Phishing Analysis
Phishing Analysis
Contents
What is Phishing? ......................................................................................................................................... 2
4 Common Ways Attackers Do Phishing .................................................................................................. 2
How Phishing Works: Key Steps ............................................................................................................... 3
Phishing Case Studies ............................................................................................................................... 4
Email Fundamentals: .................................................................................................................................... 5
Phishing Attack Types ................................................................................................................................... 7
Anatomy of URL............................................................................................................................................ 8
Email URL Analysis Tools .............................................................................................................................. 8
Reactive Phishing Defense ........................................................................................................................... 8
Proactive Phishing Defense .......................................................................................................................... 9
What is Phishing?
Phishing is a type of online scam where attackers try to trick people into giving away sensitive
information like passwords, credit card numbers, or personal details. They do this by pretending
to be a trusted person or company, often using fake emails, websites, or messages that look
real.
1. Email Phishing
• Attackers send fake emails that look like they come from legitimate companies (e.g.,
banks, social media, or online stores).
• The email often contains a link to a fake website where the victim is asked to enter
personal information.
• The message might create urgency like "Your account is compromised" to make the
victim act quickly.
2. Spear Phishing
• More targeted and personalized than regular phishing.
• The attacker researches their victim (like a specific person or company) and crafts a
convincing message just for them.
• The message might appear to come from a known colleague, boss, or trusted
partner.
7. Covering Tracks
• After collecting the data, the attacker may take steps to hide their activities, such as
deleting fake websites or masking their identity to avoid detection.
Phishing Case Studies
1. Email Address
2. Email Header
• From: Sender's email address.
• To: Recipient's email address.
• Cc (Carbon Copy): Other recipients who receive a copy of the email.
• Bcc (Blind Carbon Copy): Recipients who receive a copy of the email without others
knowing.
• Subject: Topic or purpose of the email.
• Date: Time when the email was sent.
• Message ID: Unique identifier for the email.
• Reply To: Address where replies should be sent (can be different from the "From"
address).
• Return Path: Address to which email delivery failures are sent.
3. Email Body
• Text Body: The main content of the email can be plain text or HTML.
• Attachments: Files, images, or documents attached to the email.
• Signature: Optional closing text, often with contact details, name, and title.
4. Email Protocols
a. SMTP (Simple Mail Transfer Protocol):
• Used for sending emails from a client to a server or between servers.
• Operates on ports 25, 465, or 587.
• Handles outgoing email traffic.
5. Mail Agents
a. MTA (Mail Transfer Agent):
• Software responsible for sending and receiving emails between servers (e.g., Send
mail, Postfix).
• Routes emails to their destination.
2. URL Manipulation:
• Attackers create misleading or lookalike URLs to deceive users into visiting malicious
websites.
• Tactics include slight changes in domain names, using subdomains, or hidden URLs in
clickable text.
3. Encoding:
• Attackers obscure malicious content using encoding techniques like Base64 to bypass
security filters.
• Encoded malicious payloads (scripts, malware) are often embedded in emails or web
pages.
4. Attachments:
• Malicious files are sent as email attachments, often disguised as legitimate
documents (e.g., invoices, reports).
• When opened, these files execute malware or steal information.
6. Pharming:
• Attackers redirect users to fraudulent websites by tampering with DNS settings or
host files.
• Even when the correct URL is entered, users are sent to fake, malicious sites.
Anatomy of URL
Recovery Communication
• Restore systems • Notify affected users
• Update stakeholders
Proactive Phishing Defense
Email Filtering URL Scanning and Blocking
• Email security appliances • Real Time URL Inspection
• Marking External Emails • Block Recently registered Domains
User Training
• Security awareness training
• Phishing simulation exercises
• Reporting functionality
https://www.linkedin.com/in/adnan-musa-b62879319/