Techniques Of Phishing
- Get link
- X
- Other Apps
There
are a number of different techniques used to obtain personal
information from users. As technology becomes more advanced, the
cybercriminals' techniques being used are also more advanced.
To prevent Internet phishing, users should
have knowledge of how the bad guys do this and they should also be aware
of anti-phishing techniques to protect themselves from becoming
victims.
Spear Phishing
While traditional phishing uses a 'spray and pray' approach, meaning mass emails are sent to as many people as possible, spear phishing
is a much more targeted attack in which the hacker knows which specific
individual or organization they are after. They do research on the
target in order to make the attack more personalized and increase the
likelihood of the target falling into their trap.
Email/Spam
Using the most common phishing technique, the same email is sent to
millions of users with a request to fill in personal details. These
details will be used by the phishers for their illegal activities. Most
of the messages have an urgent note which requires the user to enter
credentials to update account information, change details, or verify
accounts. Sometimes, they may be asked to fill out a form to access a
new service through a link which is provided in the email.
Web Based Delivery
Web based delivery is one of the most sophisticated phishing
techniques. Also known as “man-in-the-middle,” the hacker is located in
between the original website and the phishing system. The phisher traces
details during a transaction between the legitimate website and the
user. As the user continues to pass information, it is gathered by the
phishers, without the user knowing about it.
Link Manipulation
Link manipulation is the technique in which the phisher sends a link
to a malicious website. When the user clicks on the deceptive link, it
opens up the phisher’s website instead of the website mentioned in the
link. Hovering the mouse over the link to view the actual address stops
users from falling for link manipulation.
Keyloggers
Keyloggers refer to the malware used to identify inputs from the
keyboard. The information is sent to the hackers who will decipher
passwords and other types of information. To prevent key loggers from
accessing personal information, secure websites provide options to use
mouse clicks to make entries through the virtual keyboard.
Trojan
A Trojan horse is a type of malware designed to mislead the user with
an action that looks legitimate, but actually allows unauthorized
access to the user account to collect credentials through the local
machine. The acquired information is then transmitted to cybercriminals.
Malvertising
Malvertising is malicious advertising that contains active scripts
designed to download malware or force unwanted content onto your
computer. Exploits in Adobe PDF and Flash are the most common methods
used in malvertisements.
Session Hijacking
In session hijacking,
the phisher exploits the web session control mechanism to steal
information from the user. In a simple session hacking procedure known
as session sniffing, the phisher can use a sniffer to intercept relevant
information so that he or she can access the Web server illegally.
Content Injection
Content injection is the technique where the phisher changes a part
of the content on the page of a reliable website. This is done to
mislead the user to go to a page outside the legitimate website where
the user is then asked to enter personal information.
Phishing through Search Engines
Some phishing scams involve search engines where the user is directed
to products sites which may offer low cost products or services. When
the user tries to buy the product by entering the credit card details,
it’s collected by the phishing site. There are many fake bank websites
offering credit cards or loans to users at a low rate but they are
actually phishing sites.
Vishing (Voice Phishing)
In phone phishing, the phisher makes phone calls to the user and asks
the user to dial a number. The purpose is to get personal information
of the bank account through the phone. Phone phishing is mostly done
with a fake caller ID.
Smishing (SMS Phishing)
Phishing conducted via Short Message Service (SMS), a telephone-based
text messaging service. A smishing text, for example, attempts to
entice a victim into revealing personal information via a link that
leads to a phishing website.
Malware
Phishing scams involving malware require it to be run on the user’s
computer. The malware is usually attached to the email sent to the user
by the phishers. Once you click on the link, the malware will start
functioning. Sometimes, the malware may also be attached to downloadable
files.
Ransomware
Ransomware denies access to a device or files until a ransom has been paid. Ransomware
for PC's is malware that gets installed on a user’s workstation using a
social engineering attack where the user gets tricked in clicking on a
link, opening an attachment, or clicking on malvertising.- Get link
- X
- Other Apps
Comments
Post a Comment