SlideShare a Scribd company logo
1 of 20
Download to read offline
01
Seminar
M.B.E.SOCIETY’S COLLEGE OF ENGINEERING
AMBAJOGAI
Department of Computer Science and Engineering
PHISHING ATTACK
Seminar On
By :
ANIKET PANDIT
Guidance by :
PROF. PRITI PANCHAL
03
Contents
• Introduction
• What is phishing attack
• Typical Scenario of phishing
• History of phishing attack
• Types of phishing attack & it's example
• Phishing statistics in india
• Prevention from phishing attack
• Anti-phishing software
• Punishment & Cyber law
• Conclusion
• Reference
04
Introduction
Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
05
What is
Phishing?
The term Phishing can be
defined as an act of attempting
to acquire sensitive information
by pretending to be a
trustworthy entity.
Typical Scenario of Phishing Attacks
06
07
The first phishing attempt is
recorded on America online (AOL).
Hacker attempt to steal login
credentials & personal information
from AOL to resell online.
1990
Th riseof E-commerce encourages
cyber criminals to create spoofed
websites, impersonating popular
domain like ebay & PayPal.
Bitcoin & crypto currency are
launched this increases the creation
of malware as it is easier for cyber
criminals to securely receive
payment from their victims
History of Phishing Attack
2000
2008
2013
2019
Cyber criminals begin
hiding malicious code
inside image files to slip
through user's anti-virus
software
Phishing becomes the
primary technique to
deliver ransomware
08
Types of Phishing Attacks
EMAIL PHISHING
SPEAR PHISHING VOICE PHISHING
CLONE PHISHING
09
Email Phishing &
it's Example
The most widely known form of
phishing, this attack is an attempt
to steal sensitive information via an
email that appears to be from a
legitimate organization.
10
Spear Phishing &
it's Example
These email messages are sent to
specific people within an
organization, usually high-privilege
11
Clone Phishing &
it's Example
In this type of phishing, the attacker
clones a genuine or legitimate email
that you might have received from an
authentic sender but sent from a
spoofed email id
12
Voice Phishing &
it's Example
Vishing—or voice phishing—is the
use of fraudulent phone calls to trick
people into giving money or
revealing personal information.
0 20,000 40,000 60,000
2012
2013
2014
2015
2016
2017
2018
2019
2020
Number of cyber crimes
reported across India
PHISHING ATTACK STATISTICS IN INDIA
13
Around 83% of IT teams in
Indian organizations said the
number of phishing emails
targeting their employees
increased during 2020
83%
Most targeted industry in India,
first quarter of 2021
PHISHING ATTACK STATISTICS IN INDIA
Financial Institution
24.7%
Socila Media
23.7%
SaaS
19.7%
Payment
8.5%
Othe
r
8%
E-commerce
7.6%
Logistics and shipping
5.8%
14
During the first quarter of 2021,
24.9% of phishing attacks
worldwide were directed towards
financial institution
On top of that, social media
accounted for 23.6 percent of
attacks making these two the
highest targeted industries when it
came to phishing during this
period.
• Know what a phishing scam look like
• Don't click on that link
• Don't give your information to
unsecured site
• 
Rotate your password regularly
• 
Install Firewalls
• 
Install Anti-phishing software
PREVENTIONS FROM PHISHING
ATTACK
15
ANTI-PHISHING SOFTWARE
Area 1 Horizon
GreatHorn
IronScale
Cloud based service that offer protection from
phishing on Email & network based vectors
This cloud- native email security service protect from
phishing attack on office 365, email carrying
ransomware
This is a self learning email security platform powered
by AI. It can help you to detect & predict phishing
attacks. 16
Hacking into a computer network, data theft,
introducing and spreading viruses through computer
networks, This is a punishable offence under Section
43 of the Information Technology Act, 2000 with the
maximum punishment for the above offences is
imprisonment of up to 3 years or a fine or Rs.
5,00,000 (Rupees five lac) or both.
PUNISHMENT AND CYBER LAW
17
No single technology will completely stop Phishing
Attacks.
CONCLUSION
However a combination of good organization and
practice, proper application of current
technologies and improvement in security
technology has the potential to drastically reduce
the prevalence of phishing and the losses suffered
from it.
18
www.phishing.org
REFERENCE
Phishing Exposed

