RESEARCH ON PHISHING Emmanuel Project
RESEARCH ON PHISHING Emmanuel Project
BY
ONYEJI CHIBUIKE EMMANUEL
OC/2022/PC423
SEPTEMBER 2022
DEDICATION
I dedicate this project to God almighty who gave me the strength
and ability to make this project a wonderful and successful one.
Also, to Mr and Mrs. James Ojene for their endeavor in teaching and
also for their caring and discipline to ensuring that we are focused
to know all that we are meant to know. They more than teachers but
parents to me all through my stay in this wonderful institute am so
grateful Sir may God continue to bless you and grant you your
generous heart desires.
To our outstanding teachers in the persons of Bro Michael and Mr
Gideon, they both have been one of the best tutors and outstanding
mentors to me in this very great institute. I must confess that your
teachings are very wonderful and easy to grab in the skull. Thank
you so much sirs, you have been a blessing to me in this very
wonderful institute.
To my awesome course mates for making the class and lectures fun,
and interactive and also being friendly to me all through my stay in
this lovely institute. Thank you all so much.
May God continue to bless you all in all your endeavours.
ACKNOWLEDGEMENT
CHAPTER ONE
Introduction ……………………………………………………………………1
Definition of phishing..…………………………………………………………2
Types of phishing………………………………………………………………3
CHAPTER TWO
How to prevent phishing…………………………4
How those phishing works……………………….……5
CHAPTER THREE
History of phishing ………..……………………….19
examples of phishing ………………………..………………………22
CHAPTER FOUR
Advantages of phishing ………………………………………………………..25
Disadvantages of phishing ……………………………………………………26
CHAPTER FIVE
Conclusion ………………………………………………………………………27
Brief summary on phishing …………………………………………………………….28
References ………………………………………………………………………29
INTRODUCTION TO PHISHING
1. Email phishing
2. Spear phishing
3. Whaling (CEO fraud)
4. Link manipulation
5. Content injection
6. Malware
7. Smishing
8. Vishing
Email: the general term given to any malicious email message meant to trick
users into divulging private information. Attackers generally aim to steal account
credentials, personally identifiable information (PII) and corporate trade secrets.
However, attackers targeting a specific business might have other motives.
Spear phishing: these email messages are sent to specific people within an
organization, usually high-privilege account holders, to trick them into divulging
sensitive data, sending the attacker money or downloading malware.
Link manipulation: messages contain a link to a malicious site that looks like
the official business but takes recipients to an attacker-controlled server where they
are persuaded to authenticate into a spoofed login page that sends credentials to an
attacker.
Content injection: an attacker who can inject malicious content into an official
site will trick users into accessing the site to show them a malicious popup or
redirect them to a phishing website.
Smishing: using SMS messages, attackers trick users into accessing malicious
sites from their smartphones. Attackers send a text message to a targeted victim
with a malicious link that promises discounts, rewards or free prizes.
1. Train users to detect a phishing email: a sense of urgency and requests for
personal data, including passwords, embedded links and attachments, are all
warning signs. Users must be able to identify these warning signs to defend
against phishing.
2. Avoid clicking links: instead of clicking a link and authenticating into a
web page directly from an embedded link, type the official domain into a
browser and authenticate directly from the manually typed site.
3. Use anti-phishing email security: artificial intelligence scans incoming
messages, detects suspicious messages and quarantines them without
allowing phishing messages to reach the recipient’s inbox.
4. Change passwords regularly: users should be forced to change their
passwords every 30-45 days to reduce an attacker’s window of opportunity.
Leaving passwords active for too long gives an attacker indefinite access to
a compromised account.
HOW PHISHING WORKS
An attacker’s goals vary, but usually, the aim is to steal personal information or
credentials. An attack is facilitated by communicating a sense of urgency in the
message, which could threaten account suspension, money loss or loss of the
targeted user’s job. Users tricked into an attacker’s demands don’t take the time to
stop and think if demands seem reasonable. Only later do they recognize the
warning signs and unreasonable demands.
HISTORY OF PHISHING
The term “phishing” came about in the mid-1990s when hackers began using
fraudulent emails to “fish for” information from unsuspecting users. Since these
early hackers were often referred to as “phreaks,” the term became known as
“phishing,” with a “ph.” Phishing emails lure people in and get them to take the
bait. And, once they’re hooked, both user and organization are in trouble.
Like many common threats, the history of phishing starts in the 1990s. When AOL
was a popular content system with internet access, attackers used phishing and
instant messaging to masquerade as AOL employees to trick users into divulging
their credentials to hijack accounts.
In the 2000s, attackers turned to bank accounts. Phishing emails were used to trick
users into divulging their bank account credentials. The emails contained a link to
a malicious site that mirrored the official banking site, but the domain was a slight
variation of the official domain name (e.g., paypai.com instead of paypal.com).
Later, attackers pursued other accounts such as eBay and Google to hijack
credentials, steal money, commit fraud or spam other users.
Example of phishing
Attackers prey on fear and a sense of urgency. It’s common for attackers to tell
users that their account is restricted or will be suspended if they don’t respond to
the email. Fear makes targeted users ignore common warning signs and forget their
phishing education. Even administrators and security experts fall for phishing
occasionally.
Attackers register domains that look similar to the official one or occasionally use
generic providers such as Gmail. Spoofed senders are possible with email
protocols, but most recipient servers use email security that detects spoofed email
headers. When users receive emails, the messages might use the official company
logo, but the sender address would not include the official company domain. The
sender address is not the only factor that determines message legitimacy.
How an attacker carries out a phishing campaign depends on their goals. For
businesses, attackers may use fake invoices to trick the accounts payable
department into sending money. In this attack, the sender is not important. Many
vendors use personal email accounts to do business.
The button in this example opens a web page with a fraudulent Google
authentication form. The page attempts to scam targeted victims into entering their
Google credentials so that attackers can steal accounts.
Another method attackers use is to pretend they are internal technical support. The
technical support email asks users to install a messaging system, an application
with hidden malware or run a script that will download ransomware. Users should
be on the lookout for these types of emails and report them to administrators.
ADVANTAGES OF PHISHING
Disadvantages
in the report. While in the beginning I have tried to give general view about
My efforts and wholehearted co-operation of each and every one has ended
Brief Summary
The Comparison of techniques has shown that Machine Learning techniques are
most promising, but it also has the disadvantages of greater computational cost.
New techniques can be developed for having low false positives by combining
https://www.proofpoint.com/us/threat-reference/phishinghttps:
www.ijert.org/research/comparison-of-phishing-detection-techniques-IJERTV3IS030830.pdf