Chap 4
Chap 4
Learning Objectives
4.1. Introduction
• Phishing is a one of the methods towards enticing netizens to reveal their personal
information that can be used for identity theft.
• ID theft involves unauthorized access to personal data.
• Section 66C of the IT Act states that “whosoever fraudulently dishonestly make use
of the electronics signature, password or any unique identification features of any
other person→ shall be punished with imprisonment of three years. And shall also
be liable for fine which extend to one lakh rupees.”
• Section 66D of the IT Act states that “whoever, by means for any communication
device or computer resource cheats by personation, shall be punished with
imprisonment of either description for a term which may extend up to three years
and also liable for fine up to which extend to one lakh rupees.”
• Phishing is a social engineering tactics to trick users into revealing confidential
information.
→Facebook, HSBC (Holdings plc is a British multinational universal bank and financial
services holding company), PayPal and Bank of America →targeted organization.
Introduction to Cyber Security (BETCK105I) Module 4
→ Total 3,650 non-English Phishing websites were recorded in the month of May 2009.
→ Phishing URLs are categorized based on the top-level domains (TLDs). The most
used TLD in Phishing websites during the month of May 2009 were ".com, ".net and
".org" comprising 50%, 9% and 5%, respectively.
Financial organizations, payment services and auction websites are ranked as the
most targeted industry.
Port 80 [HTTP] is found to be the most popular port in use followed by Port 443 [S-
HTTP] and Port 8080 (WEB SERVER) among all the phishing attacks.
4.2 Phishing
Wikipedia:
Webopedia:
Tech Encyclopedia: It is a scam to steal valuable information such as credit card and social
security numbers (SSN), user IDs and passwords.
SPAMBOTS (UBE)
• SPAMBOTS gather the E-Mail addresses from the internet to build mailing list to
send UE.
• These are called as web crawlers, as they gather E-mail addresses from numerous
websites, chatroom conversations, newsgroups and special interest group (SIG)
postings.
• → It scans for two things a) hyperlinks b) E-Mail addresses.
• The term SPAMBOT is also sometimes Used with reference to a program designed
to prevent spam to reach the subscribers of an Internet service provider (ISP).
• Such programs are called E-Mail blockers and/or filters.
CAN-SPAM Act
• The CAN-SPAM Act of 2003 (15 U.S.C. 7701, et seq., Public Law No. 108-187,
was S.877 of the 108th US Congress).
• United States' first national standards for the sending of commercial E-Mail and
requires the Federal Trade Commission (FTC) to enforce its provisions.
• Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003.
• The CAN-SPAM Act is commonly referred to as the "You-Can-Spam" Act because
the bill explicitly legalizes most E-Mail Spam.
• In particular, it does not require E-Mailers to get permission before they send
marketing messages.
• It also prevents states from enacting stronger anti-Spam protections, and
prohibits individuals who receive Spam from suing spammers.
Tactics used by Phishers to attack the common people using E-Mails asking for
valuable information about himself/herself or to verify the details
Instead of creating a phony company from scratch, the phisher micht use a legitimate
company's name and incorporate the look and feel of its website (i.e., including the color
scheme and graphics) into the Spam E-Mail.
2. From a real employee:
Real name of an official, who actually works for the organization, will appear in the
"from" line or the text of the message (or both). This way, if a user contacts the
organization to confirm whether "Rajeev Arora" truly is "Vice President of
Marketing" then the user gets a positive response and feels assured.
•
Introduction to Cyber Security (BETCK105I) Module 4
Here are a few examples of phrases used to entice the user to take the action.
Let us understand the ways to reduce the amount of Spam E-Mails we receive
• 1. Share personal Email address with limited people and/or on public websites-the
more exposed to the public, the more Spam E-Mails will be received.
• 2. Never reply or open any Spam E-Mails. Any spam E-Mails that are opened or
replied to inform the phishers not only about your existence but also about validity
of your E-Mail address.
• 3. Disguise the E-Mail address on public website or groups by spelling out the sign
"@” and the DOT for example, RajeevATgmailDOTcom. This usually prohibits
Introduction to Cyber Security (BETCK105I) Module 4
phishers to catch valid E-Mail addresses while gathering E-Mail addresses through
programs.
