There exists a possibility for website information to mislead visitors and
the used domain name is identical or similar with that of counterfeited
website
0Online templates are available to create fake websites exactly the same as
popular websites
0Commercial Bank of China: “icbc.com.cn” vs. “1cbc.com.cn”
Taobao.com
0In June 2014,
97.49% of all the
reported phishing
websites copied the
websites of
Tabao.com, IMBC,
Hunan TV, and CCTV
Example of
Fake
Website
Short Message Service (SMS) Spam
0In India and China, 30 to 40 percent of messages sent to mobile
users are spam.
0China's Ministry of Public Security said that it had identified
3,540 cases of suspected crimes, including one case where the
Liaoning Province gang is suspected of sending out over 200
million spam messages.
SMS Spam Phishing Attack
0The attack will ask a person to call their bank. The number
provided, however, isn't the bank's, but the scammers have
replicated the voice prompts. The prompts will then ask for
personal information, such as account details.
0Users can also be tricked into subscribing to premium text
messages by a malicious mobile app where they can be
charged every time they receive the spam text message
Examples
Anti-Phishing Alliance of China
0Founded on July 18, 2008, the Anti-Phishing Alliance of China
("APAC") is made up of domestic banks, securities institutions,
experts and scholars, and 500 other members serving as the
only coordination organization for the purpose of solving the
problem of phishing.
0APAC is the first non-governmental industrial coordination
organization in China established for the sole purpose of
solving this problem
Chinese Government
0On December 30, 2011, the Ministry of Public Security said
that it will be working with ten of the Chinese search engines
to protect the websites rankings of financial institutions.
References
0 Anti-Phishing Alliance of China. (n.d.) 2012 Annual report.[PDF Document] Retrieved from
http://en.apac.org.cn/news/201408/P020140827526790657014.pdf
0 Anti-Phishing Alliance of China. (n.d.) Briefing on Handling of Phishing Websites in June 2014.
[PDF Document] Retrieved from
http://en.apac.org.cn/Briefing_on_Handling_of_Phishing_Websites/201408/P020140827
538695463663.pdf
0 Chinese government takes safety measures on phishing attacks. (2012). Retrieved October 8,
2015, from http://asiabizz.com/9191/chinese-governmenttakes-safety-measures-on-
phishing-attacks/
0 J, Zhu. (n.d.) Phishing and Online Scams in China. [PDF Document] Retrieved from
http://en.apac.org.cn/About_Us/Processing/201408/t20140827_48690.html
0 Kirk, J. (n.d.). Cloudmark Security Suite Addresses Growing SMS Spam. Retrieved October 6,
2015, from http://www.pcworld.com/article/167200/article.html
0 Russon, M. (2014, March 27). China Arrests 1,500 People for Sending Spam Text Messages
from Fake Mobile Base Stations. Retrieved October 3, 2015, from
http://www.ibtimes.co.uk/china-arrests-1500-people-sending-spam-text-messages-fake-
mobile-base-stations-1442099

More Related Content

What's hot

Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Bigger Price
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
Online payment gateway service providers testware informatics
Online payment gateway service providers testware informaticsOnline payment gateway service providers testware informatics
Online payment gateway service providers testware informaticsyathishbesant
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...AuthBridge
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are hereAbhay pal
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threatsdaisy_maggs
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDFelipe Prado
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 

What's hot (18)

Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Online payment gateway service providers testware informatics
Online payment gateway service providers testware informaticsOnline payment gateway service providers testware informatics
Online payment gateway service providers testware informatics
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Research Article
Research ArticleResearch Article
Research Article
 
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...
AuthBridge Newsletter Issue 5- Background Screening is Important Across the H...
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are here
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threats
 
It act
It actIt act
It act
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 

Similar to Phishing in China

Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control AuthorityDaily 10 Minutes
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET Journal
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Fraudsters
FraudstersFraudsters
FraudstersYanivt
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
What is Money Laundering - An Introduction
What is Money Laundering - An Introduction What is Money Laundering - An Introduction
What is Money Laundering - An Introduction Peter Lilley
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
Chinese digital market 2018
Chinese digital market 2018Chinese digital market 2018
Chinese digital market 2018Yang Huang
 
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMS
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMSHOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMS
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMSSteven Rhyner
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceSyed Danish Ali
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxAbhishek356846
 

Similar to Phishing in China (20)

Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Fraudsters
FraudstersFraudsters
Fraudsters
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
What is Money Laundering - An Introduction
What is Money Laundering - An Introduction What is Money Laundering - An Introduction
What is Money Laundering - An Introduction
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Chinese digital market 2018
Chinese digital market 2018Chinese digital market 2018
Chinese digital market 2018
 
