SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Vulnerability Analysis Paper 1
PHISH PHRY
Joydeep Banerjee, M.S.
University of Illinois at Springfield
Author Note
Contact: Email-jbane2@uis.edu
Vulnerability Analysis Paper 2
Table of Contents
Preface................................................................................................................................ 3
Phishing.............................................................................................................................. 4
Introduction to Phishing............................................................................................. 4
Phishing Techniques .................................................................................................... 4
Case in Point: - Phish Phry ......................................................................................... 6
Modus Operandi .......................................................................................................... 6
Egypt Chapter.......................................................................................................... 6
United States Chapter............................................................................................. 6
Mitigation Techniques ................................................................................................. 6
Current Status of the Attack.................................................................................... 7
Word of Caution from Ground Zero...................................................................... 7
References.......................................................................................................................... 8
Acknowledgement............................................................................................................. 9
Vulnerability Analysis Paper 3
Preface
This analysis paper essentially covers the fundamentals of Phishing and the techniques
employed for its accomplishment in real time scenarios. Phishing is one of the very
common ways applied by the cyber criminals and hackers to bait the users into sharing
confidential data and information. The data or information, so gathered, is used to
perform nefarious activities often leading to huge financial loses, bankruptcy and identity
theft. The paper also discusses on one of most notorious phishing scams of the decade
Phish Phry which amounted to a loss of 1 million dollars and compromising confidential
data of thousands of customers of two very reputed banks of the USA. The scam finally
got busted in the year 2011 convicting 47 people in the federal court. Like many
security experts of the world today, Dave Jevans, an industry expert, exclaimed, “As far
as a dent in the number of phishers out there and the phishing gangs, it's probably not
significant.”
Vulnerability Analysis Paper 4
Phishing
Introduction to Phishing
Phishing is a kind of social engineering technique often used to steal personal and
private information of users. The attacker masquerades as a popular or trusted or reputed
entity or a person and tries to deceive the user by maintaining a very convincing
approach. The hacker dupes a user into clicking on a link or press a button or open a
certain webpage that leads to installation of malware or revelation of confidential data
and information.
Phishing Techniques
Phishing can be accomplished using mediums like social websites, banks, email,
messenger applications and auction websites. Mentioned below are a few techniques of
performing a phishing attack:
Email
Email Phishing is one of the most common phishing techniques where the scammers
broadcast the same email to millions of users. The users are usually asked to provide
personal information and often their financial information as well. The scammers often
create a sense of urgency or emergency in the minds of the users to persuade them to
fill in the information. The gathered information is generally sold or used for nefarious
activities.
Link Manipulation
Link Manipulation Phishing is a technique where a scammer sends or broadcasts a
hyperlink to user(s) using instant messaging and manipulates them to click on that link.
As the user opens the link, it directs him to a fake website which has a look and feel
of an authentic website. The user might put in his credentials which in turn reaches the
hands of the phishers.
Web Based Delivery
Web Based Delivery Phishing is a technique where a phisher plays as the man-in-the-
middle between a website and the system. The phisher collects information passed on by
the user keeping the user completely in the dark.
Trojan horse
Trojans are malwares that are installed in the users’ machines without their knowledge or
consent to gather information from their machines.
Vulnerability Analysis Paper 5
Key Loggers
Key Loggers are also malware programs that records the keyboard inputs and sends the
information to the phisher. The information then can be used to break passcodes or other
confidential information.
Session Hacking
Session Hacking is a way where the hacker uses a sniffer to access information illegally
from a webserver.
Phone Phishing
Phone phishing is a kind of phishing where the hacker calls the user over phone and
asks for confidential information impersonating themselves as someone from a recognized
organization like banks, credit card companies etc.
Content Injection
Content Injection is a type of phishing where the phisher doctors a page in an authentic
website to deceive the users and lead them to fake pages where they are asked to enter
confidential information.
System Reconfiguration
Hackers often message a user to change the settings of the computer. The message
generally is sent from a web address that looks like an authentic site.
Search Engine Phishing
Search Engine is a technique where users are taken or lured to websites where products
are sold at cheaper prices. These sites are used to gather credit card or net banking