• 4Use alternate E-Mail addresses to register for any personal or shopping website.
Never ever use business E-Mail addresses for these sites but rather use E-mail
addresses that are free from Yahoo, Hotmail or Gmail.
• 5. Do not forward any E-Mails from unknown recipients.
• 6.Make a habit to preview an E-Mail (an option available in an E-Mail program) before
opening it.
• 7. Never use E-Mail address as the screen name in chat groups or rooms.
• 8. Never respond to a Spam E-Mail asking to remove your E-Mail address from the
mailing distribution list. More often it confirms to the phishers that your E-Mail
address is active.
Hoax Mails
• These are deliberate attempt to deceive or trick a user into believing or accepting
that something 1s real. when the hoaxer (the person or group creating the hoax)
knows it is false.
• Hoax E-Mails may or may not be Spam E-Mails.
• www.breakthechain.org: This website contains a huge database of chain E-Mails.
• www.hoaxbusters.org: excellent website containing a large database of common
Internet hoaxes.
• It contains information about all the scams.
• I maintained by Computer Incident Advisory Capability, Which is the division of US
department of energy. Eg., “Breaking news”→ Info→” Barack Obama refused to be
the president of the US → E-mail Signature as CNN
1. Dragnet
2. Road-and-reel
• 3. Lobsterpot
• This method focuses upon use of spoofed websites.
• It consists of creating of bogus/ phony websites, similar to legitimate corporate
ones, targeting a narrowly defined class of victims, which is likely to seek out.
• These attacks are also known as "content injection Phishing.”
• Here the phisher places a weblink into an E-Mail message to make it look more
legitimate and actually takes the victim to a phony scam site, which appears as
legitimate website similar to official site. These fake sites are spoofed websites.
• Ones the netizens is into the one of these spoofed sites, he/she might willingly send
personal information to the con artist. Then they use your information to purchase
goods, apply new credit card or to steal your identity.
4. Gillnet
▪ This technique relies far less on social engineering techniques and phishers
introduce Malicious Code into E-Mails and websites.
▪ They can, for example, misuse browser functionality by injecting hostile content
into another site's pop-up window.
▪ Merely by opening a particular E-Mail or browsing a particular website, netizens
may have a Trojan Horse introduced into their systems.
▪ In some cases, the Malicious Code will change settings in user's systems so that
users who want to visit legitimate banking websites will be redirected to a look-alike
Phishing site.
Introduction to Cyber Security (BETCK105I) Module 4
▪ In other cases, the malicious code will record user's keystrokes and passwords
when they visit legitimate banking sites, then they transmit those data to phisher
for later illegal access to user's financial accounts.
Box 1:
Normally, the website will adopt the design of the target website and it sometimes
has a similar URL.
Unlike cross-site scripting (XSS), which exploits the trust a user has on a
particular site, CSRF exploits the trust that a site has in a user's browser.
• 1. Phishing is used to get the victim to reveal valuable (or at times invaluable)
information about him/her. Phishers would use Spoofing to create a fake E-Mail.
• 2. Spoofing is not intended to steal information but to actually make the victim
do something for phishers.
• 3. Phishing may, at times, require Spoofing to entice the victim into revealing the
information about Spoofing does not always necessarily result in Phishing
someone else's account
• Phisher sends an E-Mail, during Income Tax return fling period, from an official
looking IT (Income Tax) account which is spoofed.
• The E-Mail would contain URL to download a new tax form that was recently
issued.
• Once the victim clicks the URL a "virus cum Trojan Horse" is downloaded to the
victim's system.
• The IT Form may seem official, but like a Trojan Horse, the payload has already
been delivered.
• The virus lies in wait, logging the actions of the victim.
• Once the victim inputs certain keywords, like bank names, credit card names,
social networking websites and so forth, it logs the site and the passwords used.
• Those results are flagged and sent to the phisher.
• The virus could then gather the user's E-Mail contacts and send a fake E-Mail to
them as well, containing the virus.
