Phishing-An Analysis On The Types, Causes, Preventive Measuresand Case Studies in The Current Situation
Phishing-An Analysis On The Types, Causes, Preventive Measuresand Case Studies in The Current Situation
net/publication/307593795
CITATION READS
1 2,446
5 authors, including:
Some of the authors of this publication are also working on these related projects:
HCI, face recognition, face detection, emotion recognition, Computer vision, image processing, PCA, cyberspace, cybercrime, network security, phishing View project
All content following this page was uploaded by Ushamary Sharma on 03 September 2016.
Abstract: Phishing is a scam that has evolved many years ago and it has been growing ever since. In this study
we have collected much information regarding its new and improvised way of scamming the users without their
knowledge and concern. Some case studies are also included based on real life events. According to the report
received from Home Depot Company, the United States and Canada had encountered a loss of $62 million
where only $27million was covered by the insurance company but the rest is yet to be recovered. Our main aim
is to let the users be informed of all the malicious crime created by the attackers. We have also listed out some
of the preventive measures that a user should follow in order to prevent such crimes. Knowingly or unknowingly
theusers are trapped by using this kind of attacks and the hackers always succeed to outsmart them by using
new and different scams. This paper is an attempt to bring an awareness on the phishing types, causes and
various preventive measures that can change the way how people reason about the hackers and their perception
towards them.
Keywords: Phishing, Spoofing, Pharming, Spamming, Scams, Crook.
I. INTRODUCTION
The word “phishing” originally came from the analogy of early internet criminals using lures to “fish”
for passwords and financial data from a large sea of unsuspecting internet users. The use of the “ph” in this
terminology has been forgotten about over time. It was most likely linked to hacker naming conventions such as
“phreaks”. [1]
Phishing refers to the process where a targeted individual is contacted by email or telephone by
someone posing as a legitimate institution to lure the individual into providing sensitive information such as
banking information, credit card details and passwords. The personal information is then used to access the
individual’s account and can result in identity theft and financial loss.[2] Phishing is the act of sending
email that falsely claims to be from a legitimate organization. It is usually combined with a threat or request for
information like that an account will close, a balance is due, or information is missing from an account. The
email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords;
these details are then used by the owners of the website to conduct fraud. It can also be defined as an act of
circumventing or entrap security with an alias[2]
[4]Phishing has even become like a business as the phishers earn millions of dollars by stealing from
the victims and there are many groups of this abhorrence scam and mostly in Eastern Europe, Asia, Africa and
the Middle East.
National Conference on Advances in Engineering, Technology & Management 1 | Page
(AETM’15)”
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727,
PP 01-08
www.iosrjournals.org
Example:
o [1]Action=https://www.facebook.com/login.php? Login_attempt=1
Then the attacker create an account on free hosting website like [5]
o ***http://www.ttt.com
Then the attacker uploaded the php file and html page with his name then the phishing website is
created.[5]
The attacker can now start phishing.
[6]DNS-Based Phishing ("Pharming") - Domain name system also known as pharming is the kind of
attack where users can identify websites with human readable names (e.gwww.gmail.com) and the system
will take them as IP addresses. This DNS will uphold the mapping which includes the domain names and
the IP addresses which can be traced everywhere.
[6]Content-Injection Phishing- This is another form of phishing will insert harmful contents to a genuine
site or network in which it will redirect the user to another fraud site or it can install a malware content
which will direct the users to the attacker website.
[6]Man-in-the-Middle Phishing- This is the type of phishing that is very hard to detect. In this case the
attacker is between the user and the website and when the user is doing any transaction online that is when
they take over and copy all the information and credentials of the user but they still provide the users with
all the steps needed to be go through by the user so that they would not get suspicious and they will use the
information later usually it is link with credit cards details, bank account details, etc..