details of the users.
Phishers have been attacking bank customers and online payment service users to usurp
their financial information. Earlier the attacks used to be indiscriminate with a hope that
few might fall for the trap. With the advent of sophisticated techniques like data mining
and data analytics and illegal practices like insider trading and selling of data, attackers
are now able to perform targeted phishing. The phishing mails are sent to classified,
highly potential victims and the hit rate has increased considerably in the recent times.
This has culminated to large scale identity thefts and huge financial losses like in one of
the most notorious phishing cases of all times - Phish Phry.
Vulnerability Analysis Paper 6
Case in Point: - Phish Phry
Phish Phry is one of the largest phishing cases till date that has entailed almost 100
people charged in the US and Egypt. The criminals primarily targeted U.S. banks,
namely Wells Fargo and Bank of America, and as many as thousands of customers by
stealing and misusing their financial data and confidential information to transfer almost
$1.5 million to their own fake accounts. The fraudsters are indicted for computer fraud,
identity theft, conspiracy to commit bank fraud and money laundering.
Modus Operandi
Attackers or Phishers used to contact the customers by sending them fake emails that
seemed like official ones from banks or credit card companies. The emails then used to
take the victims to fake websites with a real look and feel. The users then would enter
account details, passcodes and confidential identification information.
Egypt Chapter
In Egypt the financial information collected from the fake website were used to hack
into the bank accounts. Then, the hackers and their handlers used to inform their
counterparts in U.S. through text messages or phone calls or online messengers. The
U.S. handlers would then facilitate the transferring of the money from the victims’
accounts to the freshly created fake accounts.
United States Chapter
The U.S. chapter of the scam was looked after by:
1. Nichole Michelle Merzi, 25, of Oceanside, CA;
2. Kenneth Joseph Lucas, 26, of Los Angeles, CA; and
3. Jonathan Preston Clark, 26, of Los Angeles, CA.
These 3 scamsters ordered recruitments to open bank accounts to transfer the stolen
money. Then an agreed portion of the money used to be withdrawn and wired to the
Egyptian handlers.
Mitigation Techniques
Phishing attack Phish Phry could have been detected and neutralized had the affected
users performed the following preventive actions :
 Using caution when checking emails or clicking any link in the email without
verifying the authenticity of the source. Never falling prey to the scare tactics or
sense of urgency created by attackers to get confidential or private information
Vulnerability Analysis Paper 7
 Setting Spam filters to high will keep the inbox free from spam mailers
 Using right anti-virus program will help in detecting and neutralizing the
unwanted programs or viruses or malwares
 Checking website URLs carefully to avoid visiting look-alike spoofed versions of
websites with almost similar URLs
 Avoiding to chat with any stranger over internet and giving out any private
information or changing any privacy settings on being asked or advised
 Raising awareness and educating peers to maintain precaution as stated above.
Current Status of the Attack
The attack has been contained and the customers are compensated by both the banks for
the loses. Both Wells Fargo and Bank of America have increased their awareness
campaigns and customer education in a bid to combat phishing practices. Wells Fargo
has an emergency dial and mail address to report suspicious mails or messages. Bank of
America, too, has an emergency mail address to flag phishing attempts. Efforts are on in
full swing to educate the customers but at the end of the day it’s the customers whose
caution can save themselves from being victimized.
Word of Caution from Ground Zero
“Cybercrime might not seem real until it hits you,” Mueller said. “But every personal,
academic, corporate, and government network plays a role in national security.” The
Bureau wants the law enforcement and intelligence agencies to work hand-in-hand to
fight against cybercrimes like phishing. Even though the government is working hard to
keep high standards and building partnerships, Mueller added, “we are still outnumbered
by cyber criminals.” His piece of advice for the users using smart devices to use
firewalls, antiviruses and maintain a strong password policy or practice. “We all have a
responsibility to protect the infrastructure that protects the world,” Mueller said.
Vulnerability Analysis Paper 8
References
1. http://searchsecurity.techtarget.com/definition/Operation-Phish-Phry
2. http://www.computerworld.com/article/2528769/cybercrime-hacking/operation-
phish-phry-hooks-100-in-u-s--and-egypt.html
3. https://archives.fbi.gov/archives/news/stories/2009/october/phishphry_100709
4. http://www.phishing.org/phishing-techniques/
5. http://www.forbes.com/sites/billsinger/2012/05/15/feds-catch-their-illegal-limit-
in-operation-phish-phry/#140d6e02411a
6. https://en.wikipedia.org/wiki/Phishing
7. https://www.wellsfargo.com/privacy-security/fraud/report/phish/
8. https://www.bankofamerica.com/privacy/report-suspicious-email.go
Vulnerability Analysis Paper 9
Acknowledgement
Before I conclude I would like to take this opportunity to express my sincere gratitude
to the Department of Computer Science, University of Illinois at Springfield, for
providing me the scope to engage myself into research based learning. I owe my deep
regards to Professor Mark Huson for being the guide and the torchbearer during the
course of writing this paper.
I thank my family and my God for being a constant source of inspiration for me. I
hope I have been able to deliver to the best of my abilities to prepare this paper in its
present shape. Thank you so much. Cheers!

