SlideShare a Scribd company logo
1 of 43
Something In the Library Smells Phishy
Presented by Nicholas Davis, CISSP, CISA
OverviewOverview
Phishing Background
Threat to IT on campus
Phishing education
Tricks employed
Sample phishing emails unique to UW-
Madison
Spotting the phish, after the click
10 quick tests for the audience!
Q&A
03/18/14 UNIVERSITY OF WISCONSIN 2
Phishing DefinedPhishing Defined
Phishing is the act of attempting to
acquire information such as usernames,
passwords, and credit card details (and
sometimes, indirectly, money) by
masquerading as a trustworthy entity in
an electronic communication, usually
email.
03/18/14 UNIVERSITY OF WISCONSIN 3
Why Phishing Is Such a ThreatWhy Phishing Is Such a Threat
UW-Madison IT infrastructure is
designed to protect the campus
computing assets with many technical
controls
However, this persuades hackers to
pursue access via alternate means, often
choosing to exploit the human factor
03/18/14 UNIVERSITY OF WISCONSIN 4
Your Password Is the Key to theYour Password Is the Key to the
KingdomKingdom
If an attacker can
persuade you to give
them your
password, they can
evade all the
controls put in place
to protect sensitive
systems
03/18/14 UNIVERSITY OF WISCONSIN 5
UW-Madison’s ProprietaryUW-Madison’s Proprietary
Research Interests PhishersResearch Interests Phishers
Consider the value
of UW-Madison’s
intellectual
property
03/18/14 UNIVERSITY OF WISCONSIN 6
I am Too Smart to Fall For aI am Too Smart to Fall For a
Trick Like PhishingTrick Like Phishing
Most large organizations have a
phishing participation rate of around
10%
This rises when the population become
the subjects of Spear Phishing, which is
phishing email designed specifically for
the recipient
03/18/14 UNIVERSITY OF WISCONSIN 7
Phishing Relies Upon SocialPhishing Relies Upon Social
EngineeringEngineering
The practice of deceiving someone,
either in person, over the phone, or
using a computer, with the express
intent of breaching some level of
security either personal or professional.
Social engineering techniques are
considered con games which are
performed by con artists. The targets of
social engineering may never realize
they have been victimized.
03/18/14 UNIVERSITY OF WISCONSIN 8
Tricks Used By Expert PhishersTricks Used By Expert Phishers
Socially Aware: Mining of information
about the target from publicly available
resources, such as Facebook, property
records, or even CCAP
Context Aware: Make reference to an
activity you are likely to engage in, such
as Amazon.com, or UPS package receipt
03/18/14 UNIVERSITY OF WISCONSIN 9
Specific Examples of ComplexSpecific Examples of Complex
Phishing AttemptsPhishing Attempts
Baiting: Placing a USB flash drive or CD,
with malware on it, in a public place
03/18/14 UNIVERSITY OF WISCONSIN 10
Specific Examples of ComplexSpecific Examples of Complex
Phishing AttemptsPhishing Attempts
QR Code Curiosity: Embedding
malicious code within a QR code, on a
printout posted to a community bulletin
board
03/18/14 UNIVERSITY OF WISCONSIN 11
Specific Examples of ComplexSpecific Examples of Complex
Phishing AttemptsPhishing Attempts
Out of Office, Out of Control: Taking
advantage of an autoresponder,
leveraging specific knowledge to exploit
co-workers
03/18/14 UNIVERSITY OF WISCONSIN 12
What Would Happen If YouWhat Would Happen If You
Received This Email?Received This Email?
03/18/14 UNIVERSITY OF WISCONSIN 13
What Would Happen If YouWhat Would Happen If You
Received This Email?Received This Email?