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMS
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMSHOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMS
HOW INVESTORS CAN PROTECT THEMSELVES AGAINST BITCOIN SCAMS
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insurance
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptx
 

Phishing in China

  • 1.
  • 2. China’s Phishing Problem 0In 2012 alone, China reported that 100,402 phishing websites had been handled and removed 0There could be over 3.16 million phishing websites throughout all of China and the various search engines 0The top phishing website types include counterfeit banking, counterfeit prize winning information, and counterfeit shopping
  • 3. Prevalent Phishing Attacks 1. Lottery Scams 2. Fake Websites 3. SMS Spam
  • 4. Lottery Scams 0Over 70% of scams 0Step 1: Email or Instant Message stating you have won a prize at website 0Step 2: Brings to fake website that pretends to be real website such as CCTV, Taobao.com 0Step 3: Website asks user to pay income tax or notary fee before accepting their prize
  • 5. Fake Websites 0“There exists a possibility for website information to mislead visitors and the used domain name is identical or similar with that of counterfeited website 0Online templates are available to create fake websites exactly the same as popular websites 0Commercial Bank of China: “icbc.com.cn” vs. “1cbc.com.cn”
  • 6. Taobao.com 0In June 2014, 97.49% of all the reported phishing websites copied the websites of Tabao.com, IMBC, Hunan TV, and CCTV
  • 8. Short Message Service (SMS) Spam 0In India and China, 30 to 40 percent of messages sent to mobile users are spam. 0China's Ministry of Public Security said that it had identified 3,540 cases of suspected crimes, including one case where the Liaoning Province gang is suspected of sending out over 200 million spam messages.
  • 9. SMS Spam Phishing Attack 0The attack will ask a person to call their bank. The number provided, however, isn't the bank's, but the scammers have replicated the voice prompts. The prompts will then ask for personal information, such as account details. 0Users can also be tricked into subscribing to premium text messages by a malicious mobile app where they can be charged every time they receive the spam text message
  • 11. Anti-Phishing Alliance of China 0Founded on July 18, 2008, the Anti-Phishing Alliance of China ("APAC") is made up of domestic banks, securities institutions, experts and scholars, and 500 other members serving as the only coordination organization for the purpose of solving the problem of phishing. 0APAC is the first non-governmental industrial coordination organization in China established for the sole purpose of solving this problem
  • 12. Chinese Government 0On December 30, 2011, the Ministry of Public Security said that it will be working with ten of the Chinese search engines to protect the websites rankings of financial institutions.
  • 13. References 0 Anti-Phishing Alliance of China. (n.d.) 2012 Annual report.[PDF Document] Retrieved from http://en.apac.org.cn/news/201408/P020140827526790657014.pdf 0 Anti-Phishing Alliance of China. (n.d.) Briefing on Handling of Phishing Websites in June 2014. [PDF Document] Retrieved from http://en.apac.org.cn/Briefing_on_Handling_of_Phishing_Websites/201408/P020140827 538695463663.pdf 0 Chinese government takes safety measures on phishing attacks. (2012). Retrieved October 8, 2015, from http://asiabizz.com/9191/chinese-governmenttakes-safety-measures-on- phishing-attacks/ 0 J, Zhu. (n.d.) Phishing and Online Scams in China. [PDF Document] Retrieved from http://en.apac.org.cn/About_Us/Processing/201408/t20140827_48690.html 0 Kirk, J. (n.d.). Cloudmark Security Suite Addresses Growing SMS Spam. Retrieved October 6, 2015, from http://www.pcworld.com/article/167200/article.html 0 Russon, M. (2014, March 27). China Arrests 1,500 People for Sending Spam Text Messages from Fake Mobile Base Stations. Retrieved October 3, 2015, from http://www.ibtimes.co.uk/china-arrests-1500-people-sending-spam-text-messages-fake- mobile-base-stations-1442099

Editor's Notes

  1. http://en.apac.org.cn/news/201408/P020140827526790657014.pdf
  2. https://www.defcon.org/images/defcon-19/dc-19-presentations/Zhu/DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf
  3. http://en.apac.org.cn/About_Us/Processing/201408/t20140827_48690.html
  4. http://en.apac.org.cn/Briefing_on_Handling_of_Phishing_Websites/201408/P020140827538695463663.pdf
  5. http://www.pcworld.com/article/167200/article.html
  6. http://www.pcworld.com/article/167200/article.html http://www.ibtimes.co.uk/china-arrests-1500-people-sending-spam-text-messages-fake-mobile-base-stations-1442099
  7. http://asiabizz.com/9191/chinese-governmenttakes-safety-measures-on-phishing-attacks/