Weitere ähnliche Inhalte

Was ist angesagt?

The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General CourseAaron Keating
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingAshley_Coy
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016Eli Marcus
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 

Was ist angesagt? (20)

The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Phishing
PhishingPhishing
Phishing
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, Clickjacking
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 

Ähnlich wie Phish Phry- Analysis paper

Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfEvs, Lahore
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishingMH BS
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani Tanish Khilani
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingCSITiaesprime
 

Ähnlich wie Phish Phry- Analysis paper (20)

Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processing
 

Kürzlich hochgeladen

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 

Kürzlich hochgeladen (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Phish Phry- Analysis paper

  • 1. Vulnerability Analysis Paper 1 PHISH PHRY Joydeep Banerjee, M.S. University of Illinois at Springfield Author Note Contact: Email-jbane2@uis.edu
  • 2. Vulnerability Analysis Paper 2 Table of Contents Preface................................................................................................................................ 3 Phishing.............................................................................................................................. 4 Introduction to Phishing............................................................................................. 4 Phishing Techniques .................................................................................................... 4 Case in Point: - Phish Phry ......................................................................................... 6 Modus Operandi .......................................................................................................... 6 Egypt Chapter.......................................................................................................... 6 United States Chapter............................................................................................. 6 Mitigation Techniques ................................................................................................. 6 Current Status of the Attack.................................................................................... 7 Word of Caution from Ground Zero...................................................................... 7 References.......................................................................................................................... 8 Acknowledgement............................................................................................................. 9
  • 3. Vulnerability Analysis Paper 3 Preface This analysis paper essentially covers the fundamentals of Phishing and the techniques employed for its accomplishment in real time scenarios. Phishing is one of the very common ways applied by the cyber criminals and hackers to bait the users into sharing confidential data and information. The data or information, so gathered, is used to perform nefarious activities often leading to huge financial loses, bankruptcy and identity theft. The paper also discusses on one of most notorious phishing scams of the decade Phish Phry which amounted to a loss of 1 million dollars and compromising confidential data of thousands of customers of two very reputed banks of the USA. The scam finally got busted in the year 2011 convicting 47 people in the federal court. Like many security experts of the world today, Dave Jevans, an industry expert, exclaimed, “As far as a dent in the number of phishers out there and the phishing gangs, it's probably not significant.”
  • 4. Vulnerability Analysis Paper 4 Phishing Introduction to Phishing Phishing is a kind of social engineering technique often used to steal personal and private information of users. The attacker masquerades as a popular or trusted or reputed entity or a person and tries to deceive the user by maintaining a very convincing approach. The hacker dupes a user into clicking on a link or press a button or open a certain webpage that leads to installation of malware or revelation of confidential data and information. Phishing Techniques Phishing can be accomplished using mediums like social websites, banks, email, messenger applications and auction websites. Mentioned below are a few techniques of performing a phishing attack: Email Email Phishing is one of the most common phishing techniques where the scammers broadcast the same email to millions of users. The users are usually asked to provide personal information and often their financial information as well. The scammers often create a sense of urgency or emergency in the minds of the users to persuade them to fill in the information. The gathered information is generally sold or used for nefarious activities. Link Manipulation Link Manipulation Phishing is a technique where a scammer sends or broadcasts a hyperlink to user(s) using instant messaging and manipulates them to click on that link. As the user opens the link, it directs him to a fake website which has a look and feel of an authentic website. The user might put in his credentials which in turn reaches the hands of the phishers. Web Based Delivery Web Based Delivery Phishing is a technique where a phisher plays as the man-in-the- middle between a website and the system. The phisher collects information passed on by the user keeping the user completely in the dark. Trojan horse Trojans are malwares that are installed in the users’ machines without their knowledge or consent to gather information from their machines.
