SlideShare a Scribd company logo
2
Most read
16
Most read
19
Most read
PHISHING
BY:- Sagar Rai P
I MSc Computer Science
PHISHING BASICS
•The word has its origin from two words “Password Harwesting”
or fishing for Passwords.
•Phishing is the attempt to obtain sensitive information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money), often for malicious reasons, by masquerading
as a trustworthy entity in an electronic communication.
•Also known as “brand spoofing”
•Phishers are phishing artists.
•Phishing techniques was described
in detail in the year 1987 and this
Technique was first used in the year
1995
Phishing Definition
•Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money), often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication.
•It tries to trick users with official looking messages
•Credit card
•Bank account
•eBay
•PayPal
•Some phishing emails also contain malicious or
unwanted software that can track your activities or
slow your computer.
Comparison To Spam
•The purpose of a phishing message is to acquire
sensitive information about a user. For doing so the
message needs to deceive the intended recipient.
•So it doesn’t contains any useful information
and hence falls under the category of spam.
•A spam message tries to sell a product or service,
whereas phishing message needs to look like it is from a
legitimate organization.
•Techniques applied to spam message can’t be applied
naively to phishing messages.
Existing System
•Detect and block the phishing websites in
time.
•Enhance the security of the websites
•Block the phishing emails by various spam
filters.
•Install online anti-phishing software in user’s
computers.
Top 10 Phishing Sites Hosting Countries
How Phishing Attack
•Hacker embeds fake login form to XSS vulnerable page.
It might be online shop, internet banking, payment
system, etc
•Hacker sends Email with the link to this transformed
page(actually link contains HTML injection code as a
parameter). This email looks pretty similar to emails
typically sent from this website to registered users(only
without user name in greeting)
•User clicks the link and opens fake web-page. If user
enters his username and password to login , all of their
account details will be sent to hackers web-server.
•User may not notice anything strange because real
“home” or “Welcome” pages are what he was expecting
to see.
How Phishing Attack
Damages Caused By Phishing
•The damage caused by phishing ranges from loss of access to
email to substantial financial loss. This style of identity theft is
becoming more popular, because of the ease with which
unsuspecting people often divulge personal information to
phishers, including credit card numbers, social security numbers,
and mothers maiden names. There are also fears that identity
thieves can obtain some such information simply by accessing
public records. Once they have the information they need and
want, the phishers will use that person’s details to create fake
accounts using the victims name, using up a persons credit. Or
even prevent the victim from accessing to their own accounts.
How To Detect Phishing Website?
How Does a Phishing Email
Message look like?!!
•Spelling and bad grammar. Cybercriminals are not known
for their grammar and spelling.
•Beware of links in email. If you see a link in a suspicious
email message, don’t click on it.
•Threats. Have ever received a threat that your Hotmail
account would be closed if you didn’t respond to an email
message? The email message shown in the next slide is an
example of the same trick.
•Spoofing popular websites or companies, scam artist use
graphics in an email that appear to be connected to
legitimate websites but actually take you to phony scam
sites or legitimate-looking pop-up windows.
How does a Phishing Email message look like
Example for Phishing Website
Functions.
Prevention to be taken to avoid
Phishing
•Prevention: What to do
•Protect your computer with anti-virus software,
spyware filters, e-mail filters, and firewall programs,
and make sure that they are regularly updated.
•Ensure that your Internet browser is up to date and
security patches applied.
•Avoid responding any unknown email or giving your
financial information to that email.
•Unless the email is digitally signed, it should also be
fake.
•Phishers typically ask for information such as
usernames, passwords, credit card numbers, social
security numbers, etc.
Prevention to be taken to avoid Phishing
•Phishers typically are typically not personalized, while valid
message from your bank or e-commerce company are generally
personalized.
•Always ensure that you’re using a secure website when
submitting credit card or other sensitive information via your
Web Browser.
•To make sure you’re on a secure Web server, check the
beginning of the Web address bar –it should be “https:// “rather
just ” http://”.
•Regularly log into your online accounts. Don’t leave them for a
long period of time.
•Regularly check your bank, credit and debit card statements to
ensure that all transaction are legitimate.
•If anything is suspicious, contact your bank and all card issuers.
Prevention: What not to do
•Don’t assume that you can correctly identify a
website as legitimate by just looking at it.
•Don’t use the links in an email to get to any web
page, if you think that the message might not be
authentic.
•Log onto the website directly by typing in the web
address in your browser.
•Avoid filling out forms in email messages that ask for
personal financial information.
•You should only communicate information such as
credit card numbers or account information via a
secure website or the telephone.
Conclusion
•Phishing is identity theft. It is fraud. It masquerades as
legitimate and trustworthy entities in order to obtain sensitive
data. It then uses it to “rip off” the misled user with often tragic
consequences.
•Phishing is a form of criminal conduct that poses increasing
threats to consumers, financial institution and commercial
enterprises in Canada, united States, and other countries.
Because phishing shows no sign of abating, and indeed is likely
to continue in newer and more sophisticated forms, law
enforcement, other countries will need to cooperate more
closely than ever in their efforts to combat phishing, through
improved public education, prevention, authentication, and
binational and national enforcement efforts.
Source Of Information
•www.wikipedia.org
•www.antiphishing.org
•www.google.com
•www.webopedia.com
•www.computerworld.com
•www.honeynet.org
Phishing