[6]Search Engine Phishing- Nowadays everything can be done online whether shopping, booking
travelling tickets, advertising, etc. So e-commerce also takes place in the malicious tricks of the attackers
they create these fake websites of different banks and giving attractive offers and when the users tried to
take the offers displayed on the screen they have to fill all their personal information without knowing that
they are actually being framed by the attackers.
d. Update your system with the newest promising security software like anti-virus, anti-spyware, firewall,
spam filters, etc.[9]
e. Pop-up messages are not to be acknowledged as they are mostly like the fishing rod of the fraudsters. Once
you are hooked, there is no looking back.[9]
a. Valid Phishes: It is defined as the number of total submissions verified by the phish tank community. The
phish tank community states that around 26,966 phishes are declared as valid phishes.
b. Invalid Phishes:It is defined as the number of total submissions verified by the phish tank community as well.
The phish tank community states that around 648 phishes are declared as invalid phishes.
Many phishing emails were offline at the time of submission to Phish Tank. Offline phishes cannot be
voted on, and therefore cannot be verified.[11]The Phish Tank community also prepared a questionnaire in order to get
the total number of votes whether "is a phish," "is not a phish," and "I don't know" , is the question and the number of votes
altogether made by the Phish Tank Community is 177,367. In order to verify this statistics the Phish Tank Community also at the
same time calculates the time slot taken by the user’s to answer the question which is known as the Median Time. The amount of
time taken is 09 hours, 48 minutes.This results that the median time is the time taken by the Phish Tank community to
verify submissions as valid or invalid.[11]Out of the more than 20,000 members of the Phish Tank community,
these members were the most active participants in November 2013.
According to the author in paper[3] the number of phishing sites out of 50 correctly and incorrectly identified by
anti-phish toolbars is listed in the table below:
The table below is the result of the number of phishing sites correctly identified and legitimate sites falsely
identified as phishing sites by anti-phishing toolbars according to paper[3].
Table 4: Number of phishing sites initially identified incorrectly that were later identified correctly by ant-
phishing toolbars.
Time since phishing site URLs were extracted
1 hour 2 hours 12 hours 24 hours
Cloudmark 0 1 0 0
EarthLink 0 0 0 0
eBay 0 0 0 0
IE7 0 1 0 0
Google 0 1 4 5
McAfee 0 0 0 0
Netcraft 0 1 0 4
Netscape 2 0 0 7
SpoofGuard 0 0 0 0
TrustWatch 0 0 0 0
Active URLs 100 98 93 70
According to the authors in paper [16] they have made their study on the efficiency and usefulness of
using phishing toolbars and blacklisting, in which the author in Nov 2006 used 10,000 phishing URLs from
Phish tank to examine the efficiency of the black-lists maintained by Google and Microsoft. They found that
Google blacklist enclosed more than 90% of the live phishing URLs, while Internet Explorer enclosed only 67%
of them.In this study the author tested the efficiency of 10 popular anti-phishing tools in November 2006, where
the data are generated in the table below.
Table 5: The top 10 brands that appear in our data set. Total phish: 191
The authors concluded that blacklist-based solutions are quite efficient in protecting users against
phishing attempts.
Another important study made by the same authors [16] on Length of a Phishing Campaign (LPC)
defines as the time lapse between the first time a phish appeared in their source report and the last time that
phish appeared in their source report. In which these reports was received by them from their source every
4minutes.
In the above study they have made out of 191 phish which were used to test phishing blacklists, 127
of them, 66%, had an LPC less than 24 hours, indicating that their corresponding phishing campaign lasted less
than 24 hours. A total of 25 URLs had an LPC between 24 and 48 hours, and the remaining URLs had an LPC
between 3 and 23 days. Examining the first day's data more closely, they found that 109 URLs were spammed
only in a two-hour period, accounting for 63% of the URLs in this dataset.
Website takedown rate at each hour is measured by the number of phish taken down at that hour
divided by total phishing users initially, as most of them caught less than 20% of phish at hour zero. They also
found that blacklists were updated at different speeds, and varied in coverage, as 47% to 83% of phish appeared
on blacklists 12 hours from the initial test in October.
At any given hour, they define the coverage of the blacklist as:No: of phish appearing on blacklist
They have found that the coverage rates of some of the blacklists were highly correlated, where Firefox
2, 3 and Google Chrome appear to use the same blacklists. Internet Explorer 7 and 8 also share a blacklist. In
their analysis, they have combined the results for those tools that use the same blacklists.In their October test,
they enclosed that all of the blacklists contained less than 20% of the phish initially. New phish appeared on the
blacklists every hour, suggesting that the blacklists were updated at least once every hour.
