Chapter 5 - Cyber Security
Chapter 5 - Cyber Security
Chapter 5 - Cyber Security
An e-mail fraud technique in which the culprit sends out e-mails looking legitimate in an
effort to accumulate personal and financial information from recipients (messages likely come
from well-known and trustworthy sites, viz., PayPal, eBay, MSN, Yahoo, BestBuy, and America
Online).
Phishers use a different social engineering and e-mail spoofings to try to trick their victims.
The act of sending an e-mail to a user and falsely claiming to be an established legitimate
organization to scam the user into giving up private information to be used for identity theft.
The e-mail steers the user to visit a Web site where they are asked to update their personal
information, viz., their passwords and information about their credit cards, bank account
numbers, etc.
(Courtesy : 2011 Cisco System report)
Spam E-Mails
Popular medium for phishers to scam users to enter personal information on fake websites
Types
4. Urgent messages
7. “If you don’t respond within 48 hours, your account will be closed”
Hoax E-Mails
Deliberate attempt to deceive or trick a user into believing or accepting that something is real.
Methods of Phishing
2. Rod-and-reel (identifying specific prospective victims in advance and convey false information
to them to prompt their disclosure of personal and financial data)
4. Gillnet (relies far less on social engineering techniques and phishers introduce Malicious Code
into E-Mails and websites)
Phishing Techniques
2. Filter evasion
3. Website forgery
4. Flash Phishing
5. Social Phishing
6. Phone Phishing
Phishers usually send millions of E-Mail messages, pop-up windows, etc., that appear to be
looking official and legitimate.
Spear Phishing
The message might look like as if it has come from your employer, or from a colleague who
might send an E-Mail message to everyone in the company (such as the person who
manages the computer systems); it could include requests for usernames or passwords.
Whaling
A specific form of “Phishing” and/or “Spear Phishing” – targeting executives from the top
management in the organizations, usually from private companies.
Whaling targets C-level executives sometimes with the help of information gleaned through
Spear Phishing, aimed at installing malware for keylogging or other backdoor access
mechanisms.
E-Mails sent in the whaling scams are designed to masquerade as a critical business E-Mail sent
from a legitimate business body and/or business authority.
Whaling phishers have also forged official looking FBI subpoena E-Mails and claimed that the
manager needs to click a link and install special software to view the subpoena.
Types of Phishing Scams
1. Deceptive Phishing
2. Malware-based Phishing
3. Keyloggers
4. Session hijacking
5. In-session Phishing
6. Web Trojans
7. Pharming
8. System reconfiguration attacks
9. Data theft
10. Content-injection Phishing
11. Man-in-the-middle Phishing
12. Search engine Phishing
13. SSL certificate Phishing
Distributed Phishing Attack (DPA)
An advanced form of phishing attack that works as per victim’s personalization of the location of
sites collecting credentials and a covert transmission of credentials to a hidden coordination
center run by the phisher.
A large number of fraudulent web hosts are used for each set of lured E-Mails.
Each server collects only a tiny percentage of the victim’s personal information.
Quite expensive
Most of the Phishing kits are advertised and distributed at no charge and usually these free
Phishing kits – also called DIY (Do It Yourself ) Phishing kits.
Phishing Countermeasures
The countermeasures prevent malicious attacks that phisher may target to gain the unauthorized
access to the system to steal the relevant personal information about the victim, from the
system.
SPS sanitizes all HTTP responses from suspicious URLs with warning messages.
The person whose identity is used can suffer various consequences when he/she is held
responsible for the perpetrator’s actions.
Statistics as per Federal Trade Commission (FTC)
1. Full name
2. National identification number (e.g., SSN)
3. Telephone and mobile phone numbers
4. Driver’s license number
5. Credit card numbers
6. Digital identity (e.g., E-Mail address, online account ID and password)
7. Birth date and Place name
9. Face and fingerprints
A fraudster generally searches the following about an individual:
Techniques of ID Theft
1. Human-based methods
2. Computer-based technique