SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Anatomy of a Phishing Email
Spamming for money
2


    phish·ing/ˈfi shiŋ/
                -
    noun:
    The fraudulent practice of
    sending emails purporting to
    be from legitimate companies
    in order to induce individuals
    to reveal personal information




                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
3   An inbox hand grenade
    This is what a phishing email can look like if your email client is
    set to display text only.

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
4   Looks can be deceiving
    And here it is loaded in rich-text or HTML. Odds are your email is set
    up so that a phishing email could look a lot like this. Seems official?

                                    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
5   A closer look
    Notice the To: and Cc: boxes aren’t filled in. And while it claims to be
    from Wells Fargo, the email address appears to be from “activation.”

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
6   Not my number
    See how they’ve tried to make the VISA number look like something
    you’d recognize? Well, on most credit cards it’s the last eight
    numbers that are unique.
                                  © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
7   Obvious no-no
    No bank or legitimate business will ask for personal information in an
    email. It’s a clear sign the message is a scam.

                                   © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
A deeper look
8


       The scammers get sophisticated. The Wells Fargo logo has an
        official SSL certificate, a widely accepted method for ensuring
        a secure connection. That means the bad guys mined the
        Internet for official company graphics to include in the con.




                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Verified, but not
9


       The SSL certificate is
        verified, meaning it
        has been officially
        recognized as Wells
        Fargo.
       But that only applies
        to the logo. So if you
        dissect your messages
        for authenticity, be
        careful. It’s easy to
        be misled.


                                 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
10   The evil code
     Looking at the email code, you can see information wouldn’t be sent to
     Wells Fargo, but to PayPal. It’s designed to automatically pull money from
     your account, through PayPal, presumably to the hackers’ account.
                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
The reroute game
11



           The scammers are also trying to mask their steps
           by pumping your information through a masked
           web address: http://0x185AED0A/T/w.php




                              © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Use your judgment
12




                The best defense against these
                phishing attacks is sound judgment.

                If it doesn’t feel right, it probably isn’t.
                Simply pick up the phone, call your
                bank or business, and ask them to
                work with you over the phone.




                          © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Take action
13




                   If you’ve fallen for a phishing
                   scam, you’re not alone. Call your
                   bank, credit union, insurer, financial
                   planner or attorney to see if they provide
                   identity theft protection.




                               © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Help is out there
14




     Call Identity Theft 911
     at 1-888-682-5911.



                         © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
Johnathan Bernal
 

Was ist angesagt? (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information security
Information securityInformation security
Information security
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 

Andere mochten auch

Presentación1
Presentación1Presentación1
Presentación1
danash14
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Tatsuo Shigematsu
 

Andere mochten auch (16)

Presentación1
Presentación1Presentación1
Presentación1
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!
 
5 aplicatii
5 aplicatii5 aplicatii
5 aplicatii
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieria
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tango
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
 
Facebook Deep face
Facebook Deep faceFacebook Deep face
Facebook Deep face
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalance
 
Sách Luyện Đọc Nhanh
Sách Luyện Đọc NhanhSách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
 
RESPIRATORIO
RESPIRATORIORESPIRATORIO
RESPIRATORIO
 
Ict environment
Ict environmentIct environment
Ict environment
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSA
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
 
Islam
IslamIslam
Islam
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
 

Ähnlich wie Anatomy of a Phishing Email

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 

Ähnlich wie Anatomy of a Phishing Email (16)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Scams
ScamsScams
Scams
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
travel Safely
travel Safelytravel Safely
travel Safely
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Anatomy of a Phishing Email

  • 1. Anatomy of a Phishing Email
  • 2. Spamming for money 2 phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 3. 3 An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 4. 4 Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 5. 5 A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 6. 6 Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 7. 7 Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 8. A deeper look 8  The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 9. Verified, but not 9  The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo.  But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 10. 10 The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 11. The reroute game 11 The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 12. Use your judgment 12 The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 13. Take action 13 If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 14. Help is out there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012