SlideShare une entreprise Scribd logo
1  sur  14
Anatomy of a Phishing Email
Spamming for money
2


    phish·ing/ˈfi shiŋ/
                -
    noun:
    The fraudulent practice of
    sending emails purporting to
    be from legitimate companies
    in order to induce individuals
    to reveal personal information




                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
3   An inbox hand grenade
    This is what a phishing email can look like if your email client is
    set to display text only.

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
4   Looks can be deceiving
    And here it is loaded in rich-text or HTML. Odds are your email is set
    up so that a phishing email could look a lot like this. Seems official?

                                    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
5   A closer look
    Notice the To: and Cc: boxes aren’t filled in. And while it claims to be
    from Wells Fargo, the email address appears to be from “activation.”

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
6   Not my number
    See how they’ve tried to make the VISA number look like something
    you’d recognize? Well, on most credit cards it’s the last eight
    numbers that are unique.
                                  © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
7   Obvious no-no
    No bank or legitimate business will ask for personal information in an
    email. It’s a clear sign the message is a scam.

                                   © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
A deeper look
8


       The scammers get sophisticated. The Wells Fargo logo has an
        official SSL certificate, a widely accepted method for ensuring
        a secure connection. That means the bad guys mined the
        Internet for official company graphics to include in the con.




                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Verified, but not
9


       The SSL certificate is
        verified, meaning it
        has been officially
        recognized as Wells
        Fargo.
       But that only applies
        to the logo. So if you
        dissect your messages
        for authenticity, be
        careful. It’s easy to
        be misled.


                                 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
10   The evil code
     Looking at the email code, you can see information wouldn’t be sent to
     Wells Fargo, but to PayPal. It’s designed to automatically pull money from
     your account, through PayPal, presumably to the hackers’ account.
                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
The reroute game
11



           The scammers are also trying to mask their steps
           by pumping your information through a masked
           web address: http://0x185AED0A/T/w.php




                              © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Use your judgment
12




                The best defense against these
                phishing attacks is sound judgment.

                If it doesn’t feel right, it probably isn’t.
                Simply pick up the phone, call your
                bank or business, and ask them to
                work with you over the phone.




                          © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Take action
13




                   If you’ve fallen for a phishing
                   scam, you’re not alone. Call your
                   bank, credit union, insurer, financial
                   planner or attorney to see if they provide
                   identity theft protection.




                               © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Help is out there
14




     Call Identity Theft 911
     at 1-888-682-5911.



                         © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012

Contenu connexe

Tendances

Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
Johnathan Bernal
 

Tendances (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information security
Information securityInformation security
Information security
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 

En vedette

Presentación1
Presentación1Presentación1
Presentación1
danash14
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Tatsuo Shigematsu
 

En vedette (16)

Presentación1
Presentación1Presentación1
Presentación1
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!
 
5 aplicatii
5 aplicatii5 aplicatii
5 aplicatii
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieria
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tango
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
 
Facebook Deep face
Facebook Deep faceFacebook Deep face
Facebook Deep face
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalance
 
Sách Luyện Đọc Nhanh
Sách Luyện Đọc NhanhSách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
 
RESPIRATORIO
RESPIRATORIORESPIRATORIO
RESPIRATORIO
 
Ict environment
Ict environmentIct environment
Ict environment
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSA
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
 
Islam
IslamIslam
Islam
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
 

Similaire à Anatomy of a Phishing Email

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 

Similaire à Anatomy of a Phishing Email (16)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Scams
ScamsScams
Scams
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
travel Safely
travel Safelytravel Safely
travel Safely
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Anatomy of a Phishing Email

  • 1. Anatomy of a Phishing Email
  • 2. Spamming for money 2 phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 3. 3 An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 4. 4 Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 5. 5 A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 6. 6 Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 7. 7 Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 8. A deeper look 8  The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 9. Verified, but not 9  The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo.  But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 10. 10 The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 11. The reroute game 11 The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 12. Use your judgment 12 The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 13. Take action 13 If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 14. Help is out there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012