0% found this document useful (0 votes)
22 views10 pages

Module4 Cyber

Chapter 4 discusses phishing and identity theft, outlining the methods used by phishers to deceive individuals into revealing personal information. It highlights legal repercussions under the IT Act and provides statistics on phishing trends, targeted organizations, and tactics employed by phishers. The chapter also offers countermeasures to reduce spam emails and protect against identity theft.

Uploaded by

gildajasmine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views10 pages

Module4 Cyber

Chapter 4 discusses phishing and identity theft, outlining the methods used by phishers to deceive individuals into revealing personal information. It highlights legal repercussions under the IT Act and provides statistics on phishing trends, targeted organizations, and tactics employed by phishers. The chapter also offers countermeasures to reduce spam emails and protect against identity theft.

Uploaded by

gildajasmine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter 4: Phishing and

Identity Theft

Phishing and Identity Theft: Introduction, methods of phishing,


phishing, phishing techniques, spear phishing, types of phishing
scams, phishing toolkits and spy phishing, counter measures,
Identity Theft
Introduction
Phishing is a one of the methods towards enticing netizens to reveal their personal
information that can be used for identity theft.
• ID theft involves unauthorized access to personal data.
• Section 66C of the IT Act states that “whosoever fraudulently dishonestly make
use of the electronics signature, password or any unique identification features of
any other person→ shall be punished with imprisonment of three years. And shall
also be liable for fine which extend to one lakh rupees.”
• Section 66D of the IT Act states that “whoever, by means for any
communication device or computer resource cheats by personation, shall be
punished with imprisonment of either description for a term which may extend up
to three years and also liable for fine up to which extend to one lakh rupees.”
• Phishing is a social engineering tactics to trick users into revealing confidential
information
Statistics about Phishing
Phishing map available on www.avira.com
• Virtual lab monitors the evolution of E-mail Phishing across the globe.
• The graphical illustrations available on www.m86security.com
→ Monitors origin from where Phishing E-mail are sent.
→Facebook, HSBC (Holdings plc is a British multinational universal bank and financial services holding
company), PayPal and Bank of America →targeted organization.
→US, India and China are → Targeted Countries.
3. Phishing attacks are monitored on a daily basis and displayed on www.phishtank.com
4. According to May 2009 Phishing Monthly Report compiled by Symantec Security Response Anti -Fraud
Team → Total 3,650 non-English Phishing websites were recorded in the month of May 2009.
→ Phishing URLs are categorized based on the top-level domains (TLDs). The most used TLD in Phishing
websites during the month of May 2009 were ".com, ".net and ".org" comprising 50%, 9% and 5%,
respectively. Phishing Activity Trends Report of Q4-2009 published by Anti-Phishing Working Group
(APWG,) states the Phishing attack trends and statistics for the quarter. It is important to note that:
Financial organizations, payment services and auction websites are ranked as the most targeted industry.
Port 80 [HTTP] is found to be the most popular port in use followed by Port 443 [SHTTP] and Port 8080
(WEB SERVER) among all the phishing attacks.
APWG (Anti-Phishing Working
Group)
• www. antiphishing.org, is an international consortium, founded in 2003 by David Jevans
• to bring security products and services companies, law enforcement agencies, government agencies,
trade association, regional international treaty organizations and communications companies together,
who are affected by Phishing attacks.
• APWG has more than 3,200+ members from more than 1,700 organizations and agencies across the
globe.
• To name a few, member organizations are leading security companies such as BitDefender, Symantec,
McAfee, VeriSign and IronKey.
• ING Group, VISA, Mastercard and the American Bankers Association are the members from financial
industry.
• APWG is focused on eliminating identity theft that results from the growing attacks/scams of Phishing
and E-Mail Spoofing.
• APWG provides a platform to discuss Phishing issues, define the scope Phishing problem in terms of
costs and share information about best practices to these attacks/scams
Phishing
Wikipedia:
• It is the criminally fraudulent process of attempting to acquire sensitive information such as usernames,
passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
Webopedia:
• It is an act of sending an E-Mail to a user falsely claiming to be an established legitimate enterprise in an attempt
to scam the user into surrendering private information that will be used for ID theft. • The E-Mail directs the user to
visit a website where they are asked to update personal information, such as passwords and credit card, social
security and bank account numbers that the legitimate organization already has. • The website, however, is bogus
and set up only to steal the user's information
Tech Encyclopedia:
It is a scam to steal valuable information such as credit card and social security numbers (SSN), user IDs and
passwords. • It is also known as "brand Spoofing." • An official-looking E-Mail is sent to potential victims pretending
to be from their bank or retail establishment. • E-Mails can be sent to people on selected lists or any list, expecting
that some percentage of recipients will actually have an account with the organization. • Is a type of deception
designed to steal your identity. • Here the phisher tries to get the user to disclose the personal information→ such
as credit card numbers, passwords, account data or other information’s. • Email is the popular medium of Phishing
attack and such E-Mails are also called as Spams; however not all E-mails are spam E-Mails. • Types of E-Mails →
Spam E-Mails and hoax E-Mails
Spam E-Mails and hoax E-Mails
• Spam E-Mails → Junk E-Mails
