Web Phishing Documentation
Web Phishing Documentation
The first recorded use of the term "phishing" was in the cracking tool-
kit AOHell created by Koceilah Rekouche in 1995, however it is pos-
sible that the term was used before this in a print edition of the hacker
magazine 2600. The word is a leetspeak variant of fishing (ph is a
common replacement for f), probably influenced by phreaking, and al-
ludes to the use of increasingly sophisticated lures to "fish" for users'
sensitive information.
1
The simplified flow of information in a Phishing attack is :
2
countermeasures will center on ways to disrupt steps 1, 2 and 4, as well as
related technologies outside the information flow proper.
3
2. WEBSITE PHISHING TECHNIQUES
4
2.2. FILTER EVASION
Filter evasion is a form of phishing where the phisher uses images to
avoid anti-phishing filters. The idea behind filter evasion is that email clients
have a hard time reading images and are very good at reading plain text. This
is becoming less of a risk as email clients become more sophisticated and
develop anti-phishing filters that use optical character recognition (OCR) in
images.
5
2.3. WEBSITE FORGERY
6
2.3.2. WEBSITE SPOOFING
7
2.4. Pop-ups
8
2.5. PHONE PHISHING
2.5.1 VISHING
9
2.5.2 SMISHING
10
3. WEBSITE PHISHING EXAMPLES
Note that many Phishing emails will include, as a real email from
PayPal would, large warnings about never giving out your password in case
of a Phishing attack. Warning users of the possibility of Phishing attacks, as
well as providing links to sites explaining how to avoid or spot such attacks
are part of what makes the Phishing email so deceptive. In this example, the
Phishing email warns the user that emails from PayPal will never ask for
sensitive information. True to its word, it instead invites the user to follow a
link to "Verify" their account; this will take them to a further Phishing
website, engineered to look like PayPal's website, and will there ask for their
sensitive information.
11
Figure: 3.1 Paypal phishing
12
3.2. RAPID SHARE PHISHING
14
3.3 E-mails PHISHING
15
Figure: 3.3.1 E-mails phishing
16
3.4 Masked Web address PHISHING
17
4. REASONS OF WEBSITE PHISHING
The panic one experience when they receive a message claiming that,
for example, there has been suspicious activity on the recipient’s account
will in many cases cause people to overlook signs that the message is
malicious.
But by that point it’s too late, with the victim already clicking links,
opening attachments and handing over their username and password.
18
4.2. Organisations aren’t doing enough
Staff awareness training isn’t the only step that organisations can take
to better protect themselves from phishing scams.
19
4.3. Criminal organisations are well funded
The massive success that cyber criminals have had in recent years
means they have plenty of funds to invest in scams.
As such, they can invest in technical resources to root out make their
scams run more efficiently – whether that’s in the number of scams they can
send, the authenticity of their bogus messages or the complexity of their
campaigns.
It’s also enabled cyber criminals to branch out into new attack
vectors. For example, there has been a significant increase in social media in
recent years.
20
4.4. Cyber Criminals are shifting their focus
The availability of stolen data on the dark web has decreased its
commercial value.
Scammers can now buy payment card data on the dark web for as
little as $9 (about £6.80), so there’s less profit to be had for those stealing
and selling this information.
21
5.WAYS TO AVOID WEBSITE PHISHING
SCAMS
22
6.EFFECT OF WEBSITE PHISHING
Internet fraud
Identity theft
Financial loss to the original institutions
Difficulties in Law Enforcement Investigations
Erosion of Public Trust in the Internet
23
7. GRAPH OF PHISHING WEBSITES
24
8. ANTI-PHISHING
i. SOCIAL RESPONSES
25
ii. TECHNICAL RESPONSES
26
iii. LEGAL RESPONSES
On January 26, 2004, the U.S. Federal Trade Commission filed the
first lawsuit against a suspected Phisher. The defendant, a Californian
teenager, allegedly created a webpage designed to look like the America
Online website, and used it to steal credit card information. In the United
States, Senator Patrick Leahy introduced the Anti-Phishing Act of 2005.
Companies have also joined the effort to crack down on Phishing.
27
9.DAMAGE CAUSED BY WEBSITE PHISHING
28
10.CONCLUSION
29
11. REFERENCES
https://en.wikipedia.org/wiki/Phishing
https://www.phishing.org/
https://studymafia.org/
https://www2.deloitte.com/us/en.html
30