SlideShare a Scribd company logo
Phishing and Identity Theft
Objectives
• Learn about Phishing and its related techniques.
• Understand different methods of Phishing.
• Learn about Identity Theft and understand ID theft.
• Understand myths and facts about ID theft.
• Understand different types of ID thefts.
• Learn about different techniques of ID theft.
• Get an overview of 3P’s of cybercrime (Phishing, Pharming
and Phoraging).
• Understand about Spear Phishing.
• Overview of Whaling.
Introduction
• Phishing has become a universal
phenomenon and a major threat worldwide
that affect not only individuals but also all
industries and businesses that have an online
presence and do online transactions over the
internet.
• The statistics about phishing attacks/scams
proves phishing to be a dangerous enemy
among all the methods because prime
objective this attack is ID theft.
Facts about Phishing
• According to world phishing map available at www.avira.com
most phishing attacks are on the rise of Asia, Europe and
North America.
• Facebook, HSBC, Paypal and Bank of America are most
targeted organization in phishing attacks.
• US, India and China are the most targeted countries.
• Total 3650 non-English (Italian an Chinese) sites are recorded
in the month of may 2009.
• The most used TLDs in phishing websites during the month of
May 2009 were “.com”, “.net” and “.org” .
• Financial organizations, payment services and auction
websites are ranked as most targeted industries.
• Port 80 is found most popular followed by port 443 and 8080.
Phishing
• The word phishing comes from the analogy
that internet scammers are using E-Mail lures
to fish for passwords and financial data from
the sea of Internet users.
• It is criminally fraudulent process of
attempting to acquire sensitive information
such as username, password and credit card
details by hiding as trustworthy entity in an
electronic communication.
…cont.
• Phishing is a type of deception designed to steal
your identity.
• In phishing technique user tries to get the user
disclose valuable personal data- such as credit
card numbers, password, account data and
other information by convicting the user to
provide it under false pretenses.
• E-Mail is the popular medium used in the
phishing attacks and such E-Mails are also
called Spam's.
Spam E-Mail
• Spam E-Mail are also know as junk mails.
• Botnets, networks of virus infected
computers are used to send about 80% of
spam. Types of Spam mail are:
– Unsolicited bulk E-Mail
– Unsolicited commercial E-Mail
SPAMBOTS
• Spambot is an automated computer program
and/or a script developed, mostly into C
language to send SPAM mails.
• SPAPMBOTS gather E-Mail ids from the
internet, build mailing lists to send unsolicited
mails.
CANSPAM
• The CANSPAM act of 2003 was signed in US.
• The CAN-SPAM act is commonly referred to as
You can Spam. In particular, it does not require
E-Mailers to get permission before they send
marketing messages.
Tricks used for Phishing
• Name of legitimate organization: Here
phishers may use a legitimate company’s
name and incorporate the look and feel of
its website into the spam E-Mail.
• “From” a real employee: Real name of an
official, who actually works for an
organization, will actually appear in the
from line or the text of the message.
Tricks used for Phishing
• URLs that “look right” : The E-Mail might
contain a URL which seems to be
legitimate website wherein use can enter
the information the phisher would like to
steal. However actually the website will be
a quickly cobbled – a spoofed website that
looks like the real website.
Tricks used for Phishing
• Urgent Message: Creating a fear to trigger
a response is very common in phishing
attack- the E-Mail warn that failure to
respond will result in longer having access
the account. Few examples used by
phishers to attract the user are:
– Verify your account
– You have won the lottery
– If you don’t respond in 48 hours your account
will be closed.
How to prevent from Phishing
• Share Personal E-Mail address with
limited persons.
• Never reply a SPAM mail.
• Use alternate E-Mail address to register
for any personal or shopping website.
• Don’t forward any mail from unknown
recipient.
Methods of Phishing
• Dragnet
• Rod and reel
• Lobsterpot
• Gillnet
Dragnet
• This method involves the use of spammed E-Mail,
bearing inaccurate corporate identification (e.g.
corporate names, logos and trademark) which are
addressed to a large group of people.
• Dragner phishers do not identify specific
prospective victims in advance. Instead they rely
on false information included in the E-Mail to
trigger an immediate response by victims- typically
clicking on links on the body of E-Mail to take the
victims to the web sites or pop up windows where
they are requested to enter bank or credit card
details.
Rod and reel
• In this method, phishers identify specific
victims in advance, and convey false
information to them to prompt their
disclosure of personal and financial data.
• For example on a phony web page,
availability of similar item for a better price
is displayed and upon visiting the
webpage, victims were asked to enter
personal information.
Lobsterpot
• This method focuses on use of spoofed
web site. It consists of creating of
bogus/phony website.
• This attack is also known as content
injection phishing. The attacker uses a
weblink into an E-Mail message to make it
look more legitimate and actually take the
victim to a phony scam site.
Gillnet
• In this technique phishers introduce
malicious code into E-Mails and websites.
• They can for example misuse browser
functionality by injecting aggressive
content into another site’s pop window.
• In some cases, the malicious code will
change setting in users system so that
users who want to visit legitimate banking
websites will be redirected to a look alike
phishing site.
Phishing Techniques
• URL manipulation: URLs are the weblinks
that direct the users to a specific
website.For example instead of
www.abcbank.com URL is provided as
www.abcbank1.com.
• Filter: This technique use graphics instead
of text to prevent from netting such E-
Mails by anti phishing filters.
Phishing Techniques
• Website Forgery: In this technique the
phisher directs the netizens to the website
designed and developed by him, by
altering the browser address bar through
java script commands
• Flash Phishing: Anti phishing toolbar are
installed/enabled to help checking the
webpage content for signs of phishing
Phishing Techniques
• Social Phishing: Phishers entice the
netizens to reveal sensitive data by other
means for example:
– By sending a mail where ask user to call them
back because there was a security breach.
– The phone number provided in the mail is
false number
– Phishers speak with the victim in the similar
fashion as bank employee.
Phishing Techniques
• Phone Phishing: This is known as Mishing,
where phisher can use a fake caller ID
data to make it appear that the call is
received from a trusted organization to
entice the user to reveal their personal
information.

