Module 4_Phishing and Identity Theft
Module 4_Phishing and Identity Theft
Introduction
Phishing is a cybercrime technique where attackers impersonate trustworthy entities to
manipulate individuals into divulging sensitive information. This information often includes
personal data like passwords, bank account details, or credit card numbers. Phishing exploits
human psychology, such as fear, urgency, curiosity, or trust, to deceive victims into complying
with malicious requests.
Phishing is pervasive and is often the first step in large-scale cyberattacks like ransomware
deployment, fraud, or identity theft. As technology advances, phishing tactics have grown
more sophisticated, making it a significant threat to individuals and organizations worldwide.
Methods of Phishing
1. Email Phishing:
o The attacker sends a large number of fraudulent emails designed to look like
they come from legitimate organizations.
o These emails often contain:
Malicious links redirecting users to fake websites.
Attachments carrying malware.
o Example: A fake email from "PayPal" warning about suspicious account
activity and asking the user to "verify" their account.
2. Smishing (SMS Phishing):
1
Pretending to be a bank representative asking for account verification.
Posing as tech support to gain remote access to devices.
o Example: A call claiming your Social Security number has been compromised,
asking you to provide it for “verification.”
4. Website Spoofing:
o Common methods:
Sending direct messages with malicious links.
Posting fake giveaways or offers that require personal information.
o Example: A fake “customer support” account requesting login credentials to
resolve an issue.
Phishing
Phishing is a broader term encompassing all deceptive techniques used to steal sensitive
information. It is a low-cost, high-reward cyberattack that preys on human error and trust.
Key Characteristics:
Disguised Communication: Emails, messages, or calls that mimic legitimate entities.
Urgency and Fear: Messages designed to panic recipients into taking immediate
action.
Data Theft: The ultimate goal is to steal sensitive data for financial gain or further
cyberattacks.
Phishing Techniques
1. Clone Phishing:
o Attackers copy a legitimate email previously sent to the victim.
o The content is altered to include malicious links or attachments.
2
o Example: A duplicate email from a subscription service with a fake “renewal”
link.
2. Malware-Based Phishing:
o Involves embedding malware in email attachments or website downloads.
o Clicking the link or downloading the attachment compromises the victim’s
device.
Spear Phishing
Spear phishing is a highly targeted form of phishing aimed at a specific individual or
organization.
Characteristics:
Personalized Content: Messages are tailored using details about the victim, such as
their name, job title, or recent activities.
More Convincing: Due to its personalized nature, spear phishing is harder to detect
than generic phishing.
High Stakes: Often used to gain access to sensitive corporate data or financial
accounts.
Example:
An employee receives an email from a spoofed company executive requesting a wire
transfer.
3
Types of Phishing Scams
1. Credential Harvesting:
o Fake login pages are created to steal usernames and passwords.
o They trick victims into providing remote access to their devices or paying for
unnecessary services.
o Attackers use this information to craft highly personalized attacks over time.
4
Countermeasures
1. User Awareness and Training:
4. Secure Websites:
o Verify SSL certificates and ensure websites use HTTPS.
o Avoid interacting with sites that lack these features.
5. Regular Software Updates:
o Keep operating systems, browsers, and antivirus software updated to patch
vulnerabilities.
6. Incident Response Plans:
Identity Theft
Identity theft occurs when attackers use stolen personal information to impersonate
someone. This can lead to:
1. Financial Fraud:
5
2. Criminal Impersonation:
o Using stolen identities to commit illegal activities.
o Victims may face legal consequences for crimes they did not commit.