SlideShare ist ein Scribd-Unternehmen logo
1 von 28
1
Submitted to: Presented by:
Er. Ajit Saxena Hitesh Khemnani
Lecturer 1047110008(B.tech-CS)
(Department of Computer Science)
Phishing
2
Hitesh
Login
Password
 Defination
 Examples
 Types of Phishing
 Causes of Phishing
 Effects of Phishing
 Industries affected
 Phishing Trends
 How to combat phishing
 Educate application users
 Formulate and enforce Best practices
 Reinforce application development / maintenance
processes:
 Web page personalization
3
o Content Validation
o Session Handling
o Authentication process
o Transaction non-repudiation
o Image Regulation
Bibliogarphy
4
It is the act of tricking someone into giving
confidential information (like passwords and
credit card information) on a fake web page or
email form pretending to come from a legitimate
company (like their bank).
For example: Sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user
into surrendering private information that will be used for identity
theft.
5
6
 Deceptive - Sending a deceptive email, in bulk, with a “call
to action” that demands the recipient click on a link.
7
 Malware-Based - Running malicious software on the
user’s machine. Various forms of malware-based phishing are:
 Key Loggers & Screen Loggers
 Session Hijackers
 Web Trojans
 Data Theft
8
9
 Content-Injection – Inserting malicious content into
legitimate site.
Three primary types of content-injection phishing:
 Hackers can compromise a server through a security
vulnerability and replace or augment the legitimate
content with malicious content.
 Malicious content can be inserted into a site through a
cross-site scripting vulnerability.
 Malicious actions can be performed on a site through a
SQL injection vulnerability.
10
 Man-in-the-Middle Phishing - Phisher positions
himself between the user and the legitimate site.
11
 Search Engine Phishing - Create web pages for fake
products, get the pages indexed by search engines, and wait for
users to enter their confidential information as part of an order,
sign-up, or balance transfer.
12
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of banks and
financial institutions
 Limited use of digital signatures
 Non-availability of secure desktop tools
 Lack of user awareness
 Vulnerability in applications
13
 Internet fraud
 Identity theft
 Financial loss to the original institutions
 Difficulties in Law Enforcement Investigations
 Erosion of Public Trust in the Internet.
14
Major industries affected are:
 Financial Services
 ISPs
 Online retailers
15
16

Educate application users
 Think before you open
 Never click on the links in an email , message boards or mailing
lists
 Never submit credentials on forms embedded in emails
 Inspect the address bar and SSL certificate
 Never open suspicious emails
 Ensure that the web browser has the latest security patch
applied
 Install latest anti-virus packages
 Destroy any hard copy of sensitive information
 Verify the accounts and transactions regularly
 Report the scam via phone or email.
17
 Formulate and enforce Best practices
 Authorization controls and access privileges for systems,
databases and applications.
 Access to any information should be based on need-to-know
principle
 Segregation of duties.
 Media should be disposed only after erasing sensitive
information.
18
Reinforce application development / maintenance processes:
1. Web page personalization
 Using two pages to authenticate the users.
 Using Client-side persistent cookies.
19
2. Content Validation
 Never inherently trust the submitted data
 Never present the submitted data back to an application user
without sanitizing the same
 Always sanitize data before processing or storing
 Check the HTTP referrer header
20
3. Session Handling
 Make session identifiers long, complicated and difficult to
guess.
 Set expiry time limits for the SessionID’s and should be
checked for every client request.
 Application should be capable of revoking active SessionID’s
and not recycle the same SessionID.
 Any attempt the invalid SessionID should be redirected to the
login page.
 Never accept session information within a URL.
 Protect the session via SSL.
 Session data should be submitted as a POST.
 After authenticating, a new SessionID should be used (HTTP
& HTTPS).
 Never let the users choose the SessionID.
21
4. Authentication Process
 Ensure that a 2-phase login process is in place
 Personalize the content
 Design a strong token-based authentication
22
5. Transaction non-repudiation
 To ensure authenticity and integrity of the transaction
23
6. Image Regulation
 Image Cycling
 Session-bound images
24
 Anti-Phishing Working Group (APWG)
The APWG has over 2300+ members from over 1500
companies & agencies worldwide. Member companies include
leading security companies such as Symantec, McAfee and
VeriSign. Financial Industry members include the ING
Group,VISA, Mastercard and the American Bankers Association.
25
It is better to be safer now than feel sorry later.
26
• http://www.antiphishing.org/reports/apwg_report_november_20
06.pdf
• http://72.14.235.104/search?q=cache:-T6-
U5dhgYAJ:www.avira.com/en/threats/what_is_phishing.html+P
hishing+consequences&hl=en&gl=in&ct=clnk&cd=7
• Phishing-dhs-report.pdf
• Report_on_phishing.pdf
• http://www.cert-in.org.in/training/15thjuly05/phishing.pdf
• http://www.antiphishing.org
27
28

Weitere ähnliche Inhalte

Was ist angesagt?

Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
Anthonywheeler
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
Dragos Lungu
 

Was ist angesagt? (20)

Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Phishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge AheadPhishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge Ahead
 
The ultimate deal on open id uses
The ultimate deal on open id usesThe ultimate deal on open id uses
The ultimate deal on open id uses
 
Auditing Archives: The Case of the Overly Helpful Front Desk Clerk
Auditing Archives: The Case of the Overly Helpful Front Desk ClerkAuditing Archives: The Case of the Overly Helpful Front Desk Clerk
Auditing Archives: The Case of the Overly Helpful Front Desk Clerk
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 

Ähnlich wie Phishing

phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
vinayakjadhav94
 

Ähnlich wie Phishing (20)

COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
E-Business security
E-Business security E-Business security
E-Business security
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Phishing
PhishingPhishing
Phishing
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 

Kürzlich hochgeladen

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Kürzlich hochgeladen (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Phishing

  • 1. 1 Submitted to: Presented by: Er. Ajit Saxena Hitesh Khemnani Lecturer 1047110008(B.tech-CS) (Department of Computer Science) Phishing
  • 3.  Defination  Examples  Types of Phishing  Causes of Phishing  Effects of Phishing  Industries affected  Phishing Trends  How to combat phishing  Educate application users  Formulate and enforce Best practices  Reinforce application development / maintenance processes:  Web page personalization 3
  • 4. o Content Validation o Session Handling o Authentication process o Transaction non-repudiation o Image Regulation Bibliogarphy 4
  • 5. It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page or email form pretending to come from a legitimate company (like their bank). For example: Sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. 5
  • 6. 6
  • 7.  Deceptive - Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link. 7
  • 8.  Malware-Based - Running malicious software on the user’s machine. Various forms of malware-based phishing are:  Key Loggers & Screen Loggers  Session Hijackers  Web Trojans  Data Theft 8
  • 9. 9
  • 10.  Content-Injection – Inserting malicious content into legitimate site. Three primary types of content-injection phishing:  Hackers can compromise a server through a security vulnerability and replace or augment the legitimate content with malicious content.  Malicious content can be inserted into a site through a cross-site scripting vulnerability.  Malicious actions can be performed on a site through a SQL injection vulnerability. 10
  • 11.  Man-in-the-Middle Phishing - Phisher positions himself between the user and the legitimate site. 11
  • 12.  Search Engine Phishing - Create web pages for fake products, get the pages indexed by search engines, and wait for users to enter their confidential information as part of an order, sign-up, or balance transfer. 12
  • 13.  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications 13
  • 14.  Internet fraud  Identity theft  Financial loss to the original institutions  Difficulties in Law Enforcement Investigations  Erosion of Public Trust in the Internet. 14
  • 15. Major industries affected are:  Financial Services  ISPs  Online retailers 15
  • 16. 16
  • 17.  Educate application users  Think before you open  Never click on the links in an email , message boards or mailing lists  Never submit credentials on forms embedded in emails  Inspect the address bar and SSL certificate  Never open suspicious emails  Ensure that the web browser has the latest security patch applied  Install latest anti-virus packages  Destroy any hard copy of sensitive information  Verify the accounts and transactions regularly  Report the scam via phone or email. 17
  • 18.  Formulate and enforce Best practices  Authorization controls and access privileges for systems, databases and applications.  Access to any information should be based on need-to-know principle  Segregation of duties.  Media should be disposed only after erasing sensitive information. 18
  • 19. Reinforce application development / maintenance processes: 1. Web page personalization  Using two pages to authenticate the users.  Using Client-side persistent cookies. 19
  • 20. 2. Content Validation  Never inherently trust the submitted data  Never present the submitted data back to an application user without sanitizing the same  Always sanitize data before processing or storing  Check the HTTP referrer header 20
  • 21. 3. Session Handling  Make session identifiers long, complicated and difficult to guess.  Set expiry time limits for the SessionID’s and should be checked for every client request.  Application should be capable of revoking active SessionID’s and not recycle the same SessionID.  Any attempt the invalid SessionID should be redirected to the login page.  Never accept session information within a URL.  Protect the session via SSL.  Session data should be submitted as a POST.  After authenticating, a new SessionID should be used (HTTP & HTTPS).  Never let the users choose the SessionID. 21
  • 22. 4. Authentication Process  Ensure that a 2-phase login process is in place  Personalize the content  Design a strong token-based authentication 22
  • 23. 5. Transaction non-repudiation  To ensure authenticity and integrity of the transaction 23
  • 24. 6. Image Regulation  Image Cycling  Session-bound images 24
  • 25.  Anti-Phishing Working Group (APWG) The APWG has over 2300+ members from over 1500 companies & agencies worldwide. Member companies include leading security companies such as Symantec, McAfee and VeriSign. Financial Industry members include the ING Group,VISA, Mastercard and the American Bankers Association. 25
  • 26. It is better to be safer now than feel sorry later. 26
  • 27. • http://www.antiphishing.org/reports/apwg_report_november_20 06.pdf • http://72.14.235.104/search?q=cache:-T6- U5dhgYAJ:www.avira.com/en/threats/what_is_phishing.html+P hishing+consequences&hl=en&gl=in&ct=clnk&cd=7 • Phishing-dhs-report.pdf • Report_on_phishing.pdf • http://www.cert-in.org.in/training/15thjuly05/phishing.pdf • http://www.antiphishing.org 27
  • 28. 28