• The phisher now has gained the required personal information as well as virus
was sent, downloaded and spread to entice other netizens.
• URLs are the weblinks (i.e., Internet addresses) that direct the netizens/users to a
specific website.
• In Phishing attack, these URLs are usually supplied as misspelled, for example,
instead of www.abcbank.com, URL is provided as www.abcbank1.com.
• Phishers use Lobsterpot method of Phishing and make the difference of one or two
letters in the URLs, which is ignored by netizens.
• This makes a big difference and it directs users to a fake/bogus website or a
webpage.
Homograph Attack
2. Filter Evasion
• This technique use graphics (i.e., images) instead of text to obviate from netting
such E-Mails by anti-Phishing filters. Normally, these filters are inbuilt into the web
browsers. For example,
• Internet Explorer version 7 has inbuilt "Microsoft phishing filter." One can enable it
during the installation or it can be enabled post-installation. It is important to note
that it is not enabled by default.
• Firefox 2.0 and above has inbuilt "Google Phishing filter." duly licensed from
Google. It is enabled by default.
• The Opera Phishing filter is dubbed Opera Fraud Protection and is included in
version 9.5+.
3.Website forgery
• In this technique the phisher directs the netizens to the website designed and
developed by him, to login into the website, by altering the browser address bar
through JavaScript commands.
• As the netizen logs into the fake/bogus website, phisher gets the confidential
information very easily.
• Another technique used is known as "cloaked" URL-domain forwarding and/or
inserting control characters into the URL while concealing the weblink address of
the real website.
Introduction to Cyber Security (BETCK105I) Module 4
4. Flash Phishing
5. Social Phishing
• Phishers entice the netizens to reveal sensitive data by other means and it works in
a systematic manner.
• Phisher sends a mail as if it is sent by a bank asking to call them back because
there was a security breach.
• The victim calls the bank on the phone numbers displayed in the mail.
• The phone number provided in the mail is a false number and the victim gets
redirected to the phisher.
• Phisher speaks with the victim in the similar fashion/style as a bank employee,
asking to verify that the victim is the customer of the bank. For example, "Sir, we
need to make sure that you are indeed our customer. Could you please supply your
credit card information so that I can verify your identity”.
• Phisher gets the required details swimmingly.
6. Phone Phishing
• Phisher can use a fake caller ID data to make it appear that the call is received
from a trusted organization to entice the users to reveal their personal information
such as account numbers and passwords.
• Mishing- Mobile Phishing attacks (Vishing and Smishing)
• Android: It is an open-source operating system (OS) for mobile phones and is based
on Linux Kernel.
• Its popular due to the release of Google’s Nexus One Phone.
• Its Market is as popular as iPhone App Store. →22,000 applications available
• https://news.spoftpedia.co → a malware writer succeeded to list a rogue Phishing
application called 09Droid on the Android Market website.
• It found shell for mobile application, but later came to know that its being used to
steal Online Banking credentials.
• Travsi Credit Union (TCU) issued an alert to all consumers regarding this malware
injection through 09Droid.→Application was stealing financial information of
consumers.
• Spear phishers send E-Mail that appears genuine to all the employees or members
within a certain company, government agency, organization or group.
• The message might look like as if it has come from your employer, or from a colleague
who might send an E-Mail message to everyone in the company it could include
requests for usernames or passwords.
• Unfortunately, through the modus operandi of the Spear phishers, the E-Mail sender
information has been faked or spoofed.
• While traditional Phishing scams are designed to steal information from individuals,
Spear Phishing scams work to gain access to a company’s entire computer system.
• It you respond with a username or password, or if you click on the links or open the
attachments in a Spear Phishing E-Mail, pop-up window or website, then you might
become a victim of ID theft and you might put your employer or group at risk.
• Spear Phishing also describes scams that target people who use a certain product or
website.
• Scam artists use any information they can to personalize a Phishing scam to as
specific a group as possible.
• Thus, “Spear Phishing is a targeted E-Mail attack that a scammer sends only to
people within a small group, such as a company”.
• The E-Mail message might appear to be genuine, but if you respond to it, you might
put yourself and your employer at risk.
