Chapter 3
Chapter 3
E-Commerce Security
Unit 3: E-Commerce Security (8 Hrs.)
9. Spoofing:-
Spoofing is a type of cybercriminal activity where someone or
something forges the sender's information and pretends to be a
legitimate source, business, colleague, or other trusted contact for
the purpose of gaining access to personal information, acquiring
money, spreading malware, or stealing data.
Types of spoofing
a. Email Spoofing: Manipulating email headers to make a message appear
as if it’s coming from a legitimate source when it’s actually from a
malicious actor. Example: Phishing emails that appear to be from a
trusted company, asking recipients to provide sensitive information.
b. Website Spoofing: Creating a fake website that mimics the appearance of a
legitimate site to deceive users into entering personal information or making
fraudulent transactions. Example: A fake e-commerce site that looks
identical to a well-known retailer’s site to trick users into entering credit card
details.
c. IP Spoofing: Altering the source IP address in network packets to make it
appear as if they are coming from a trusted source.
d. Domain Spoofing: Registering a domain name that is similar to a legitimate
domain to deceive users into visiting a fraudulent site. Example: A domain
like “amaz0n.com” (with a zero) instead of “amazon.com” to trick users into
thinking they’re on the legitimate Amazon site
10. Pharming :-
• Pharming in e-commerce is a more sophisticated type of cyber attack
that redirects users from legitimate websites to fraudulent ones by
changing host file or DNS without their knowledge.
• Target multiple people at a time
• Malicious code installed to the computer that redirects to the fake
website
Types :-
a) DNS Spoofing: Attackers manipulate the DNS settings to redirect users
from the intended website to a fake site designed to steal sensitive
information like login credentials or payment details.
b) Malicious Software: Users might unknowingly install malware that alters
their browser settings or hosts file, leading them to counterfeit sites.
Protection Against Pharming
Choose reliable internet service provider (ISP)
Always check site links for misspellings
Choose hypertext transfer protocol secure (HTTPS)
Scrutinize (examine /inspect )downloads and clicks.
11. Spam:-
• Spam is a term for unsolicited messages—mainly in the form of emails—
distributed to a large number of recipients. The number of unwanted
communications can flood mail servers, drowning out the important
messages that are relevant to users.
• Spammer Collect email address, mobile number from chat box, websites,
customer lists etc and use them. They even sells these information to
other Spammers.
• They uses gained information:-
– For advertisement (sells promotion and marketing).
– to copy the sensitive information
– To spread virus, malware etc
• Types:-
– Email spamming
– Social N/W spamming
– Mobile phone spamming
• SPAMDEXING (Spamdexing, also known as webspam and black-hat SEO, is a set of
practices aimed at manipulating search engine results )
12. Sniffing :-
• Sniffing means read or capture
• A sniffing attack is when a hacker uses a packet sniffer to
capture and access confidential, unencrypted data packets
for malicious purposes.
• A sniffing attack in system hacking is a form of denial-of-
service attack which is carried out by sniffing or capturing
packets on the network, and then either sending them
repeatedly to a victim machine or replaying them back to the
sender with modifications. Sniffers are often used in system
hacking as a tool for analyzing traffic patterns in a scenario
where performing more intrusive and damaging attacks
would not be desirable.
Ethical uses of sniffing
• Packet capturing
• Network traffic usages and analysis
• Packet conversion for data analysis
• Network troubleshooting
Unethical usages
• User identity and password stealing
• Email and instant message data stealing
• Packet spoofing and data theft
• Monetary or reputational damage
How it works??
• A sniffer can continuously monitor all the traffic to a computer through
the NIC by decoding the information encapsulated in the data packets.
How it works??
• A sniffer normally turns the Network Interface Card (NIC) of the system to
the promiscuous mode so that it listens to all the data transmitted on its
segment.
• Promiscuous mode refers to the unique way of Ethernet hardware, in
particular, network interface cards (NICs), that allows an NIC to receive all
traffic on the network, even if it is not addressed to this NIC. By default, a
NIC ignores all traffic that is not addressed to it, which is done by
comparing the destination address of the Ethernet packet with the
hardware address (a.k.a. MAC) of the device. While this makes perfect
sense for networking, non-promiscuous mode makes it difficult to use
network monitoring and analysis software for diagnosing connectivity
issues or traffic accounting.
Sniffing types
Active Sniffing attacks
• Active sniffing attacks majorly refer to attacks triggered by injecting
Address Resolution Protocols (ARPs) into a network to flood the Switch
Content address memory (CAM) table. The redirected legitimate traffic
finally allows the attacker to perform the sniffing of the traffic from the
switch.