More Related Content

Similar to Chapter-5.pptx

edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
ArchaWashington
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
IB Fraud
IB FraudIB Fraud
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
Aaron Keating
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
806670
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 

Similar to Chapter-5.pptx (20)

edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 

Chapter-5.pptx

  • 2. Objectives • Learn about Phishing and its related techniques. • Understand different methods of Phishing. • Learn about Identity Theft and understand ID theft. • Understand myths and facts about ID theft. • Understand different types of ID thefts. • Learn about different techniques of ID theft. • Get an overview of 3P’s of cybercrime (Phishing, Pharming and Phoraging). • Understand about Spear Phishing. • Overview of Whaling.
  • 3. Introduction • Phishing has become a universal phenomenon and a major threat worldwide that affect not only individuals but also all industries and businesses that have an online presence and do online transactions over the internet. • The statistics about phishing attacks/scams proves phishing to be a dangerous enemy among all the methods because prime objective this attack is ID theft.
  • 4. Facts about Phishing • According to world phishing map available at www.avira.com most phishing attacks are on the rise of Asia, Europe and North America. • Facebook, HSBC, Paypal and Bank of America are most targeted organization in phishing attacks. • US, India and China are the most targeted countries. • Total 3650 non-English (Italian an Chinese) sites are recorded in the month of may 2009. • The most used TLDs in phishing websites during the month of May 2009 were “.com”, “.net” and “.org” . • Financial organizations, payment services and auction websites are ranked as most targeted industries. • Port 80 is found most popular followed by port 443 and 8080.
  • 5. Phishing • The word phishing comes from the analogy that internet scammers are using E-Mail lures to fish for passwords and financial data from the sea of Internet users. • It is criminally fraudulent process of attempting to acquire sensitive information such as username, password and credit card details by hiding as trustworthy entity in an electronic communication.
  • 6. …cont. • Phishing is a type of deception designed to steal your identity. • In phishing technique user tries to get the user disclose valuable personal data- such as credit card numbers, password, account data and other information by convicting the user to provide it under false pretenses. • E-Mail is the popular medium used in the phishing attacks and such E-Mails are also called Spam's.
  • 7. Spam E-Mail • Spam E-Mail are also know as junk mails. • Botnets, networks of virus infected computers are used to send about 80% of spam. Types of Spam mail are: – Unsolicited bulk E-Mail – Unsolicited commercial E-Mail
  • 8. SPAMBOTS • Spambot is an automated computer program and/or a script developed, mostly into C language to send SPAM mails. • SPAPMBOTS gather E-Mail ids from the internet, build mailing lists to send unsolicited mails.
  • 9. CANSPAM • The CANSPAM act of 2003 was signed in US. • The CAN-SPAM act is commonly referred to as You can Spam. In particular, it does not require E-Mailers to get permission before they send marketing messages.
  • 10. Tricks used for Phishing • Name of legitimate organization: Here phishers may use a legitimate company’s name and incorporate the look and feel of its website into the spam E-Mail. • “From” a real employee: Real name of an official, who actually works for an organization, will actually appear in the from line or the text of the message.