• You can help avoiding Spear Phishing scams by using some of the same techniques
you have already used to help avoid standard Phishing scams
Whaling
1.Deceptive Phishing→
• Phishing scams started by broadcasting deceptive E-Mail messages with objective of
ID theft.
• E-Mails are broadcasted to a wide group of netizens asking about the need to verify
banking account information/system failure requiring users to re-enter their
personal information.
• The netizens easily get enticed and reveal their information by responding to these
E-Mails and/or clicking on weblinks or signing onto a fake website designed by the
phisher.
2.Malware-based Phishing→
• It refers to scams that involve running Malicious Code on the netizens system.
• Malware can be launched as an E-Mail attachment or as a downloadable file from a
website or by exploiting known security vulnerabilities.
• For example, small and medium businesses are always found to be ignorant to keep
their operating systems (OS) antivirus software up to date with latest patch updates
released by vendors.
3.Keyloggers→
• A small integrity program to steal information sends to phisher, keylogger log, to the
phisher through the Internet.
• The keyloggers can also be embedded into netizen's browser as a small utility
program which can start automatically when the browser is opened or can be
embedded into system holes as device drivers.
4.Session hijacking →
• It is an attack in which netizens' activities are monitored until they establish their
bonafide credentials by signing into their account or begin the transaction and at
that point the Malicious Code takes over and comport unauthorized actions such as
transferring funds without netizen's knowledge.
5.In-session Phishing→ another parallel session in the same browser.:
• It is a Phishing attack based upon one web browsing session being able to detect the
presence of another session (such as visit to an online banking website) on the same
web browser and then a pop-up window is launched that pretends to be opened from
the targeted session
6.Web Trojans→
• Pops up to collect netizen's credentials and transmit them to the phisher while
netizens are attempting to log in. Such pop-ups are usually invisible
7.Pharming→ I
• It is a new threat evolved with a goal to steal online identity of the netizens and
Pharming
• Is known as one of the "P" in cybercrime
• In Pharming, following two techniques are used:
• Hosts file poisoning:
• The most popular operating system (OS) in the world is Windows and It has "host
names" in their "hosts" file.
Introduction to Cyber Security (BETCK105I) Module 4
• A simple text file was used in web address during early days of the Internet. (before
DNS)
• Phisher used to "poison" the host file to redirect the netizen to a fake/bogus Website,
designed and developed by the phisher, which will "look alike the original website, to
Steal the netizen's personal information easily.
• DNS-based Phishing:
• Phisher tampers with a DNS so that requests for URLs or name service return a fake
address and subsequently netizens are directed to a fake site.
• Netizens usually are unaware that they are entering their personal confidential
information in a website controlled by phishers and probably not even in the same
country as the legitimate website.
• DNS-based Phishing is also known as DNS hijacking.
• Along with this attack Click Fraud is an advanced form of technique evolved to
conduct Phishing scams.
8. System configuration attacks:
• Phisher intrude into netizens system to modify settings for malicious purposes.
• For example, URLs saved under favourites in the browser De modified to redirect the
netizen to a fake/bogus "look alike" websites (i.e., URL for a of a bank can be changed
from "www.xyzbank.com to www.xyzbanc.com.).
9. Data theft →
• Critical and confidential data getting stolen is one of the biggest concerns in the
modern times.
• As more information resides on the corporate a servers and the web attackers have
a boom time because taking away/copying information in electronic form is easy.
• Unsecured systems are often found to be inappropriately maintained from
cybersecurity perspective.
• When such system is connected, the web servers can launch an attack with
numerous methods and techniques. Data theft is used in business espionage.
• In these types of scams, phisher replaces the part of the content of a legitimate
website with false content.
• It is used by attacker with malicious intent who redirect or hijack the DNS addresses
to bogus DNS servers for the purpose of injecting malware into your PC, Promoting
Phishing scams, advertising on high traffic website and other criminal related
activity.
• DNS hijacker use Trojan to exchange the legitimate DNS server assignment by the
ISP with a manual DNS server assignment from a bogus DNS server.