More Related Content

PPTX
Phishing ppt
PPTX
Phishing attack seminar presentation
PPTX
PPT on Phishing
PPT
Phishing
PDF
E-Business Models
PPTX
Phishing ppt
PPTX
PPTX
Hyphenet Security Awareness Training
Phishing ppt
Phishing attack seminar presentation
PPT on Phishing
Phishing
E-Business Models
Phishing ppt
Hyphenet Security Awareness Training

What's hot (20)

PPTX
PPTX
Phishing attack
PPTX
What is Phishing and How can you Avoid it?
PPTX
Different Types of Phishing Attacks
PPTX
Email phishing and countermeasures
PDF
Cyber Security Awareness
PPT
Phishing attacks ppt
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPTX
Social engineering
PDF
Social engineering
PPTX
Social Media Cyber Security Awareness Briefing
PPTX
Social engineering
PPTX
PHISHING attack
PPTX
Phishing Presentation
PPT
P H I S H I N G
PPTX
Cyber crime.pptx
PPTX
Phishing Attack : A big Threat
PDF
Social engineering attacks
PPTX
Cyber Security 03
PPTX
Social engineering-Attack of the Human Behavior
Phishing attack
What is Phishing and How can you Avoid it?
Different Types of Phishing Attacks
Email phishing and countermeasures
Cyber Security Awareness
Phishing attacks ppt
Phishing Scams: 8 Helpful Tips to Keep You Safe
Social engineering
Social engineering
Social Media Cyber Security Awareness Briefing
Social engineering
PHISHING attack
Phishing Presentation
P H I S H I N G
Cyber crime.pptx
Phishing Attack : A big Threat
Social engineering attacks
Cyber Security 03
Social engineering-Attack of the Human Behavior
Ad

Viewers also liked (20)

PPTX
A presentation on Phishing
PPTX
PHISHING PROJECT REPORT
PPT
Phishing
PPTX
Phishing ppt
PPTX
Phishing
PPT
Phishing
PPT
Strategies to handle Phishing attacks
PDF
Phishing
PPT
Phishing
PPTX
Phishing technology
PDF
Phishing exposed
PPTX
Primera guerra mundial
PDF
Macchine intelligenti che imparano da sole
PDF
Saiyed_Crypto_Article_ISSA
PPT
BSidesDC 2016 Beyond Automated Testing
PPS
RESUMO - GEOMARKETING - Estudo de Caso
PPT
Intro phishing
PPTX
Machine Learning + Analytics in Splunk
PPT
PPTX
Phishing
A presentation on Phishing
PHISHING PROJECT REPORT
Phishing
Phishing ppt
Phishing
Phishing
Strategies to handle Phishing attacks
Phishing
Phishing
Phishing technology
Phishing exposed
Primera guerra mundial
Macchine intelligenti che imparano da sole
Saiyed_Crypto_Article_ISSA
BSidesDC 2016 Beyond Automated Testing
RESUMO - GEOMARKETING - Estudo de Caso
Intro phishing
Machine Learning + Analytics in Splunk
Phishing
Ad

Similar to Phishing (20)

PPT
Ict Phishing (Present)
PPTX
phishing technique.pptx
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PPTX
Internet Fraud #scichallenge2017
PPTX
Chapter-5.pptx
PPTX
Spam & Phishing
PPTX
Information security training Phishing
PPTX
Phishing
PPT
Recognize Phishing Scams and Fraudulent E-mails
PPT
IntroPhishing.ppt.dengab menggunakan bahasa Inggris
PPTX
IS Presetation.pptx
PDF
Understanding Phishing E-Mail Scams
PPT
How to Prevent ID Theft
PPTX
Phishing
PPT
Introduction to phishing
PPTX
Cyber Crime & Precautions
PDF
PhishingandPharming
PPTX
Day 2
Ict Phishing (Present)
phishing technique.pptx
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Internet Fraud #scichallenge2017
Chapter-5.pptx
Spam & Phishing
Information security training Phishing
Phishing
Recognize Phishing Scams and Fraudulent E-mails
IntroPhishing.ppt.dengab menggunakan bahasa Inggris
IS Presetation.pptx
Understanding Phishing E-Mail Scams
How to Prevent ID Theft
Phishing
Introduction to phishing
Cyber Crime & Precautions
PhishingandPharming
Day 2

Recently uploaded (20)

PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
innovation process that make everything different.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
522797556-Unit-2-Temperature-measurement-1-1.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
RPKI Status Update, presented by Makito Lay at IDNOG 10
Slides PDF The World Game (s) Eco Economic Epochs.pdf
SAP Ariba Sourcing PPT for learning material
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
presentation_pfe-universite-molay-seltan.pptx
Sims 4 Historia para lo sims 4 para jugar
WebRTC in SignalWire - troubleshooting media negotiation
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introduction to Information and Communication Technology
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Cloud-Scale Log Monitoring _ Datadog.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SASE Traffic Flow - ZTNA Connector-1.pdf
Introuction about WHO-FIC in ICD-10.pptx
innovation process that make everything different.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline

Phishing

  • 1. PHISHING BY:- Sagar Rai P I MSc Computer Science
  • 2. PHISHING BASICS •The word has its origin from two words “Password Harwesting” or fishing for Passwords. •Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. •Also known as “brand spoofing” •Phishers are phishing artists. •Phishing techniques was described in detail in the year 1987 and this Technique was first used in the year 1995
  • 3. Phishing Definition •Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. •It tries to trick users with official looking messages •Credit card •Bank account •eBay •PayPal •Some phishing emails also contain malicious or unwanted software that can track your activities or slow your computer.
  • 4. Comparison To Spam •The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. •So it doesn’t contains any useful information and hence falls under the category of spam. •A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. •Techniques applied to spam message can’t be applied naively to phishing messages.
  • 5. Existing System •Detect and block the phishing websites in time. •Enhance the security of the websites •Block the phishing emails by various spam filters. •Install online anti-phishing software in user’s computers.
  • 6. Top 10 Phishing Sites Hosting Countries
  • 7. How Phishing Attack •Hacker embeds fake login form to XSS vulnerable page. It might be online shop, internet banking, payment system, etc •Hacker sends Email with the link to this transformed page(actually link contains HTML injection code as a parameter). This email looks pretty similar to emails typically sent from this website to registered users(only without user name in greeting) •User clicks the link and opens fake web-page. If user enters his username and password to login , all of their account details will be sent to hackers web-server. •User may not notice anything strange because real “home” or “Welcome” pages are what he was expecting to see.
  • 9. Damages Caused By Phishing •The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit card numbers, social security numbers, and mothers maiden names. There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s details to create fake accounts using the victims name, using up a persons credit. Or even prevent the victim from accessing to their own accounts.
  • 10. How To Detect Phishing Website?
  • 11. How Does a Phishing Email Message look like?!! •Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. •Beware of links in email. If you see a link in a suspicious email message, don’t click on it. •Threats. Have ever received a threat that your Hotmail account would be closed if you didn’t respond to an email message? The email message shown in the next slide is an example of the same trick. •Spoofing popular websites or companies, scam artist use graphics in an email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
  • 12. How does a Phishing Email message look like
  • 15. Prevention to be taken to avoid Phishing •Prevention: What to do •Protect your computer with anti-virus software, spyware filters, e-mail filters, and firewall programs, and make sure that they are regularly updated. •Ensure that your Internet browser is up to date and security patches applied. •Avoid responding any unknown email or giving your financial information to that email. •Unless the email is digitally signed, it should also be fake. •Phishers typically ask for information such as usernames, passwords, credit card numbers, social security numbers, etc.
  • 16. Prevention to be taken to avoid Phishing •Phishers typically are typically not personalized, while valid message from your bank or e-commerce company are generally personalized. •Always ensure that you’re using a secure website when submitting credit card or other sensitive information via your Web Browser. •To make sure you’re on a secure Web server, check the beginning of the Web address bar –it should be “https:// “rather just ” http://”. •Regularly log into your online accounts. Don’t leave them for a long period of time. •Regularly check your bank, credit and debit card statements to ensure that all transaction are legitimate. •If anything is suspicious, contact your bank and all card issuers.
  • 17. Prevention: What not to do •Don’t assume that you can correctly identify a website as legitimate by just looking at it. •Don’t use the links in an email to get to any web page, if you think that the message might not be authentic. •Log onto the website directly by typing in the web address in your browser. •Avoid filling out forms in email messages that ask for personal financial information. •You should only communicate information such as credit card numbers or account information via a secure website or the telephone.
  • 18. Conclusion •Phishing is identity theft. It is fraud. It masquerades as legitimate and trustworthy entities in order to obtain sensitive data. It then uses it to “rip off” the misled user with often tragic consequences. •Phishing is a form of criminal conduct that poses increasing threats to consumers, financial institution and commercial enterprises in Canada, united States, and other countries. Because phishing shows no sign of abating, and indeed is likely to continue in newer and more sophisticated forms, law enforcement, other countries will need to cooperate more closely than ever in their efforts to combat phishing, through improved public education, prevention, authentication, and binational and national enforcement efforts.