Phishing attack, here is why you should be scared
WHAT IS A PHISHING ATTACK
Phishing
is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message. The recipient is then tricked into clicking a
malicious link, which can lead to the installation of malware, the freezing of
the system as part of a ransomware attack or the revealing of sensitive
information.
An
attack can have devastating results. For individuals, this includes
unauthorized purchases, the stealing of funds, or identify theft.
Moreover,
phishing is often used to gain a foothold in corporate or governmental networks
as a part of a larger attack, such as an advanced persistent threat (APT)
event. In this latter scenario, employees are compromised in order to bypass
security perimeters, distribute malware inside a closed environment, or gain
privileged access to secured data.
An
organization succumbing to such an attack typically sustains severe financial
losses in addition to declining market share, reputation, and consumer trust.
Depending on scope, a phishing attempt might escalate into a security incident
from which a business will have a difficult time recovering.
Numerous different
types of phishing attacks have now been identified. Some of the more prevalent
are listed below.
·
Deceptive Phishing. The
term "phishing" originally referred to account theft using instant
messaging but the most common broadcast method today is a deceptive email
message. Messages about the need to verify account information, system failure
requiring users to re-enter their information, fictional account charges,
undesirable account changes, new free services requiring quick action, and many
other scams are broadcast to a wide group of recipients with the hope that the
unwary will respond by clicking a link to or signing onto a bogus site where
their confidential information can be collected.
·
Malware-Based Phishing refers
to scams that involve running malicious software on users' PCs. Malware can be
introduced as an email attachment, as a downloadable file from a web site, or
by exploiting known security vulnerabilities--a particular issue for small and
medium businesses (SMBs) who are not always able to keep their software
applications up to date.
·
Keyloggers and Screenloggers are
particular varieties of malware that track keyboard input and send relevant
information to the hacker via the Internet. They can embed themselves into
users' browsers as small utility programs known as helper objects that run
automatically when the browser is started as well as into system files as
device drivers or screen monitors.
·
Session Hijacking describes
an attack where users' activities are monitored until they sign in to a target
account or transaction and establish their bona fide credentials. At that point
the malicious software takes over and can undertake unauthorized actions, such
as transferring funds, without the user's knowledge.
·
Web Trojans pop
up invisibly when users are attempting to log in. They collect the user's
credentials locally and transmit them to the phisher.
·
Hosts File Poisoning. When
a user types a URL to visit a website it must first be translated into an IP
address before it's transmitted over the Internet. The majority of SMB users'
PCs running a Microsoft windows operating system first look up these "host
names" in their "hosts" file before undertaking a Domain Name
System (DNS) lookup. By "poisoning" the hosts file, hackers have a
bogus address transmitted, taking the user unwittingly to a fake "look
alike" website where their information can be stolen.
·
System Reconfiguration Attacks modify
settings on a user's PC for malicious purposes. For example: URLs in a
favorites file might be modified to direct users to look alike websites. For
example: a bank website URL may be changed from "bankofbeirut.com" to
"bancofbeirut.com" (notice the difference in the bank word)
·
Data Theft. Unsecured
PCs often contain subsets of sensitive information stored elsewhere on secured
servers. Certainly PCs are used to access such servers and can be more easily
compromised. Data theft is a widely used approach to business espionage. By
stealing confidential communications, design documents, legal opinions, and
employee related records, etc., thieves profit from selling to those who may
want to embarrass or cause economic damage or to competitors.
·
DNS-Based Phishing
("Pharming"). Pharming is the term given to hosts file
modification or Domain Name System (DNS)-based phishing. With a pharming
scheme, hackers tamper with a company's hosts files or domain name system so
that requests for URLs or name service return a bogus address and subsequent
communications are directed to a fake site. The result: users are unaware that
the website where they are entering confidential information is controlled by
hackers and is probably not even in the same country as the legitimate website.
·
Content-Injection Phishing describes
the situation where hackers replace part of the content of a legitimate site
with false content designed to mislead or misdirect the user into giving up
their confidential information to the hacker. For example, hackers may insert
malicious code to log user's credentials or an overlay which can secretly
collect information and deliver it to the hacker's phishing server.
·
Man-in-the-Middle Phishing is
harder to detect than many other forms of phishing. In these attacks hackers
position themselves between the user and the legitimate website or system. They
record the information being entered but continue to pass it on so that users'
transactions are not affected. Later they can sell or use the information or
credentials collected when the user is not active on the system.
·
Search Engine Phishing occurs
when phishers create websites with attractive (often too attractive) sounding
offers and have them indexed legitimately with search engines. Users find the
sites in the normal course of searching for products or services and are fooled
into giving up their information. For example, scammers have set up false
banking sites offering lower credit costs or better interest rates than other
banks. Victims who use these sites to save or make more from interest charges
are encouraged to transfer existing accounts and deceived into giving up their
details.
Now how do you protect yourself from this kind of attacks?
Well, here is 7 ways to do it:
1. Be wary of emails asking
for confidential information - especially information
of a financial nature. Legitimate organizations will never request sensitive
information via email, and most banks will tell you that they won't
ask for your information unless you're the one contacting them.
2. Don't get pressured into
providing sensitive information. Phishers like to use scare tactics, and may threaten to disable an account
or delay services until you update certain information. Be sure to contact the
merchant directly to confirm the authenticity of their request.
3. Make sure you familiarize
yourself with a website's privacy policy. The
majority of commercial websites have a privacy policy, which is usually
accessible at the foot of the page. The most useful thing to look for is the
website's policy on whether it will or will not sell its mailing list.
Most of the spam you receive on a daily basis
- as well as potentially dangerous phishing emails - is coming to you because a
site you have signed up to has sold your email address to another company. If
you're not ok with this happening, it might be worth reconsidering whether you
want to sign up to the site.
4. Watch out for generic-looking requests for information.
Fraudulent emails are often not personalized, while authentic emails from your
bank often reference an account you have with them. Many phishing emails begin
with "Dear Sir/Madam", and some come from a bank with which you don't
even have an account.
5. Never submit confidential
information via forms embedded within email
messages. Senders are often able to track all information entered.
6. Never use links in an email
to connect to a website unless you are absolutely sure they are authentic.
Instead, open a new browser window and type the URL directly into
the address bar. Often a phishing website will look identical to the original -
look at the address bar to make sure that this is the case.
7. Make sure you maintain
effective software to combat phishing. numerous internet Security software automatically detects and blocks fake websites. It
also authenticates major banking and shopping sites.
Comments
Post a Comment