  • 11. Tricks used for Phishing • URLs that “look right” : The E-Mail might contain a URL which seems to be legitimate website wherein use can enter the information the phisher would like to steal. However actually the website will be a quickly cobbled – a spoofed website that looks like the real website.
  • 12. Tricks used for Phishing • Urgent Message: Creating a fear to trigger a response is very common in phishing attack- the E-Mail warn that failure to respond will result in longer having access the account. Few examples used by phishers to attract the user are: – Verify your account – You have won the lottery – If you don’t respond in 48 hours your account will be closed.
  • 13. How to prevent from Phishing • Share Personal E-Mail address with limited persons. • Never reply a SPAM mail. • Use alternate E-Mail address to register for any personal or shopping website. • Don’t forward any mail from unknown recipient.
  • 14. Methods of Phishing • Dragnet • Rod and reel • Lobsterpot • Gillnet
  • 15. Dragnet • This method involves the use of spammed E-Mail, bearing inaccurate corporate identification (e.g. corporate names, logos and trademark) which are addressed to a large group of people. • Dragner phishers do not identify specific prospective victims in advance. Instead they rely on false information included in the E-Mail to trigger an immediate response by victims- typically clicking on links on the body of E-Mail to take the victims to the web sites or pop up windows where they are requested to enter bank or credit card details.
  • 16. Rod and reel • In this method, phishers identify specific victims in advance, and convey false information to them to prompt their disclosure of personal and financial data. • For example on a phony web page, availability of similar item for a better price is displayed and upon visiting the webpage, victims were asked to enter personal information.
  • 17. Lobsterpot • This method focuses on use of spoofed web site. It consists of creating of bogus/phony website. • This attack is also known as content injection phishing. The attacker uses a weblink into an E-Mail message to make it look more legitimate and actually take the victim to a phony scam site.
  • 18. Gillnet • In this technique phishers introduce malicious code into E-Mails and websites. • They can for example misuse browser functionality by injecting aggressive content into another site’s pop window. • In some cases, the malicious code will change setting in users system so that users who want to visit legitimate banking websites will be redirected to a look alike phishing site.
  • 19. Phishing Techniques • URL manipulation: URLs are the weblinks that direct the users to a specific website.For example instead of www.abcbank.com URL is provided as www.abcbank1.com. • Filter: This technique use graphics instead of text to prevent from netting such E- Mails by anti phishing filters.
  • 20. Phishing Techniques • Website Forgery: In this technique the phisher directs the netizens to the website designed and developed by him, by altering the browser address bar through java script commands • Flash Phishing: Anti phishing toolbar are installed/enabled to help checking the webpage content for signs of phishing
  • 21. Phishing Techniques • Social Phishing: Phishers entice the netizens to reveal sensitive data by other means for example: – By sending a mail where ask user to call them back because there was a security breach. – The phone number provided in the mail is false number – Phishers speak with the victim in the similar fashion as bank employee.
  • 22. Phishing Techniques • Phone Phishing: This is known as Mishing, where phisher can use a fake caller ID data to make it appear that the call is received from a trusted organization to entice the user to reveal their personal information.