Hinweis der Redaktion

  1. Examples of a “call to action” include: ! A statement that there is a problem with the recipient’s account at a financial institution or other business. The email asks the recipient to visit a web site to correct the problem, using a deceptive link in the email. ! A statement that the recipient’s account is at risk, and offering to enroll the recipient in an anti-fraud program. ! A fictitious invoice for merchandise, often offensive merchandise, that the recipient did not order, with a link to “cancel” the fake order. ! A fraudulent notice of an undesirable change made to the user’s account, with a link to “dispute” the unauthorized change. ! A claim that a new service is being rolled out at a financial institution, and offering the recipient, as a current member, a limited-time opportunity to get the service for free.
  2. Key Loggers & Screen Loggers - Monitors data being input and sends relevant data to a phishing server Session Hijackers - Malicious software “hijacks” the session once the user has legitimately established his or her credentials. Web Trojans – Malicious programs that pop up to collect credentials. Host File Poisoning – Host file modification to refer to a malicious address. Data Theft – Stealing confidential information stored on the computer
  3. Internet fraud - Phishers can run up charges on your account Identity theft – Can open new accounts, sign utility or loan contracts in your name or use a false ID and commit crimes using your personal information Loss to the original institutions- Approximately 1.2 million computer users in the United States suffered losses caused by phishing, totaling approximately $929 million USD Difficulties in Law Enforcement Investigations . Unlike certain other types of identity theft that law enforcement agencies can successfully investigate in a single geographic area (e.g., theft of wallets, purses, or mail), phishing – like other types of crime that exploit the Internet -- can be conducted from any location where phishers can obtain Internet access. This can include situations in which a phisher in one country takes control of a computer in another country, then uses that computer to host his phishing website or send his phishing e-mails to residents of still other countries. Moreover, online criminal activity in recent years has often reflected clearcut divisions of labor.
  4. ISPs-Internet service provide
  5. Think twice before you open an email and never get carried away by the social engineering statements in the mail. Never click on links provided in an email, message boards or mailing lists Never submit sensitive information on forms embedded in emails Inspect the address bar and the SSL certificate to see if they match with the exact name of the site. Pay attention to SSL certificate warning prompts that appear when contacting a spoofed site. Make sure that you have the latest patched version of Web browser Install latest anti-virus packages, personal firewall and spyware / spam blockers Never open any suspicious email attachments Destroy all PIN / password letters and never write them down somewhere. Never disclose personal / sensitive information to anyone at any instant. Regularly log in to your accounts and check the activities In the event of a phishing attack, Provide a means for the user to report the scam via phone or email. Clearly instruct them about the procedure to follow to report the scam Instruct the user to reset his password / PIN immediately.
  6. Web page personalization – two ways to do it. Web sites can use two page to authenticate the users. The first page asks the user to provide only the user name. Upon receiving a valid user name, the user is given a personalized page for entering his authentication token. The second page is personalized with last login details or based on some user provided phrase or a user chose image. This will make it difficult for a fake site to provide the second page. (For static authentication tokens like password) Client-side persistent cookies can be user. On first login, a cookie will be generated with a simple personal string such as first name. Next time, the app greets ther user with this string bfore he logs in. But the succes of this option depends a lot on the alertness of the end user.
  7. Never inherent trust the submitted data Always sanitize date before processing or storing Check the HTTP referrer header – when tricked customers are directed from the phishing site to the targeted website, there is the option to check the referrer hearder in the requests to the targeted website and act on it by for example redirecting the tricked customer to the warning page.
  8. Design a strong token-based authentication – Hardware tokens & Smart cards Things to have in mind – randomness of the one-time password, Expiry time of the one-time password Length Quality of challenge in a challenge and response based authentication
  9. Transaction non-repudiation can be implemented through electronic signatures, either digital signatures or MAC. To ensure authenticity and integrity of the transaction so as to ensure the origin of the transaction and identifying whether the message content has been altered during transit. A transaction signature is a one-way value that uses aspects of the customer’s key, transaction content date and time. This signature is then validated using the appropriate scheme. MACS are supported by the challenge and response functionality of the hardware tokens.
  10. Depending on whether a phisher has mirrored the entire website or is just hosting a modified HTML page, it may be possible to identify the source of the attack. Image Cycling – Each legitimate application page references its constituent graphical images by a unique name. Periodically, the names of the images are changed and the requesting page must reference these new image names. Therefore, any out-of-date static copies of the page will become dated quickly. If an out-of-date image is requested, a different image is supplied – perhaps recommending that the customer login again to the real site – (e.g. “Warning Image Expired”). Session-bound images – it is possible to reference all images with a name that includes the user’s current sessionID. Therefore, once a fake website has been discovered, the logs can be reviewed and analyzed in order to discover the originating source of the copied website.