• Identical messages sent to numerous recipients.
• Grown since 1990, → Botnet network of virus infected computers are used to send 80% of spam emails.
• Types→
1. Unsolicited bulk E-Mails (UBE)→ email sent to large quantities
2. Unsolicited Commercial E-Mail (UCE)→ for commercial purpose such as advertising.
SPAMBOTS (UBE)
• Automated computer program and/or a script developed, mostly into “C” programing language to send
Spam mails.
• SPAMBOTS gather the E-Mail addresses from the internet to build mailing list.
• These are called as web crawlers, as they gather E-mail addresses from numerous websites, chatroom
conversations, newsgroups and special interest group (SIG) postings.
• → It scans for two things a) hyperlinks b) E-Mail addresses.
• The term SPAMBOT is also sometimes Used with reference to a program designed to prevent spam to
reach the subscribers of an Internet service provider (ISP).
• Such programs are called E-Mail blockers and/or filters.
Tactics used by Phishers to attack the
common people using E-Mails asking for
valuable information about himself/herself or
to verify the details
1. Names of legitimate organizations: Instead of creating a phony company from scratch, the phisher micht use a legitimate
company's name and incorporate the look and feel of its website (i.e., including the color scheme and graphics) into the
Spam E-Mail.
2. From a real employee: Real name of an official, who actually works for the organization, will appear in the "from" line or the
text of the message (or both). This way, if a user contacts the organization to confirm whether "Rajeev Arora" truly is "Vice
President of Marketing" then the user gets a positive response and feels assured.
3. URLs that look right:
• The E-Mail might contain a URL (i.e., weblink) which seems to be legitimate website wherein user can enter the information
the phisher would like to steal.
• However, in reality the website will be a quickly cobbled copycat -a spoofed" website that looks like the real thing, that is,
legitimate website. In some cases, the link might lead to selected pages of a legitimate website- such as the real company's
actual privacy policy or legal disclaimer.
4. Urgent messages:
• Creating a fear to trigger a response is very common in Phishing attacks – the EMails warn that failure to respond will result in
no longer having access to the account or E-Mails might claim that organization has detected suspicious activity in the users'
account or that organization is implementing new privacy software for ID theft solution
Here are a few examples of phrases used to
entice the user to take the action.
1. Verify your account:
• The organization will never ask the user to send passwords, login names, permanent account numbers (PANs) or
SSNs and other personal information through E-Mail. • For example, if you receive an E-Mail message from Microsoft
asking you to update your credit card Information, do not respond without any confirmation with Microsoft
authorities- this is a perfect example of Phishing attack.
2. You have won the lottery:
• The lottery scam is a common Phishing scam known as advanced fee fraud. One of the most common forms of
advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a
large sum of money for little or no work your part. • The lottery scam often includes references to big companies, for
example, Microsoft. • There is no Microsoft lottery. It is observed that most of the phished E-Mails display the
agencies/companies situated in Great Britain and hence it is extremely important for netizens to confirm/verify the
authenticity of such E-Mails before sending any response. If " any-Mail is received displaying "You have won the lottery
in Great Britain," confirm it on www.gamblingcommission.gov.uk • If any E-Mail is received displaying your selection for
any job into Great Britain, confirm/verify the details of the organization on www.companieshouse.gov.uk or on
http://www.upmystreet. com/local/uk.html.
3. If you don’t respond within 48 hours, your account will be closed
• These messages convey a sense of urgency so that you will respond immediately without thinking. A Phishing E-Mail
message might even claim that your response is required because your account might have been compromised
Let us understand the ways to reduce the
amount of Spam E-Mails we receive
1. Share personal Email address with limited people and/or on public websites-the more exposed to the public, the more
Spam E-Mails will be received.
2. Never reply or open any Spam E-Mails. Any spam E-Mails that are opened or replied to inform the phishers not only
about your existence but also about validity of your E-Mail address.
3. Disguise the E-Mail address on public website or groups by spelling out the sign "@” and the DOT for example,
RajeevATgmailDOTcom. This usually prohibits phishers to catch valid E-Mail addresses while gathering E-Mail addresses
through programs.
4Use alternate E-Mail addresses to register for any personal or shopping website. Never ever use business E-Mail
addresses for these sites but rather use E-mail addresses that are free from Yahoo, Hotmail or Gmail.
5. Do not forward any E-Mails from unknown recipients.
6.Make a habit to preview an E-Mail (an option available in an E-Mail program) before opening it.
7. Never use E-Mail address as the screen name in chat groups or rooms.
8. Never respond to a Spam E-Mail asking to remove your E-Mail address from the mailing distribution list. More often it
confirms to the phishers that your E-Mail address is active.
Hoax Mails
• These are deliberate attempt to deceive or trick a user into believing or
accepting that something 1s real. when the hoaxer (the person or group
creating the hoax) knows it is false.
• Hoax E-Mails may or may not be Spam E-Mails.
• www.breakthechain.org: This website contains a huge database of chain E-
Mails.
• www.hoaxbusters.org: excellent website containing a large database of
common Internet hoaxes.
• It contains information about all the scams.
• I maintained by Computer Incident Advisory Capability, Which is the
division of US department of energy. Eg., “Breaking news”→ Info→” Barack
Obama refused to be the president of the US → E-mail Signature as CN

You might also like