03/18/14 UNIVERSITY OF WISCONSIN 14
Tips To Spot Social EngeeringTips To Spot Social Engeering
Within a Phishing AttemptWithin a Phishing Attempt
Asks you to verify a sensitive piece of
information
A sense of urgency is implied in the message
An overt or implied threat may be present
Flattery is used to get you to drop your guard
Use, and sometimes overuse of organizational
knowledge in employed
A bribe or reward for your “help” may be
offered
03/18/14 UNIVERSITY OF WISCONSIN 15
Spotting the Phish After theSpotting the Phish After the
ClickClick
Website address looks odd or incorrect
IP address shows in address bar
Multiple pop-ups appear on top of
legitimate website window
Website contains spelling or grammar
errors
No SSL lock is present on what should
be a secure site
03/18/14 UNIVERSITY OF WISCONSIN 16
Can You Spot the Issue HereCan You Spot the Issue Here
03/18/14 UNIVERSITY OF WISCONSIN 17
Combat Phishing AttemptsCombat Phishing Attempts
Never give away personal information,
especially username and password
Don’t let curiosity get the best of you
Look for the tell-tail signs we have
discussed today
There are no situations which justify
exceptions
If something sounds too good to be
true…
03/18/14 UNIVERSITY OF WISCONSIN 18
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Faculty and staff email Notification
Date: February 21, 2014
Dear user,
We currently upgraded to 4GB space. Please log-in to
your account in order to validate E-space. Your account
is still open for you to send and receive e-mail. Click on
faculty and staff email upgrade <http://bad URL> to
confirm details and upgrade. Note that failure to
upgrade with this notification would lead to dismissal of
your user account.Protecting your email account and
improving the quality of your email is our primary
concern.
This has become necessary to serve you better.
Copyright ©2014 IT Help desk.
03/18/14 UNIVERSITY OF WISCONSIN 19
DiscussionDiscussion
• Odd use of the English language
• Email references a service which you
may never have heard of, and do not use
• There is a sense of urgency in the email
• There is a direct threat of implications, if
you do not act immediately
03/18/14 UNIVERSITY OF WISCONSIN 20
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Secure Account Notification
Date: February 20, 2014
Blackboard
Secure Account Notification
A suspicious activity has been detected. For your safety,
your account access has been suspended.
Please re-activate your account immediately by clicking
on the "Re-Activate My Account" link provided below:
<Re-Activate My Account>
We are sorry for any inconveniences caused as your
safety is important to us.
Thank you,
Blackboard System Notifications.
03/18/14 UNIVERSITY OF WISCONSIN 21
DiscussionDiscussion
• A punishment has been specified for
previous actions, making you feel
guilty
• A sense of urgency of action on your
part is asked for
• A context aware attack is used,
referencing Blackboard, a commonly
used software package, in higher
education
03/18/14 UNIVERSITY OF WISCONSIN 22
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Web!User
Date: February 19, 2014
Dear Web!User,
We are under urgent upgrade service you are require to
upgrade account by via hxxp://servacc.0ad.info/
System Administrator
Web! Techs.
03/18/14 UNIVERSITY OF WISCONSIN 23
DiscussionDiscussion
• Poor English grammar usage
• Sense of urgency implied
• Refers to you by some odd generic
name “web user”
03/18/14 UNIVERSITY OF WISCONSIN 24
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Apple Customer Alert!
Date: February 18, 2014
Dear Apple Customer,
Please confirm your identity today or your account will
be Disabled due to concerns we have for the safety and
integrity of the Apple Community.
To confirm your identity, we recommend Click here
Regards,
Apple Customer Service.
03/18/14 UNIVERSITY OF WISCONSIN 25
DiscussionDiscussion
• Sense of urgency contained in email
• You have been made to feel guilty
• Context aware reference for all Apple
users
• Threat of account disabling if you do
not act
03/18/14 UNIVERSITY OF WISCONSIN 26
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: RE: Faculty Staff & Employee Mailbox Upgrade
Date: January 21, 2014
Dear Faculty Staff & Employee Email Subscribers
Welcome to 2014 Academic Season
Your Email Account have been put on-hold by our
server,you can no longer
send or receive emails,to avoid this kindly click on the
link UPGRADE to submit your
old account for New to enable you to send and receive
emails
Thank You
ITS Service Provider Team
03/18/14 UNIVERSITY OF WISCONSIN 27
DiscussionDiscussion
• Socially aware email appears to be
familiar with your association with
the university as a faculty or staff
member
• Odd use of English language
• Sense of moderate urgency implied
03/18/14 UNIVERSITY OF WISCONSIN 28
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: ACH Notification
Date: October 9, 2013
Attached is a summary of Origination activity
for 10/09/2013
If you need assistance please contact us via e-
mail during regular business hours.