Social engineering
Phishing Attacks (IEEE subject)
Books
Websites
19
20
Thank You

More Related Content

Similar to phishingattackseminarpresentation-211230055252.pdf

Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 

Similar to phishingattackseminarpresentation-211230055252.pdf (20)

Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 

Recently uploaded

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

phishingattackseminarpresentation-211230055252.pdf

  • 1. 01 Seminar M.B.E.SOCIETY’S COLLEGE OF ENGINEERING AMBAJOGAI Department of Computer Science and Engineering
  • 2. PHISHING ATTACK Seminar On By : ANIKET PANDIT Guidance by : PROF. PRITI PANCHAL
  • 3. 03 Contents • Introduction • What is phishing attack • Typical Scenario of phishing • History of phishing attack • Types of phishing attack & it's example • Phishing statistics in india • Prevention from phishing attack • Anti-phishing software • Punishment & Cyber law • Conclusion • Reference
  • 4. 04 Introduction Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  • 5. 05 What is Phishing? The term Phishing can be defined as an act of attempting to acquire sensitive information by pretending to be a trustworthy entity.
  • 6. Typical Scenario of Phishing Attacks 06
  • 7. 07 The first phishing attempt is recorded on America online (AOL). Hacker attempt to steal login credentials & personal information from AOL to resell online. 1990 Th riseof E-commerce encourages cyber criminals to create spoofed websites, impersonating popular domain like ebay & PayPal. Bitcoin & crypto currency are launched this increases the creation of malware as it is easier for cyber criminals to securely receive payment from their victims History of Phishing Attack 2000 2008 2013 2019 Cyber criminals begin hiding malicious code inside image files to slip through user's anti-virus software Phishing becomes the primary technique to deliver ransomware
  • 8. 08 Types of Phishing Attacks EMAIL PHISHING SPEAR PHISHING VOICE PHISHING CLONE PHISHING
  • 9. 09 Email Phishing & it's Example The most widely known form of phishing, this attack is an attempt to steal sensitive information via an email that appears to be from a legitimate organization.
  • 10. 10 Spear Phishing & it's Example These email messages are sent to specific people within an organization, usually high-privilege
  • 11. 11 Clone Phishing & it's Example In this type of phishing, the attacker clones a genuine or legitimate email that you might have received from an authentic sender but sent from a spoofed email id
  • 12. 12 Voice Phishing & it's Example Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information.
  • 13. 0 20,000 40,000 60,000 2012 2013 2014 2015 2016 2017 2018 2019 2020 Number of cyber crimes reported across India PHISHING ATTACK STATISTICS IN INDIA 13 Around 83% of IT teams in Indian organizations said the number of phishing emails targeting their employees increased during 2020 83%
  • 14. Most targeted industry in India, first quarter of 2021 PHISHING ATTACK STATISTICS IN INDIA Financial Institution 24.7% Socila Media 23.7% SaaS 19.7% Payment 8.5% Othe r 8% E-commerce 7.6% Logistics and shipping 5.8% 14 During the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institution On top of that, social media accounted for 23.6 percent of attacks making these two the highest targeted industries when it came to phishing during this period.
  • 15. • Know what a phishing scam look like • Don't click on that link • Don't give your information to unsecured site •  Rotate your password regularly •  Install Firewalls •  Install Anti-phishing software PREVENTIONS FROM PHISHING ATTACK 15
  • 16. ANTI-PHISHING SOFTWARE Area 1 Horizon GreatHorn IronScale Cloud based service that offer protection from phishing on Email & network based vectors This cloud- native email security service protect from phishing attack on office 365, email carrying ransomware This is a self learning email security platform powered by AI. It can help you to detect & predict phishing attacks. 16
  • 17. Hacking into a computer network, data theft, introducing and spreading viruses through computer networks, This is a punishable offence under Section 43 of the Information Technology Act, 2000 with the maximum punishment for the above offences is imprisonment of up to 3 years or a fine or Rs. 5,00,000 (Rupees five lac) or both. PUNISHMENT AND CYBER LAW 17
  • 18. No single technology will completely stop Phishing Attacks. CONCLUSION However a combination of good organization and practice, proper application of current technologies and improvement in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. 18