phishing and pharming - evil twins

Download phishing and pharming - evil twins

If you can't read please download the document

Upload: nilantha-piyasiri

Post on 13-Apr-2017

301 views

Category:

Internet


2 download

TRANSCRIPT

GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITYSUBJECT: INFORMATION SECURITY (MEG 4137)Prepared by : KDU/MEG/03/09 - W.M. Nilantha PiyasiriMBA IN E-GOVERNANCE - Programme IIISubmission Date : 03 April 2016

PhishingAndpharming

The Evil Twins

Identity theft

Is it really happening?

Thanks to advances in technology, the types of transactions we can now complete online are virtually endless.

We use User Names, Passwords, Credit Cards, Debit Cards, PINs, birthdates,mothers maiden name, etc.

Stealing above identities is called

Identity theft

Identity theft is a federal crime. It happens when one persons identification (which can include name, social security number, bank account number, or any other account number) is used or transferred by another person for unlawful activities.

Phishing and Pharming are two of the most organized crimes of the 21st centurey and these are at the forefront of Internet piracy and idetity theft.

The Deadly Duo

The information that steal from these act are used by fraudsters to their evil needs, such as trasfer money from accounts, buy murchandise, etc..

What is Phishing ?

(fishing) (n.) - The act of sending a message to a user falsely claiming to be an established legitimate enterpirse in an attempt to scam the user into surrendering private information that will be used for identity theft.

Did you get it?

Steps of a Phishing Attack

Phisher prepare for the attack.

Phisher will register a domain which may sound simillar when pronounce or look similar to a legitimate website. Domain could be made like www.boc-secure.lk to deceive people who visit www.boc.lk.

Sometimes they make website which says they offer reduce rates for their merchandise if they enter user name and password or PIN of an accounts of reputed eCommerce website, etc.

Step 1Initiation

Steps of a Phishing Attack

Phisher tries to lure victims into trap/bait by using different attack vectors.

The Common method is sending an email to the victim.

The other method is social engineering where the user will be compelled to go to website and login.

Or install a malware (keylogger, etc) when user logs into the website.

Step 2Execution

Steps of a Phishing Attack

Step 3User Action

Y

The victim falls into the trap. He/She will respond either one of the attack vectors.

Victim will enter his/her sensitive and confidential data such as credit card details, user credentials, account balance, etc; to the website without taking any precausionary measure.

Steps of a Phishing Attack

Step 4Completion

Y

The victim falls into the trap. He/She will respond either one of the attack vectors.

Victim will enter his/her sensitive and confidential data such as credit card details, user credentials, account balance, etc; to the website without taking any precausionary measure.