phishing--the entire story of a dark world

29
Phishing Beware of this if you want to protect yourself from being stolen.

Upload: avishek-datta

Post on 12-May-2015

534 views

Category:

Engineering


2 download

DESCRIPTION

Phishing is a common problem in today's world. I have summarized some of the essential points needed for anyone to safeguard against all known Phishing attacks.

TRANSCRIPT

Page 1: Phishing--The Entire Story of a Dark World

P h i s h i n g

Beware of this if you want to protect yourself from being stolen.

Page 2: Phishing--The Entire Story of a Dark World

What is phishing?

• Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

Page 3: Phishing--The Entire Story of a Dark World

Popular Phishing Techniques

• Spear Phishing• Clone Phishing• Whaling• Link Manipulation• Filter Evasion• Website Forgery• Phone Phishing• Tabnabbing• Evil Twins

Page 4: Phishing--The Entire Story of a Dark World

Spear Phishing

• Phishing attempts directed at specific individuals or companies have been termed Spear Phishing.

• The Spear Phisher thrives on familiarity.

• Personalized Salutations.

Page 5: Phishing--The Entire Story of a Dark World

Spear Phishing Illustration

Page 6: Phishing--The Entire Story of a Dark World

Clone Phishing

• Content of original mail (including link) copied to create false or duplicate email.

• The attachment or Link within the email is replaced.

• This technique could be used as a pivot.

Page 7: Phishing--The Entire Story of a Dark World

Clone Phishing Illustration

Page 8: Phishing--The Entire Story of a Dark World

Whaling

• Phishing attacks have been directed specifically at senior executives and other high profile targets within businesses is known as Whaling.

• The infected Site will ask the following:a. Enter confidential company information and passwords.b. Provide financial details or enter them when making a payment for a fake software download.

Page 9: Phishing--The Entire Story of a Dark World

Link Manipulation

• Misspelled URLs or the use of sub-domains

• Make the displayed text for a link (the text between the <A> tags).

Page 10: Phishing--The Entire Story of a Dark World

Link Manipulation Illustration

Page 11: Phishing--The Entire Story of a Dark World

Filter Evasion

• Use of Images instead of Texts to fool filters.

• These filters use OCR (Optical Character Recognition) to optically scan the image and filter it.

Page 12: Phishing--The Entire Story of a Dark World

Filter Evasion Illustration

Page 13: Phishing--The Entire Story of a Dark World

Website Forgery

• Some phishing scams use JavaScript commands in order to alter the address bar.

• Use of Flash Based websites (Flashing).

Page 14: Phishing--The Entire Story of a Dark World

Website Forgery Illustration

Page 15: Phishing--The Entire Story of a Dark World

Phone Phishing

• Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts.

• Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization

Page 16: Phishing--The Entire Story of a Dark World

Phone Phishing Illustration

Page 17: Phishing--The Entire Story of a Dark World

Tab-Nabbing

• It takes advantage of tabbed browsing, which opens multiple tabs, that users use and silently redirects the user to the affected site.

• It doesn’t take you directly to the fraudulent site, but instead the phishers load their fake pages on one of the tabs.

Page 18: Phishing--The Entire Story of a Dark World

Tab Nabbing Illustration

Page 19: Phishing--The Entire Story of a Dark World

Evil Twins

• Evil Twin is a phishing technique that is hard to detect. A phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops.

• Whenever someone logs on to the bogus network, fraudsters try to capture their passwords and/or credit card information.

Page 20: Phishing--The Entire Story of a Dark World

Damages Caused by Phishing

• Monetary

• Data

• Business

• Time

Page 21: Phishing--The Entire Story of a Dark World

Anti Phishing

• There are several different techniques to combat Phishing like social, technological, legal approaches, etc.

• Some of the techniques are discussed in the next slides.

Page 22: Phishing--The Entire Story of a Dark World

Social Responses to Counter Phishing

• Awareness

• Education

• Anti-Phishing Working Groups

• Organizing Forums

• Discussion Platforms

Page 23: Phishing--The Entire Story of a Dark World

Technical Responses to Counter Phishing

• Helping to Identify Legitimate Websites• Secure Connection• Browsers Alerting Users to Fraudulent

Websites• Augmenting Passwords• Eliminating Phishing Mails• Monitoring and Takedown• Transaction Verifying and Signing

Page 24: Phishing--The Entire Story of a Dark World

Legal Responses

Information Technology Act 2000 has provisions to combat Phishing through the following articles in our Constitution:

• Section 66• Section 66A• Section 66C• Section 66D

Page 25: Phishing--The Entire Story of a Dark World

Examples of Phishing in India

• Pharmaceutical Company

• RBI Phishing Scam

• Income Tax Department Phishing Scam

• ICC World Cup 2011

• Google Inc.

Page 26: Phishing--The Entire Story of a Dark World

Modus Operandi of Bank Phishers

• Creating fake websites hosted at offshore servers.• Changing of contact numbers in the database of

the Bank.• After the Phisher gains access to the victim’s

account, he may perform one of the following:– Transfer money from the victim’s account to a

beneficiary’s account– Recharge Mobile Phones– Make Purchases online permissible by net banking

facility.

Page 27: Phishing--The Entire Story of a Dark World

Modus Operandi of Bank Phishers Continued

• The Beneficiary Account is fake and made using fake documents.

• Closing account after completion of fraud.• Use of Proxy IP Addresses by Phishers to fool

Investigative Agencies.

Page 28: Phishing--The Entire Story of a Dark World

Conclusion

As a future software engineer, it is imperative that we know about Phishing because in future we will be developing different systems and websites on our own and we must implement different security measures for protection against Phishing. This documentation has taught me a lot about creating some of those force fields.

Page 29: Phishing--The Entire Story of a Dark World

Thank You for watching this presentation!

Any questions are most welcome!