Phishing: Ajay Muthureddy - I MBA B Meaning
Phishing: Ajay Muthureddy - I MBA B Meaning
Phishing: Ajay Muthureddy - I MBA B Meaning
Meaning:
Technique:
Examples:
1) In 2003, users received e-mails supposedly from eBay claiming that the user’s
account was about to be suspended unless he clicked on a link provided and
updated the credit card information that the genuine eBay already had. The
scam counted on people being tricked into thinking that they were actually being
contacted by eBay. By spamming large groups of people, the phisher counted on
e-mail being read by a percentage of people who actually had listed credit card
numbers with eBay legitimately.
2) Facebook users were hit with phishing attack last year, where phishers tried to
steal names and passwords from users of this popular social network. People are
sent phoney e-mail messages, appearing to come from facebook, that try to send
them to a malicious website, Fbaction.net, which looks like Facebook login page.
Facebook however warned its users about the attack and took preventive
measures in no time.
3) Recently a new securybank phishing Trojan called “The Banker-AJ” has been
reported by the antivirus company Sophos for targeting online customers of few
British banks such as Abbey, Barclays, Egg, HSBC, Lloyds TSB, Nationwide and
NatWest. This Trojan, called as “the next generation of phishing attacks”, waits
for users to visit their online banking web sites, then captures passwords and
takes screenshots of the session. The information is relayed to the hackers
behind the plot.
4) The Xrenoder Trojan spyware resets your homepage and / or your search
settings to point to other sites usually for commercial purposes or porn traffic.
5) The Cpanel Google Trojan spyware is a Trojan that changes the DNS entry in your
Hosts file to its own site. If Google gets redirected, there is a chance you have a
version of this hijacker.
6) Another example of ICICI being phished:
1) The “from” field appears to be from legitimate company but a close observance
can find the difference between the two.
2) The e-mail will usually contain logos or images, taken from the website of the
company mentioned in the scam e-mail.
3) The e-mail will contain a clickable link with text suggesting you to use the
inserted link to validate your information.
4) Other tiny changes like logos that mismatch with actual company’s logo, spelling
errors, percentage signs followed by numbers or @ signs within the hyperlink,
random names or e-mail addresses in body of the text or even e-mail headers.
The golden rule to avoid being phished is to “never click the links within text of an
e-mail”. Always delete such mails immediately and empty the trash box even to
prevent accidental clicks.
Signs of Phishing:
Types of Phishing:
Deceptive Phishing- Account theft using instant messaging.
Malware-based phishing-running malicious software on user’s PCs.
Key-loggers and Screen-loggers-malwares that track keyboard input and
send relevant information to the hacker.
Web Trojans-pop up invisibly when users are attempting to login.
Hosts file poisoning-hackers transmit bogus address of url (IP address), takes
user unwittingly to a fake “look alike” website where their information can be
stolen.
System reconfiguration attacks-modify settings on user’s pc for m malicious
purposes.
Data theft-unsecured PCs are used to access servers where their information
is stored.
DNS based phishing-hackers tamper with a company’s host files or domain
name system so that requests for URLs return a bogus address and
subsequent communication are directed to any fake site.
Content-Injection phishing-hackers replace part of the content of a
legitimate site with false content designed to mislead the user into malicious
code.
Man-in-the-middle phishing-hackers position themselves between the user
and the legitimate website or system. They record the information being
entered but continue to pass it on so that users’ transactions are not
affected.
Search engine phishing-phishers create websites with attractive sounding
offers and have them indexed legitimately with search engines.
Spear Phishing-This newer type of phishing scam focuses on single user or a
department within an organization. The phish appears to be from someone
within that company, in a position of trust and requests information. It may
ask users to click a link which deploys spyware that can steal data.
Vishing
Meaning:
Vishing is a criminal practise, just like phishing, uses social engineering techniques
and phishing techniques to steal people’s identities using Voice over Internet Protocol (VoIP)
phone lines, to gain access to their private, personal and financial information. The term
Vishing itself is a combination of Voice and Phishing.
Technique:
Vishing is very hard for legal authorities to monitor or trace. In this vishing,
unsuspecting users are sent voice mails to call telephone number which appears to be a
bank but is spoofed to a thief. The hacker simulates or “spoofs” using a friendly IP address.
Don’t give information to anybody unless you are certain oh whom you are
dealing with.
If you get a phone call about any of your accounts, hang up and call the
institution.
Dial the number that appears on back of your credit card or on your
statements whenever you get such calls.
Spoofing
It’s the act of creating a website, as a hoax, with the intention of performing fraud.
Phishers use names, logos, graphics and even code of the actual website to make spoof sites
seem legitimate. This can even fake the URL that appears in the address field and the
Padlock that appears at the bottom right corner.
Smishing
This newest form of scam is a combination of phishing and SMS and s initiated via
text message. The consumer receives a text message stating an account is in danger and
prompts the recipient to respond by verifying personal information.
Another type may be like the consumer receives a text message on his cell phone or
other mobile access device confirming enrolment in a service and stating the user will be
charged unless the order is cancelled. Once the recipient clicks to cancel the order, a Trojan
horse virus is downloaded that allows criminal access to mobile device. It enables the
criminal to listen to calls and access information stored on the phone.
Skimming
It’s a method used by fraudsters to capture your personal information from your
credit card. When your card is swiped through skimmer, the information in magnetic strip
on the card is read into and stored on the skimmer or an attached computer. Skimmers
operate at ATMs and restaurants or shopping outlets.
Finding out whether an e-mail is genuine or not is not very difficult. Every e-mail
message contains headers that have the following information:
Origin, which shows information about the machine that, sent it,
Relay, which shows the sender machine relaying it to another, and
Final destination, which shows the machine that, receives it, the IP address and the
domain name.