Thank you for your cooperation.
03/18/14 UNIVERSITY OF WISCONSIN 29
DiscussionDiscussion
• References commonly known “ACH”
term, which is familiar to people who
deal with accounts payable and
accounts receivable
• Plays on your sense of curiosity, to
learn more….(What account is this?
How much do I owe?)
• Email is intentionally vague
03/18/14 UNIVERSITY OF WISCONSIN 30
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Court attendance notification #ID608
Date: January 9, 2014
From: Illegal software
Sent: Thursday, January 09, 2014 1:18 AM
Subject: Court attendance notification #ID608
Warrant to appear,
Please be informed that you are expected
in the Court of Georgia on February 2nd, 2014 at 9:30 a.m.
where the hearing of your case of illegal software use will take place.
You may obtain protection of a lawyer, if necessary.
Please bring your identity documents to the Court on the named day.
Attendance is compulsory.
The detailed plaint note is attached to this letter, please download and
read it thoroughly.
Court clerk,
LANE Pruitt
03/18/14 UNIVERSITY OF WISCONSIN 31
DiscussionDiscussion
• Context issues: You don’t live in
Goergia and have not been there
recently (warning sign)
• You are made to feel guilty for some
previous action which you supposedly
engaged in
• A sense of urgency is implied
• The email may appeal to your sense
of curiosity
03/18/14 UNIVERSITY OF WISCONSIN 32
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Scanned Image from a HP Digital Device
Date: June 19, 2013
Please open the attached document. This document
was digitally sent to you using an HP Digital
Sending device.
To view this document you need to use the Adobe
Acrobat Reader.
03/18/14 UNIVERSITY OF WISCONSIN 33
DiscussionDiscussion
• Lots of context aware references in
this email….Almost all of us use HP
printers and Adobe Acrobat reader,
on our computer. Do not let your
guard down simply because of some
familiar references
• This email appeals to your curiosity
to see what is in the attachment…
Don’t fall for it!
03/18/14 UNIVERSITY OF WISCONSIN 34
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Your account has been temporarily limited. ID K5008204
Date: September 1, 2012
Your account has been temporarily limited.
To remove the limitation from your account
please confirm your credit card details on file.
For confirmation, please click the link below:
Sign-on to Chase online account
Sincerely,
Cardmember Services
© 2012 JPMorgan Chase & Co.
03/18/14 UNIVERSITY OF WISCONSIN 35
DiscussionDiscussion
• Context aware attack, for those who
have a Chase credit card. An immediate
red flag for those who do not
• A punishment has been applied, which
will harm your ability to engage in credit
card transactions, instilling a sense of
fear
• The email is so vague, it makes you
curious to learn more by clicking on a
link
03/18/14 UNIVERSITY OF WISCONSIN 36
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Microsoft Security Update
Date: August 10, 2012
Dear Window Users,
You have a urgent windows security alert. A deadly virus that
can replicate itself was detected yesterday on one of our
servers. You are to download the latest windows defender from
the below link to prevent your hard drive from getting
damanged. CLICK HERE to log in with your email and
download the updated version.
Windows Security Team
03/18/14 UNIVERSITY OF WISCONSIN 37
DiscussionDiscussion
• A sense of urgency is explicit in this
email
• A sense of guilt, for some action you did,
is present
• Context aware for Microsoft users…For
others, the Microsoft reference should
be a red flag
• Requires you to click on something to fix
the problem. Note, in reality, most such
maintenance is performed by your
network administrator and should not
require action on your part.
03/18/14 UNIVERSITY OF WISCONSIN 38
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: Photos
Date: August 13, 2012
Hi, as promised your photos -
hxxp://127.0.0.1/badstuff.htm
03/18/14 UNIVERSITY OF WISCONSIN 39
DiscussionDiscussion
• Context aware. At some point, most
of us have received links to pictures,
sent by friends, through email, so are
fooled into thinking that this email
could apply to you
• The email is intentionally vague,
making you curious to learn more…
Don’t fall for the click!
03/18/14 UNIVERSITY OF WISCONSIN 40
What Do You Think?What Do You Think?
Can You Spot the Phish?Can You Spot the Phish?
Subject: NetTeller Watch Notice
Date: July 2, 2012
The following ACH batch has been initiated:
Confirmation number: 0829703846
Category: MONTHLY PAYROLL
Effective Date: 7/03/12
Debits: $.00 Credits: $40,866.29
Class Code: PPD
Offset Account: CHECKING
For details, please log in to your NetTeller account.
Click here to access NetTeller account
NOTE: Some web browsers do not open a new window when the above link is
clicked. If you find that a new window did not open, please check the
other open browsers on your computer.
03/18/14 UNIVERSITY OF WISCONSIN 41
DiscussionDiscussion
• Appeals to human nature of wanting
to believe we can get something for
nothing…In this case $40,866.29, to
be specific
• Since you were not expecting a
windfall of money, this email appeals
to your sense if curiosity, to click and
learn what it is all about
• You don’t have a Net Teller account,
so this should be a red flag.
03/18/14 UNIVERSITY OF WISCONSIN 42
Curiosity Killed the Cat!Curiosity Killed the Cat!
Lack of Curiosity Killed the Phish!Lack of Curiosity Killed the Phish!
Nicholas Davis
ndavis1@wisc.edu
03/18/14 UNIVERSITY OF WISCONSIN 43

More Related Content

Similar to Something in the library smells phishy

Topic 4- new (2).pptxTopic 4- new (2).pptx
Topic 4- new (2).pptxTopic 4- new (2).pptxTopic 4- new (2).pptxTopic 4- new (2).pptx
Topic 4- new (2).pptxTopic 4- new (2).pptx2002SpareTyre
 
The ACT Writing Sample Essays - Tes
The ACT Writing Sample Essays - TesThe ACT Writing Sample Essays - Tes
The ACT Writing Sample Essays - TesKristin Oliver
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
How To Write A College Essay Apa Style
How To Write A College Essay Apa StyleHow To Write A College Essay Apa Style
How To Write A College Essay Apa StyleJenn Cooper
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...OpenAthens
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Imagining the Impossible: Recruitment Communications in a World Without Paper
Imagining the Impossible: Recruitment Communications in a World Without PaperImagining the Impossible: Recruitment Communications in a World Without Paper
Imagining the Impossible: Recruitment Communications in a World Without PaperBob Johnson, Ph.D.
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 

Similar to Something in the library smells phishy (20)

Acl esafety awareness
Acl esafety awarenessAcl esafety awareness
Acl esafety awareness
 
Topic 4- new (2).pptxTopic 4- new (2).pptx
Topic 4- new (2).pptxTopic 4- new (2).pptxTopic 4- new (2).pptxTopic 4- new (2).pptx
Topic 4- new (2).pptxTopic 4- new (2).pptx
 
The ACT Writing Sample Essays - Tes
The ACT Writing Sample Essays - TesThe ACT Writing Sample Essays - Tes
The ACT Writing Sample Essays - Tes
 
The birth of an online module about privacy - Schoutsen & van Putten
The birth of an online module about privacy - Schoutsen & van PuttenThe birth of an online module about privacy - Schoutsen & van Putten
The birth of an online module about privacy - Schoutsen & van Putten
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
How To Write A College Essay Apa Style
How To Write A College Essay Apa StyleHow To Write A College Essay Apa Style
How To Write A College Essay Apa Style
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Bear Writing Paper
Bear Writing PaperBear Writing Paper
Bear Writing Paper
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Imagining the Impossible: Recruitment Communications in a World Without Paper
Imagining the Impossible: Recruitment Communications in a World Without PaperImagining the Impossible: Recruitment Communications in a World Without Paper
Imagining the Impossible: Recruitment Communications in a World Without Paper
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Something in the library smells phishy

  • 1. Something In the Library Smells Phishy Presented by Nicholas Davis, CISSP, CISA
  • 2. OverviewOverview Phishing Background Threat to IT on campus Phishing education Tricks employed Sample phishing emails unique to UW- Madison Spotting the phish, after the click 10 quick tests for the audience! Q&A 03/18/14 UNIVERSITY OF WISCONSIN 2
  • 3. Phishing DefinedPhishing Defined Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication, usually email. 03/18/14 UNIVERSITY OF WISCONSIN 3
  • 4. Why Phishing Is Such a ThreatWhy Phishing Is Such a Threat UW-Madison IT infrastructure is designed to protect the campus computing assets with many technical controls However, this persuades hackers to pursue access via alternate means, often choosing to exploit the human factor 03/18/14 UNIVERSITY OF WISCONSIN 4
