0% found this document useful (0 votes)
187 views6 pages

Module 4_Phishing and Identity Theft

Uploaded by

lyricaltube6247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views6 pages

Module 4_Phishing and Identity Theft

Uploaded by

lyricaltube6247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MODULE 4: PHISHING AND IDENTITY THEFT

Phishing and Identity Theft: Introduction, methods of phishing, phishing, phishing


techniques, spear phishing, types of phishing scams, phishing toolkits and spy phishing,
counter measures, Identity Theft
Textbook:1 Chapter 5 (5.1. to 5.3)

Introduction
Phishing is a cybercrime technique where attackers impersonate trustworthy entities to
manipulate individuals into divulging sensitive information. This information often includes
personal data like passwords, bank account details, or credit card numbers. Phishing exploits
human psychology, such as fear, urgency, curiosity, or trust, to deceive victims into complying
with malicious requests.
Phishing is pervasive and is often the first step in large-scale cyberattacks like ransomware
deployment, fraud, or identity theft. As technology advances, phishing tactics have grown
more sophisticated, making it a significant threat to individuals and organizations worldwide.

Methods of Phishing
1. Email Phishing:

o The attacker sends a large number of fraudulent emails designed to look like
they come from legitimate organizations.
o These emails often contain:
 Malicious links redirecting users to fake websites.
 Attachments carrying malware.
o Example: A fake email from "PayPal" warning about suspicious account
activity and asking the user to "verify" their account.
2. Smishing (SMS Phishing):

o Phishing via text messages.


o Attackers exploit the concise nature of SMS to create a sense of urgency.
o Example: A message claiming your bank account has been locked, urging you
to click on a link to resolve the issue.
3. Vishing (Voice Phishing):
o Attackers use phone calls or voice messages to manipulate victims.
o Common tactics:

1
 Pretending to be a bank representative asking for account verification.
 Posing as tech support to gain remote access to devices.
o Example: A call claiming your Social Security number has been compromised,
asking you to provide it for “verification.”
4. Website Spoofing:

o Creating fake websites designed to mimic legitimate ones.


o Victims are lured to these sites via phishing emails, ads, or malicious links.
o Example: A fake Google login page designed to steal Gmail credentials.
5. Social Media Phishing:
o Attackers create fake profiles or pages to deceive victims.

o Common methods:
 Sending direct messages with malicious links.
 Posting fake giveaways or offers that require personal information.
o Example: A fake “customer support” account requesting login credentials to
resolve an issue.

Phishing
Phishing is a broader term encompassing all deceptive techniques used to steal sensitive
information. It is a low-cost, high-reward cyberattack that preys on human error and trust.
Key Characteristics:
 Disguised Communication: Emails, messages, or calls that mimic legitimate entities.
 Urgency and Fear: Messages designed to panic recipients into taking immediate
action.
 Data Theft: The ultimate goal is to steal sensitive data for financial gain or further
cyberattacks.

Phishing Techniques
1. Clone Phishing:
o Attackers copy a legitimate email previously sent to the victim.
o The content is altered to include malicious links or attachments.

2
o Example: A duplicate email from a subscription service with a fake “renewal”
link.
2. Malware-Based Phishing:
o Involves embedding malware in email attachments or website downloads.
o Clicking the link or downloading the attachment compromises the victim’s
device.

o Example: A PDF attachment in an email claiming to contain an invoice, which


installs spyware when opened.

3. Man-in-the-Middle (MitM) Attacks:


o Attackers intercept communication between two parties to steal sensitive
information.
o Common in public Wi-Fi networks where attackers set up rogue access points.
o Example: Intercepting login credentials during a fake bank transaction.
4. Link Manipulation:
o Attackers use deceptive URLs that look similar to legitimate ones.

o Victims are lured to these fake sites to input sensitive data.


o Example: “www.facebo0k.com” instead of “www.facebook.com.”

Spear Phishing
Spear phishing is a highly targeted form of phishing aimed at a specific individual or
organization.

Characteristics:
 Personalized Content: Messages are tailored using details about the victim, such as
their name, job title, or recent activities.
 More Convincing: Due to its personalized nature, spear phishing is harder to detect
than generic phishing.
 High Stakes: Often used to gain access to sensitive corporate data or financial
accounts.
Example:
 An employee receives an email from a spoofed company executive requesting a wire
transfer.

3
Types of Phishing Scams
1. Credential Harvesting:
o Fake login pages are created to steal usernames and passwords.

o Often used for online banking, social media, or email accounts.


2. Payment Fraud:
o Fraudulent invoices or payment requests are sent to individuals or
businesses.
o Example: An email from a “vendor” asking for payment to a new bank
account.
3. Tech Support Scams:
o Attackers pose as technical support representatives.

o They trick victims into providing remote access to their devices or paying for
unnecessary services.

4. Business Email Compromise (BEC):


o Attackers impersonate high-ranking executives to manipulate employees.
o Example: A spoofed email from the CEO requesting a confidential document.
5. Charity Scams:
o Fraudulent appeals for donations during crises or disasters.

o Example: Fake websites claiming to collect funds for earthquake relief.

Phishing Toolkits and Spy Phishing


1. Phishing Toolkits:
o Pre-built software and templates that allow attackers to create phishing
campaigns with minimal effort.
o Features include:

 Website cloning tools.


 Email templates for spoofing.
 Malware embedding.
2. Spy Phishing:
o A more advanced technique involving prolonged observation of the victim.

o Attackers use this information to craft highly personalized attacks over time.

4
Countermeasures
1. User Awareness and Training:

o Regular training on recognizing phishing attempts.


o Examples of training topics include:
 Identifying suspicious URLs.
 Avoiding clicking on unverified links.
2. Multi-Factor Authentication (MFA):

o Requiring additional verification (e.g., OTP, biometrics) beyond passwords.


o Even if credentials are stolen, MFA prevents unauthorized access.
3. Email Filtering and Security:
o Use email security solutions to detect and block phishing emails.
o Implement spam filters and anti-phishing plugins.

4. Secure Websites:
o Verify SSL certificates and ensure websites use HTTPS.
o Avoid interacting with sites that lack these features.
5. Regular Software Updates:
o Keep operating systems, browsers, and antivirus software updated to patch
vulnerabilities.
6. Incident Response Plans:

o Organizations must have predefined protocols to respond to phishing attacks.


o This includes isolating compromised systems and notifying affected
individuals.

Identity Theft
Identity theft occurs when attackers use stolen personal information to impersonate
someone. This can lead to:
1. Financial Fraud:

o Opening credit accounts or loans in the victim’s name.


o Making unauthorized transactions.

5
2. Criminal Impersonation:
o Using stolen identities to commit illegal activities.
o Victims may face legal consequences for crimes they did not commit.

3. Medical Identity Theft:


o Using stolen information to access healthcare services or obtain prescriptions.
Prevention Measures:
 Avoid sharing sensitive information online or over the phone unless absolutely
necessary.
 Regularly monitor financial and credit reports for suspicious activity.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy