INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to...
-
Upload
simon-peters -
Category
Documents
-
view
215 -
download
3
Transcript of INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to...
![Page 1: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/1.jpg)
PHISHING ATTACK & COUNTER MEASURES
![Page 2: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/2.jpg)
INTRODUCTIONCoined in 1996 by computer hackers.Hackers use e-mail to fish the internet hoping to hook
users into supplying them the logins, passwords and/or credit card information.
In a typical phishing attack a user will receive an e-mail message impersonated to be sent by a financial institution.
1%-20% users respond to such attacks.
![Page 3: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/3.jpg)
PHISHING ATTACKSPhishing attacks are combined with malicious code
attacks such as Mimail, Bank Withdrawal Trojan, Mydoom.m worm etc
In such blended attacks these virus/worms carry the payloads which harness email addresses from the internet and affected systems and further launch phishing attacks.
![Page 4: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/4.jpg)
PHISHING EXAMPLESExample 1.
![Page 5: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/5.jpg)
![Page 6: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/6.jpg)
![Page 7: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/7.jpg)
![Page 8: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/8.jpg)
Example 2.
![Page 9: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/9.jpg)
![Page 10: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/10.jpg)
![Page 11: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/11.jpg)
![Page 12: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/12.jpg)
PHISHING TRENDS
APWG is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing.
This group provides forums to discuss phishing issues, trials and evaluations of potential technology solutions.
Publish Phishing Attack Trends Report
![Page 13: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/13.jpg)
TECHNOLOGICAL SOLUTIONSUltimate solution is training the end users not to reveal
any sensitive information.Basic approach for an effective anti-phishing effort
includes detection, prevention and awareness.Counter measures are in the form of technological
solutions, policy guidelines and user awareness.
![Page 14: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/14.jpg)
• Anti-phishing solution includes:a. Detection: scanning, flitering and alertingb. Mail server authenticationc. Secure web-authenticationd. Digitally signed e-maile. Mail gateway filteringf. Desktop filtering
![Page 15: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/15.jpg)
Secure web-authentication
![Page 16: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/16.jpg)
Digitally signed e-mail
![Page 17: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/17.jpg)
![Page 18: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/18.jpg)
Other counter-measures are:a. Changes in policy of financial institutionsb. User awarenessc. Anti-phishing techniques
![Page 19: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/19.jpg)
CONCLUSIONThe phishing attacks are major threat to e-commerce and e-
banking applications. The scammers are making huge losses by stealing financial data from the users. There is need for adoption of counter-measure steps by the financial institutions and individual customers for fighting phishing attacks. Digital signature usage should be promoted for secure mail transactions.
![Page 20: INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.](https://reader038.fdocuments.us/reader038/viewer/2022110401/56649ddb5503460f94ad2f3a/html5/thumbnails/20.jpg)
THANK YOU!!