• When netizens visit the reputable websites with legitimate domain names, they are
automatically hijacked to a malicious website that is disguised as the legitimate one.
• Switch from the legitimate DNS server to bogus DNS server goes unnoticed by both
the netizens and the legitimate website owner.
• This opens up the malicious website to perform any criminal act that the phisher
wishes because the netizens thinks that they are in the real website.
SEO (Search Engine Optimization) Attacks Beware While Searching through Search
Engines
• SEO is the practice of maximizing the volume or quality of traffic to a website from
search engines Techniques used for Black hat SEO attacks
• Techniques used for Black hat SEO attacks
1. Fake antivirus
2. SEO page
3. SEO poisoning
4. Black hat SEO kits
These are Do-It Yourself Phishing kits-information sent to recipients other than the
authors of Phishing kits) other than the intended users.
1. The countermeasures will prevent malicious attacks that phisher may target to gain
the unauthorized access to the system to steal the relevant personal information
about the victim, from the system.
2. It is always challenging to recognize/Judge the legitimacy of a website while
Googling (i.e., surfing on the Internet) and find it more intriguing while downloading
any attachment from that particular website.
Introduction to Cyber Security (BETCK105I) Module 4
6 Get educated
7 Use the Microsoft Baseline Security
Analyzer (MBSA)
8 Firewall
• ScanSafe (www.scansafe.com) was the first company in the world to after web
security. Scandoo (www.Scandoo.com) scans all search results’ to protect the user
from visiting false websites (i.e., websites that spread malicious viruses or Spyware
as well as protecting the user from viewing offensive content).
• Presently this Site is nor available as improvements for add-on features based on
users' feedback is underway.
• MCAfee Site Advisor software (www.siteddvisor.com) is a free web security plug-in
that provides the user with red, yellow and green website security ratings based on
the search results.
• These ratings are based on tests conducted by McAfee after looking for all kinds of
threats such as to name a few Phishing sites, E-Commerce vulnerabilities, browser
exploits, etc.
1. Two-level filtering
2. Flexibility of the rule set
Introduction to Cyber Security (BETCK105I) Module 4
• It happens when someone uses your personally identifying information. Like your
name, social security number, or credit card number, without your permission to
commit fraud or other crimes.
Introduction to Cyber Security (BETCK105I) Module 4
• OR
• This term is used to refer to fraud that involves someone pretending to be someone
else to steal money or get other benefits.
• ID theft is a punishable offense under the Indian IT Act (Section 66C and Section
60D)
• The statistics on ID theft proves the severity of this fraud and hence a non-profit
organization was found in the US, named as Identity Theft Resource Center (ITRC),
with the objective to extend the society to spread awareness about this fraud
• Credit card fraud (26%): The highest rated fraud that can occur is when someone
acquires the victims credit card number and uses it to make a purchase.
• Bank fraud (17%): Besides credit card fraud, cheque theft and Automatic Teller
Machines (ATM) pass code theft have been reported that are possible with ID theft.
• Employment fraud (12%): In this fraud, the attacker borrows the victim's valid SSN
to obtain a
• job.
• Government fraud (9%): This type of fraud includes SSN, driver license and income
tax fraud.
• Loan fraud (5%): It occurs when the attacker applies for a loan on the victim's name
and this can
• Occur even if the SSN does not match the name exactly.
• 66% of victim's personal information is used to open a new credit account in their
name.
• 28% of victim's personal information is used to purchase cell phone service.
• 12% of victims end up having warrants issued in their name for financial crimes
committed by the identity thief.
Myth Fact
There’s no way to protect yourself from The risk of identity theft can be
identity theft minimized by taking preventive
measures.
Identity theft is only a financial crime Other identity theft also available and
are dangerous, medical ID theft of
Personal medical record, for false
insurance claims.
It's my bank's fault if I become a victim of Majority identity theft begins elsewhere,
identity theft PI may be stolen from lost or stolen
wallet, check book, credit or debit card
(low tech tool) High tech tool, hacking,
Phishing, skimming)
Checking your credit report periodically One can get free credit report in the US
or using a credit monitoring service is all from each of the credit bureaus from
you need to do to protect yourself from www.AnnualCreditReport.com
identity theft.