  • 5. Vulnerability Analysis Paper 5 Key Loggers Key Loggers are also malware programs that records the keyboard inputs and sends the information to the phisher. The information then can be used to break passcodes or other confidential information. Session Hacking Session Hacking is a way where the hacker uses a sniffer to access information illegally from a webserver. Phone Phishing Phone phishing is a kind of phishing where the hacker calls the user over phone and asks for confidential information impersonating themselves as someone from a recognized organization like banks, credit card companies etc. Content Injection Content Injection is a type of phishing where the phisher doctors a page in an authentic website to deceive the users and lead them to fake pages where they are asked to enter confidential information. System Reconfiguration Hackers often message a user to change the settings of the computer. The message generally is sent from a web address that looks like an authentic site. Search Engine Phishing Search Engine is a technique where users are taken or lured to websites where products are sold at cheaper prices. These sites are used to gather credit card or net banking details of the users. Phishers have been attacking bank customers and online payment service users to usurp their financial information. Earlier the attacks used to be indiscriminate with a hope that few might fall for the trap. With the advent of sophisticated techniques like data mining and data analytics and illegal practices like insider trading and selling of data, attackers are now able to perform targeted phishing. The phishing mails are sent to classified, highly potential victims and the hit rate has increased considerably in the recent times. This has culminated to large scale identity thefts and huge financial losses like in one of the most notorious phishing cases of all times - Phish Phry.
  • 6. Vulnerability Analysis Paper 6 Case in Point: - Phish Phry Phish Phry is one of the largest phishing cases till date that has entailed almost 100 people charged in the US and Egypt. The criminals primarily targeted U.S. banks, namely Wells Fargo and Bank of America, and as many as thousands of customers by stealing and misusing their financial data and confidential information to transfer almost $1.5 million to their own fake accounts. The fraudsters are indicted for computer fraud, identity theft, conspiracy to commit bank fraud and money laundering. Modus Operandi Attackers or Phishers used to contact the customers by sending them fake emails that seemed like official ones from banks or credit card companies. The emails then used to take the victims to fake websites with a real look and feel. The users then would enter account details, passcodes and confidential identification information. Egypt Chapter In Egypt the financial information collected from the fake website were used to hack into the bank accounts. Then, the hackers and their handlers used to inform their counterparts in U.S. through text messages or phone calls or online messengers. The U.S. handlers would then facilitate the transferring of the money from the victims’ accounts to the freshly created fake accounts. United States Chapter The U.S. chapter of the scam was looked after by: 1. Nichole Michelle Merzi, 25, of Oceanside, CA; 2. Kenneth Joseph Lucas, 26, of Los Angeles, CA; and 3. Jonathan Preston Clark, 26, of Los Angeles, CA. These 3 scamsters ordered recruitments to open bank accounts to transfer the stolen money. Then an agreed portion of the money used to be withdrawn and wired to the Egyptian handlers. Mitigation Techniques Phishing attack Phish Phry could have been detected and neutralized had the affected users performed the following preventive actions :  Using caution when checking emails or clicking any link in the email without verifying the authenticity of the source. Never falling prey to the scare tactics or sense of urgency created by attackers to get confidential or private information
  • 7. Vulnerability Analysis Paper 7  Setting Spam filters to high will keep the inbox free from spam mailers  Using right anti-virus program will help in detecting and neutralizing the unwanted programs or viruses or malwares  Checking website URLs carefully to avoid visiting look-alike spoofed versions of websites with almost similar URLs  Avoiding to chat with any stranger over internet and giving out any private information or changing any privacy settings on being asked or advised  Raising awareness and educating peers to maintain precaution as stated above. Current Status of the Attack The attack has been contained and the customers are compensated by both the banks for the loses. Both Wells Fargo and Bank of America have increased their awareness campaigns and customer education in a bid to combat phishing practices. Wells Fargo has an emergency dial and mail address to report suspicious mails or messages. Bank of America, too, has an emergency mail address to flag phishing attempts. Efforts are on in full swing to educate the customers but at the end of the day it’s the customers whose caution can save themselves from being victimized. Word of Caution from Ground Zero “Cybercrime might not seem real until it hits you,” Mueller said. “But every personal, academic, corporate, and government network plays a role in national security.” The Bureau wants the law enforcement and intelligence agencies to work hand-in-hand to fight against cybercrimes like phishing. Even though the government is working hard to keep high standards and building partnerships, Mueller added, “we are still outnumbered by cyber criminals.” His piece of advice for the users using smart devices to use firewalls, antiviruses and maintain a strong password policy or practice. “We all have a responsibility to protect the infrastructure that protects the world,” Mueller said.
  • 8. Vulnerability Analysis Paper 8 References 1. http://searchsecurity.techtarget.com/definition/Operation-Phish-Phry 2. http://www.computerworld.com/article/2528769/cybercrime-hacking/operation- phish-phry-hooks-100-in-u-s--and-egypt.html 3. https://archives.fbi.gov/archives/news/stories/2009/october/phishphry_100709 4. http://www.phishing.org/phishing-techniques/ 5. http://www.forbes.com/sites/billsinger/2012/05/15/feds-catch-their-illegal-limit- in-operation-phish-phry/#140d6e02411a 6. https://en.wikipedia.org/wiki/Phishing 7. https://www.wellsfargo.com/privacy-security/fraud/report/phish/ 8. https://www.bankofamerica.com/privacy/report-suspicious-email.go
  • 9. Vulnerability Analysis Paper 9 Acknowledgement Before I conclude I would like to take this opportunity to express my sincere gratitude to the Department of Computer Science, University of Illinois at Springfield, for providing me the scope to engage myself into research based learning. I owe my deep regards to Professor Mark Huson for being the guide and the torchbearer during the course of writing this paper. I thank my family and my God for being a constant source of inspiration for me. I hope I have been able to deliver to the best of my abilities to prepare this paper in its present shape. Thank you so much. Cheers!