A. Case 2
[14]Reserve Bank of India under attack!!! This information appears to be true when the attackers have
the nerves to create a fake website which is a clone of the RBI website in which they send e-mails to the
users informing them regarding the prize money of Rs.10lakhs that they had won which will definitely
caught the attention of the users and giving them a link of the look-alike site enquiring the users with their
personal details like passwords, I-pin number and savings number. In spite of this the RBI has warned its
users concerning the counterfeit scam of the bank’s original website.
B. Case 3
[15]In Nov 8th2014, Home Depot a home-improvement chain company said 53 million e-mail addresses are
being violated due to the attack caused by the hackers whereby 56 million payment cards were disclosed.
The hackers somehow manage to utilize a third party vendor’s username and password and gain the
company’s rights to traverse the systems. It uses a custom-built software of the company’s self checkout
terminals to retrieve customers data especially in the United States and Canada which causes the company
the loss of $62 million to recover in which the amount of $27 million will be covered by insurance. It was
reported that the malicious software used by the hackers was designed in such a way that it can escape the
detection of the anti-virus software of the company’s systems.
XII. CONCLUSION
In conclusion to this study about phishing we have seen some interesting facts about how far an
attacker would go in order to fulfill his desirable needs. We have also witness a huge loss of money globally
which results to under-achieving productive goals and development of the society. But the most dreadful loss
are the common users who are the victims of phishing for without their knowledge their personal information
are being used against them for some kind of fraudulent acts, or even their bank accounts are being robbed
without their concern. In spite of this now the organizations are taking an initiative move of spreading an
awareness statement to be more cautious and precise regarding the fake information (like winning lottery of
undeniable prize, reservation of hotels at a cheap rate, travel agencies offering less expense, etc..) which alerts
the users from getting phished.
REFERENCES
[1] http://www.theemailadmin.com/2009/02/history-of phishing/
[2] http://www.phishing.org/what-is-phishing/
[3] Lorrie Cranor, Serge Egelman, Jason Hong, Yue Zhang, “Phinding Phish: An Evaluation of Anti-
Phishing Toolbars,”Carnegie Mellon University, November 13th2006, CMU-CyLab-06-018,P:1-3.
[4] Anthony Elledge, “Phishing: An Analysis of a Growing Threat,” GIAC Security Essentials
Certification(GSEC) Practical. Version 1.4b, January 2007, P:3.
[5] http://www.facebook.com
[6] http://www.innovateus.net/science/what-are-different-types-phishing-attacks
[7] NeerajAarora,“Phishing Scams in India and Legal Provisions, Cyber forensics, cyber lawyer, cyber
offenses / contravention, information technology act, other laws,” March 14, 2011, 2.
[8] RachnaDhamija, J.D. Tygar, “The Battle Against Phishing:Dynamic Security Skins,”University of
California, Berkeley.In SOUPS 2005: Proceedings of the 2005 ACM Symposium o usable security and
privacy, ACM International Conference Proceedings Series, ACM Press, July 2005,P:1.
[9] http://blogs.wit.edu/security/new-phishing-statistics
[10] http://thevarguy.com/business-technology-solution-sales/022215/kaspersky-nearly-30-percent-phishing-
attacks-target-financial-inf
[11] http://www.phishtank.com/stats/2013/01
[12] http://www.symantec.com/security_response/publications/threatreport.jsp
[13] file:///E:/phishing/APWG_GlobalPhishingSurvey_2H2013.pdf
[14] AtulKahate, “Cryptography and Networking Security,” Second Edition, Tata McGraw Hill,2008.
[15] http://www.eweek.com/security/home-depot-breach-expands-privilege-escalation-flaw-to-blame.html.
[16] Steve Sheng, Brad Wardman, Gary Warner, Lorrie Faith Cranor, Jason Hong, Chengshan Zhang, “An
Empirical Analysis of Phishing Blacklists,” Carnegie Mellon University Engineering and Public Policy
Pittsburgh, PA 15213, University of Alabama Computer Science Birmingham, Alabama 35294, P:3-5.