  • 5. Your Password Is the Key to theYour Password Is the Key to the KingdomKingdom If an attacker can persuade you to give them your password, they can evade all the controls put in place to protect sensitive systems 03/18/14 UNIVERSITY OF WISCONSIN 5
  • 6. UW-Madison’s ProprietaryUW-Madison’s Proprietary Research Interests PhishersResearch Interests Phishers Consider the value of UW-Madison’s intellectual property 03/18/14 UNIVERSITY OF WISCONSIN 6
  • 7. I am Too Smart to Fall For aI am Too Smart to Fall For a Trick Like PhishingTrick Like Phishing Most large organizations have a phishing participation rate of around 10% This rises when the population become the subjects of Spear Phishing, which is phishing email designed specifically for the recipient 03/18/14 UNIVERSITY OF WISCONSIN 7
  • 8. Phishing Relies Upon SocialPhishing Relies Upon Social EngineeringEngineering The practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional. Social engineering techniques are considered con games which are performed by con artists. The targets of social engineering may never realize they have been victimized. 03/18/14 UNIVERSITY OF WISCONSIN 8
  • 9. Tricks Used By Expert PhishersTricks Used By Expert Phishers Socially Aware: Mining of information about the target from publicly available resources, such as Facebook, property records, or even CCAP Context Aware: Make reference to an activity you are likely to engage in, such as Amazon.com, or UPS package receipt 03/18/14 UNIVERSITY OF WISCONSIN 9
  • 10. Specific Examples of ComplexSpecific Examples of Complex Phishing AttemptsPhishing Attempts Baiting: Placing a USB flash drive or CD, with malware on it, in a public place 03/18/14 UNIVERSITY OF WISCONSIN 10
  • 11. Specific Examples of ComplexSpecific Examples of Complex Phishing AttemptsPhishing Attempts QR Code Curiosity: Embedding malicious code within a QR code, on a printout posted to a community bulletin board 03/18/14 UNIVERSITY OF WISCONSIN 11
  • 12. Specific Examples of ComplexSpecific Examples of Complex Phishing AttemptsPhishing Attempts Out of Office, Out of Control: Taking advantage of an autoresponder, leveraging specific knowledge to exploit co-workers 03/18/14 UNIVERSITY OF WISCONSIN 12
  • 13. What Would Happen If YouWhat Would Happen If You Received This Email?Received This Email? 03/18/14 UNIVERSITY OF WISCONSIN 13
  • 14. What Would Happen If YouWhat Would Happen If You Received This Email?Received This Email? 03/18/14 UNIVERSITY OF WISCONSIN 14
  • 15. Tips To Spot Social EngeeringTips To Spot Social Engeering Within a Phishing AttemptWithin a Phishing Attempt Asks you to verify a sensitive piece of information A sense of urgency is implied in the message An overt or implied threat may be present Flattery is used to get you to drop your guard Use, and sometimes overuse of organizational knowledge in employed A bribe or reward for your “help” may be offered 03/18/14 UNIVERSITY OF WISCONSIN 15
  • 16. Spotting the Phish After theSpotting the Phish After the ClickClick Website address looks odd or incorrect IP address shows in address bar Multiple pop-ups appear on top of legitimate website window Website contains spelling or grammar errors No SSL lock is present on what should be a secure site 03/18/14 UNIVERSITY OF WISCONSIN 16
  • 17. Can You Spot the Issue HereCan You Spot the Issue Here 03/18/14 UNIVERSITY OF WISCONSIN 17
  • 18. Combat Phishing AttemptsCombat Phishing Attempts Never give away personal information, especially username and password Don’t let curiosity get the best of you Look for the tell-tail signs we have discussed today There are no situations which justify exceptions If something sounds too good to be true… 03/18/14 UNIVERSITY OF WISCONSIN 18
  • 19. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Faculty and staff email Notification Date: February 21, 2014 Dear user, We currently upgraded to 4GB space. Please log-in to your account in order to validate E-space. Your account is still open for you to send and receive e-mail. Click on faculty and staff email upgrade <http://bad URL> to confirm details and upgrade. Note that failure to upgrade with this notification would lead to dismissal of your user account.Protecting your email account and improving the quality of your email is our primary concern. This has become necessary to serve you better. Copyright ©2014 IT Help desk. 03/18/14 UNIVERSITY OF WISCONSIN 19
