0% found this document useful (0 votes)
31 views

Pharming and Internet Scams

Uploaded by

Zhaniela Layne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Pharming and Internet Scams

Uploaded by

Zhaniela Layne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

PHARMING

PLEASE READ AND UNDERSTAND THE TOPIC OF MINE BECAUSE I WILL GIVE A
SHORT QUIZ AFTER MY PRESENTATION.
SHUK-KRAN PEACE BE ALL WITH YOU.
WHAT IS PHARMING?

Pharming is a type of social engineering cyber-attack in which criminals


redirect internet users trying to reach a specific website to a different, fake
site. These “spoofed” sites aim to capture a victim’s personally identifiable
information (PII) and log-in credentials, such as passwords, social security
numbers, account numbers, and so on, or else they attempt to install
pharming malware on their computer. Phar-mers often target websites in the
financial sector, including banks, online payment platforms, or e-commerce
sites, usually with identity theft as their ultimate objective.
WHAT IS PHARMING?

Pharming exploits the foundation of how internet browsing works — namely,


that the sequence of letters that form an internet address, such as
www.google.com, have to be converted into an IP address by a DNS server for
the connection to proceed.
What makes pharming attacks such a dangerous form of online fraud is that
they require minimal action from the victim. In cases of DNS server poisoning,
the affected user can have a completely malware-free computer and yet still
become a victim. Even taking precautions such as manually entering the
website address or always using trusted bookmarks is not sufficient, because
the misdirection happens after the computer sends a connection request.
HOW DO PHARMING WORKS?

1.First, a hacker may send malicious code in an email which installs a virus or Trojan on a user's
computer. This malicious code changes the computer’s hosts file to direct traffic away from its
intended target and toward a fake website instead. In this form of pharming – known as
malware-based pharming – regardless of whether you type the correct internet address, the
corrupted hosts file will take you to the fraudulent site instead.
2.Second, the hacker may use a technique called DNS poisoning. DNS stands for “Domain
Name System” – pharmers can modify the DNS table in a server, causing multiple users to visit
fake websites instead of legitimate ones inadvertently. Pharmers can use the fake websites to
install viruses or Trojans on the user's computer or attempt to collect personal and financial
information for use in identity theft.
HOW DO PHARMING WORKS?
HERE’’S AN EXAMPLE OF
PHARMING

In 2019, a notable pharming attack took place in Venezuela. That year, Venezuela’s
President made a public call asking for volunteers to join a new movement called
“Voluntarios por Venezuela” (Volunteers for Venezuela). The purpose of this movement
was to connect volunteers with international organizations providing humanitarian aid
to the country. Volunteers were invited to sign up via a website that asked for their full
name, personal ID, phone number, location, and other personal details.
Within a week of the original website going live, a second website appeared. This was
almost identical, with a similar domain name and structure. However, it was a fake.
Within Venezuela, both the real and counterfeit websites resolved to the same IP
address, which belonged to the fake domain owner. This meant that regardless of
whether a user opened the real or fake website, ultimately, their data would end up at
the fake one. (Outside the country, they resolved to a different IP address.)
HOW TO KNOW IF YOU’RE A VICTIM
OF PHARMING

1.PayPal or credit or debit card charges that you do not recognize


2.Posts or messages on your social media that you did not post
3.Friend or connection requests from your social media that you did not
send
4.Changed passwords in any of your online accounts
5.New programs appearing on your device which you did not download or
install Signs that you have been a victim of pharming include:
HOW TO AVOID PHARMING?
INTERNET SCAMS
WHAT IS INTERNET SCAM?

The internet is such an integral part of our lives that it can be easy sometimes to forget
that not everyone we encounter online has our best interests at heart. Internet scams
are an ever-present threat, with hackers and cybercriminals doing their best to stay one
step ahead of internet users. Staying informed of the risks and how to combat them is
the best way to keep safe. Here is a list of the top online scams and how to avoid getting
duped.
Online scams, also known as internet scams, continue to evolve and can vary widely. The
term generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.
Cybercriminals may contact potential victims through personal or work email accounts,
social networking sites, dating apps, or other methods in attempts to obtain financial or
other valuable personal information.
HOW DO INTERNET SCAM WORK?

Cyber criminals use a variety of attack vectors and strategies to commit


internet fraud. This includes malicious software, email and instant messaging
services to spread malware, spoofed websites that steal user data, and
elaborate, wide-reaching phishing scams.
Scammers try to collect personal information.
They may ask if you could hold some money for them in your bank account,
known as fake mule recruiting, or offer goods or services that may never be
delivered (credit card and money transfer scams).

You might also like