It is not safe to shop or bank online Like social networking, shopping and
banking online are safe as long as you
use common sense and make good
choices about where and how you do it.
Observe the webpage is legitimate.
The fraudsters attempts to steal the elements mentioned below, which can express
the purpose of distinguishing individual identity :
1. Full name,
2. National identification number (e.g., SSN
3. Telephone num
4. driver's license number;
5. credit card numbers;
6. digital identity (e.g., E-Mail address, online account ID and password);
7. birth date/birth day;
8. birthplace;
9. face and fingerprints.
Identify an Individual.
Non-classified information
Classified information
• It involves taking over someone else's identity to commit a crime such as enter into
a country, get special Permits, hide one's own identity or commit acts of terrorism.
These criminal activities can include:
• 1 Computer and cybercrimes;
• 2. organized crime;
• 3. drug traffickings
• alien smugglings
• 5. money laundering.
Identity Cloning
• Instead of stealing the personal information for financial gain or committing crimes
in the victims name, identity clones compromise the victims life by actually living
and working as the victim.
• ID clones may even pay bills regularly, get engaged and married, and start a family.
• In summary, identity cloning is the act of a fraudster living a natural and usual life
similar to a victim's life, may be at a different location.
• Bust-out" is one of the schemes fraudsters use to steal business identity; it is paid
less importance n
• parison with individual's ID theft
• A fraudster rents a space in the same building as victims office
• A fraudster rents a space in the same building as victims office
• Hence, it is extremely important to protect business sensitive information (BSI) to
avoid any further scams.
• Parents might sometimes steal their children's identity to open credit card
accounts, utility accounts, bank accounts and even to take out loans or secure
leases because their own credit history is insufficient or too damaged to open such
accounts.
Introduction to Cyber Security (BETCK105I) Module 4
Human-based methods
• Direct access to information: People who have earned a certain degree of trust (ex.,
house cleaners, babysitters, nurse, friends or roommates) can obtain legitimate access to a
business or residence to steal information.
• Dumpster diving:
• Retrieving documents from trash bins is very common and is called dumpster
diving.
• Theft of a purse or wallet: Wallet often contains bank credit cards, debit cards,
driving licence medical insurance identity card and what not.
• Pickpockets work on the street as well as in public transport and exercise rooms
to steal the wallets and in turn sell the personal information.
• Mail theft and rerouting:
• It is easy to steal the postal mails from mailboxes, which has poor security
mechanism and all the documents available to the fraudster are free of charge,
for example, Bank Mail (credit cards and account statements), administrative
forms or partially completed credit offers.
• The fraudster can use your name and other information that may prove to be
harmful for an individual in the near future.
• Therefore, return items to the sender or request a change of address.
Introduction to Cyber Security (BETCK105I) Module 4
•
Shoulder surfing: People who loiter around in the public facilities such as in the
cybercafes, near ATMs and telephone booths can keep an eye to grab the personal
details.
• False or disguised ATM (skimming"): Just as it is possible to imitate a bank
ATM, it is also possible to install miniaturized equipment on a valid ATM.
• This equipment (a copier) captures the card information, using which, duplicate
card can be made and personal identification number (PIN) can be obtained by
stealing the camera films.
• Dishonest or mistreated employees: An employee or partner with access to the
personal files, salary information, insurance files or bank information can gather
all sorts of confidential information and can use it to provide sufficient damage.
• Telemarketing and fake telephone calls: This is an effective method for
collecting information from unsuspecting people. The caller who makes a "cold
call" (supposedly from a bank) asks the victim to verify account information
immediately on the phone, often without m explanation or verification. This attack
is known as Vishing.
Computer-based technique
These techniques are attempts made by the attacker to exploit the vulnerabilities
within existing processes and/or systems.
7 Shred documents
• Protect identity is important for netizens, by erasing the footprint on the internet.
1 www.giantmatrix.com
2 www.privacyeraser.com
3 www.reputationdetender.com
4 www.suicidemachine.org
5 www.seppukoo.comm