  • 20. DiscussionDiscussion • Odd use of the English language • Email references a service which you may never have heard of, and do not use • There is a sense of urgency in the email • There is a direct threat of implications, if you do not act immediately 03/18/14 UNIVERSITY OF WISCONSIN 20
  • 21. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Secure Account Notification Date: February 20, 2014 Blackboard Secure Account Notification A suspicious activity has been detected. For your safety, your account access has been suspended. Please re-activate your account immediately by clicking on the "Re-Activate My Account" link provided below: <Re-Activate My Account> We are sorry for any inconveniences caused as your safety is important to us. Thank you, Blackboard System Notifications. 03/18/14 UNIVERSITY OF WISCONSIN 21
  • 22. DiscussionDiscussion • A punishment has been specified for previous actions, making you feel guilty • A sense of urgency of action on your part is asked for • A context aware attack is used, referencing Blackboard, a commonly used software package, in higher education 03/18/14 UNIVERSITY OF WISCONSIN 22
  • 23. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Web!User Date: February 19, 2014 Dear Web!User, We are under urgent upgrade service you are require to upgrade account by via hxxp://servacc.0ad.info/ System Administrator Web! Techs. 03/18/14 UNIVERSITY OF WISCONSIN 23
  • 24. DiscussionDiscussion • Poor English grammar usage • Sense of urgency implied • Refers to you by some odd generic name “web user” 03/18/14 UNIVERSITY OF WISCONSIN 24
  • 25. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Apple Customer Alert! Date: February 18, 2014 Dear Apple Customer, Please confirm your identity today or your account will be Disabled due to concerns we have for the safety and integrity of the Apple Community. To confirm your identity, we recommend Click here Regards, Apple Customer Service. 03/18/14 UNIVERSITY OF WISCONSIN 25
  • 26. DiscussionDiscussion • Sense of urgency contained in email • You have been made to feel guilty • Context aware reference for all Apple users • Threat of account disabling if you do not act 03/18/14 UNIVERSITY OF WISCONSIN 26
  • 27. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: RE: Faculty Staff & Employee Mailbox Upgrade Date: January 21, 2014 Dear Faculty Staff & Employee Email Subscribers Welcome to 2014 Academic Season Your Email Account have been put on-hold by our server,you can no longer send or receive emails,to avoid this kindly click on the link UPGRADE to submit your old account for New to enable you to send and receive emails Thank You ITS Service Provider Team 03/18/14 UNIVERSITY OF WISCONSIN 27
  • 28. DiscussionDiscussion • Socially aware email appears to be familiar with your association with the university as a faculty or staff member • Odd use of English language • Sense of moderate urgency implied 03/18/14 UNIVERSITY OF WISCONSIN 28
  • 29. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: ACH Notification Date: October 9, 2013 Attached is a summary of Origination activity for 10/09/2013 If you need assistance please contact us via e- mail during regular business hours. Thank you for your cooperation. 03/18/14 UNIVERSITY OF WISCONSIN 29
  • 30. DiscussionDiscussion • References commonly known “ACH” term, which is familiar to people who deal with accounts payable and accounts receivable • Plays on your sense of curiosity, to learn more….(What account is this? How much do I owe?) • Email is intentionally vague 03/18/14 UNIVERSITY OF WISCONSIN 30
  • 31. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Court attendance notification #ID608 Date: January 9, 2014 From: Illegal software Sent: Thursday, January 09, 2014 1:18 AM Subject: Court attendance notification #ID608 Warrant to appear, Please be informed that you are expected in the Court of Georgia on February 2nd, 2014 at 9:30 a.m. where the hearing of your case of illegal software use will take place. You may obtain protection of a lawyer, if necessary. Please bring your identity documents to the Court on the named day. Attendance is compulsory. The detailed plaint note is attached to this letter, please download and read it thoroughly. Court clerk, LANE Pruitt 03/18/14 UNIVERSITY OF WISCONSIN 31
  • 32. DiscussionDiscussion • Context issues: You don’t live in Goergia and have not been there recently (warning sign) • You are made to feel guilty for some previous action which you supposedly engaged in • A sense of urgency is implied • The email may appeal to your sense of curiosity 03/18/14 UNIVERSITY OF WISCONSIN 32
  • 33. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Scanned Image from a HP Digital Device Date: June 19, 2013 Please open the attached document. This document was digitally sent to you using an HP Digital Sending device. To view this document you need to use the Adobe Acrobat Reader. 03/18/14 UNIVERSITY OF WISCONSIN 33
  • 34. DiscussionDiscussion • Lots of context aware references in this email….Almost all of us use HP printers and Adobe Acrobat reader, on our computer. Do not let your guard down simply because of some familiar references • This email appeals to your curiosity to see what is in the attachment… Don’t fall for it! 03/18/14 UNIVERSITY OF WISCONSIN 34
  • 35. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Your account has been temporarily limited. ID K5008204 Date: September 1, 2012 Your account has been temporarily limited. To remove the limitation from your account please confirm your credit card details on file. For confirmation, please click the link below: Sign-on to Chase online account Sincerely, Cardmember Services © 2012 JPMorgan Chase & Co. 03/18/14 UNIVERSITY OF WISCONSIN 35
  • 36. DiscussionDiscussion • Context aware attack, for those who have a Chase credit card. An immediate red flag for those who do not • A punishment has been applied, which will harm your ability to engage in credit card transactions, instilling a sense of fear • The email is so vague, it makes you curious to learn more by clicking on a link 03/18/14 UNIVERSITY OF WISCONSIN 36
  • 37. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Microsoft Security Update Date: August 10, 2012 Dear Window Users, You have a urgent windows security alert. A deadly virus that can replicate itself was detected yesterday on one of our servers. You are to download the latest windows defender from the below link to prevent your hard drive from getting damanged. CLICK HERE to log in with your email and download the updated version. Windows Security Team 03/18/14 UNIVERSITY OF WISCONSIN 37
  • 38. DiscussionDiscussion • A sense of urgency is explicit in this email • A sense of guilt, for some action you did, is present • Context aware for Microsoft users…For others, the Microsoft reference should be a red flag • Requires you to click on something to fix the problem. Note, in reality, most such maintenance is performed by your network administrator and should not require action on your part. 03/18/14 UNIVERSITY OF WISCONSIN 38
  • 39. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: Photos Date: August 13, 2012 Hi, as promised your photos - hxxp://127.0.0.1/badstuff.htm 03/18/14 UNIVERSITY OF WISCONSIN 39
  • 40. DiscussionDiscussion • Context aware. At some point, most of us have received links to pictures, sent by friends, through email, so are fooled into thinking that this email could apply to you • The email is intentionally vague, making you curious to learn more… Don’t fall for the click! 03/18/14 UNIVERSITY OF WISCONSIN 40
  • 41. What Do You Think?What Do You Think? Can You Spot the Phish?Can You Spot the Phish? Subject: NetTeller Watch Notice Date: July 2, 2012 The following ACH batch has been initiated: Confirmation number: 0829703846 Category: MONTHLY PAYROLL Effective Date: 7/03/12 Debits: $.00 Credits: $40,866.29 Class Code: PPD Offset Account: CHECKING For details, please log in to your NetTeller account. Click here to access NetTeller account NOTE: Some web browsers do not open a new window when the above link is clicked. If you find that a new window did not open, please check the other open browsers on your computer. 03/18/14 UNIVERSITY OF WISCONSIN 41
  • 42. DiscussionDiscussion • Appeals to human nature of wanting to believe we can get something for nothing…In this case $40,866.29, to be specific • Since you were not expecting a windfall of money, this email appeals to your sense if curiosity, to click and learn what it is all about • You don’t have a Net Teller account, so this should be a red flag. 03/18/14 UNIVERSITY OF WISCONSIN 42
  • 43. Curiosity Killed the Cat!Curiosity Killed the Cat! Lack of Curiosity Killed the Phish!Lack of Curiosity Killed the Phish! Nicholas Davis ndavis1@wisc.edu 03/18/14 UNIVERSITY OF WISCONSIN 43