SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
ATTACK & COUNTER MEASURES
INTRODUCTION
 Coined in 1996 by computer hackers.
 Hackers use e-mail to fish the internet hoping to hook
users into supplying them the logins, passwords and/or
credit card information.
 In a typical phishing attack a user will receive an e-mail
message impersonated to be sent by a financial
institution.
 1%-20% users respond to such attacks.
PHISHING ATTACKS
 Phishing attacks are combined with malicious code
attacks such as Mimail, Bank Withdrawal Trojan,
Mydoom.m worm etc
 In such blended attacks these virus/worms carry the
payloads which harness email addresses from the
internet and affected systems and further launch
phishing attacks.
PHISHING EXAMPLES
Example 1.
Example 2.
PHISHING TRENDS
 APWG is an industry association focused on eliminating
the identity theft and fraud that result from phishing and
email spoofing.
 This group provides forums to discuss phishing issues,
trials and evaluations of potential technology solutions.
 Publish Phishing Attack Trends Report
TECHNOLOGICAL SOLUTIONS
 Ultimate solution is training the end users not to reveal
any sensitive information.
 Basic approach for an effective anti-phishing effort
includes detection, prevention and awareness.
 Counter measures are in the form of technological
solutions, policy guidelines and user awareness.
• Anti-phishing solution includes:
a.Detection: scanning, flitering and alerting
b.Mail server authentication
c. Secure web-authentication
d.Digitally signed e-mail
e.Mail gateway filtering
f. Desktop filtering
Secure web-authentication
Digitally signed e-mail
CONCLUSION
The phishing attacks are major threat to e-commerce and
e-banking applications. The scammers are making huge
losses by stealing financial data from the users. There is
need for adoption of counter-measure steps by the
financial institutions and individual customers for fighting
phishing attacks. Digital signature usage should be
promoted for secure mail transactions.
51 phishing attacks

Contenu connexe

Tendances

Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
PwC survey summary for malaysia 2011
PwC survey summary for malaysia 2011PwC survey summary for malaysia 2011
PwC survey summary for malaysia 2011MNorazizi HM
 
Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016CBIZ, Inc.
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Themizoologic
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Internet Phishing
Internet PhishingInternet Phishing
Internet PhishingBilhami
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr khan shamim
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 

Tendances (20)

Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
PwC survey summary for malaysia 2011
PwC survey summary for malaysia 2011PwC survey summary for malaysia 2011
PwC survey summary for malaysia 2011
 
Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Them
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Phishing
PhishingPhishing
Phishing
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Ransomware
RansomwareRansomware
Ransomware
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Phishing
PhishingPhishing
Phishing
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 

Similaire à 51 phishing attacks

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. PresentationKeepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. PresentationKeepnet Labs.
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101Welch LLP
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdfSysvoot Antivirus
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemChinmayee Behera
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat ReportChris Hewitt
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Xola Adons
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKScsandit
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 

Similaire à 51 phishing attacks (20)

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. PresentationKeepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent Them
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Plus de SALMAN SHAIKH

Raj ngo brochure seminars update
Raj ngo brochure seminars updateRaj ngo brochure seminars update
Raj ngo brochure seminars updateSALMAN SHAIKH
 
Raj ngo brochure seminar
Raj ngo brochure seminarRaj ngo brochure seminar
Raj ngo brochure seminarSALMAN SHAIKH
 
46 smart glasses epson
46 smart glasses epson46 smart glasses epson
46 smart glasses epsonSALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
35 hard work and smart work
35 hard work and smart work35 hard work and smart work
35 hard work and smart workSALMAN SHAIKH
 
37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfxSALMAN SHAIKH
 
38 joy of giving.pdfx
38 joy of giving.pdfx38 joy of giving.pdfx
38 joy of giving.pdfxSALMAN SHAIKH
 
40 the dream self made millionaire lessons
40 the dream self made millionaire lessons40 the dream self made millionaire lessons
40 the dream self made millionaire lessonsSALMAN SHAIKH
 
45 android applications
45 android applications45 android applications
45 android applicationsSALMAN SHAIKH
 
43 sixth sense technology
43 sixth sense technology43 sixth sense technology
43 sixth sense technologySALMAN SHAIKH
 

Plus de SALMAN SHAIKH (20)

Campus vs corporate
Campus vs corporateCampus vs corporate
Campus vs corporate
 
Raj ngo brochure seminars update
Raj ngo brochure seminars updateRaj ngo brochure seminars update
Raj ngo brochure seminars update
 
Raj ngo brochure seminar
Raj ngo brochure seminarRaj ngo brochure seminar
Raj ngo brochure seminar
 
46 smart glasses epson
46 smart glasses epson46 smart glasses epson
46 smart glasses epson
 
48 apple story
48 apple story48 apple story
48 apple story
 
32 google products
32 google products32 google products
32 google products
 
50 5 g technology
50 5 g technology50 5 g technology
50 5 g technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
35 hard work and smart work
35 hard work and smart work35 hard work and smart work
35 hard work and smart work
 
36 winner vs losers
36 winner vs losers36 winner vs losers
36 winner vs losers
 
33 body language
33 body language33 body language
33 body language
 
34 you can win
34 you can win34 you can win
34 you can win
 
37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx
 
38 joy of giving.pdfx
38 joy of giving.pdfx38 joy of giving.pdfx
38 joy of giving.pdfx
 
39 work ethics
39 work ethics39 work ethics
39 work ethics
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
40 the dream self made millionaire lessons
40 the dream self made millionaire lessons40 the dream self made millionaire lessons
40 the dream self made millionaire lessons
 
45 android applications
45 android applications45 android applications
45 android applications
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
43 sixth sense technology
43 sixth sense technology43 sixth sense technology
43 sixth sense technology
 

51 phishing attacks

  • 1. ATTACK & COUNTER MEASURES
  • 2. INTRODUCTION  Coined in 1996 by computer hackers.  Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords and/or credit card information.  In a typical phishing attack a user will receive an e-mail message impersonated to be sent by a financial institution.  1%-20% users respond to such attacks.
  • 3. PHISHING ATTACKS  Phishing attacks are combined with malicious code attacks such as Mimail, Bank Withdrawal Trojan, Mydoom.m worm etc  In such blended attacks these virus/worms carry the payloads which harness email addresses from the internet and affected systems and further launch phishing attacks.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10.
  • 11.
  • 12. PHISHING TRENDS  APWG is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing.  This group provides forums to discuss phishing issues, trials and evaluations of potential technology solutions.  Publish Phishing Attack Trends Report
  • 13. TECHNOLOGICAL SOLUTIONS  Ultimate solution is training the end users not to reveal any sensitive information.  Basic approach for an effective anti-phishing effort includes detection, prevention and awareness.  Counter measures are in the form of technological solutions, policy guidelines and user awareness.
  • 14. • Anti-phishing solution includes: a.Detection: scanning, flitering and alerting b.Mail server authentication c. Secure web-authentication d.Digitally signed e-mail e.Mail gateway filtering f. Desktop filtering
  • 17.
  • 18. CONCLUSION The phishing attacks are major threat to e-commerce and e-banking applications. The scammers are making huge losses by stealing financial data from the users. There is need for adoption of counter-measure steps by the financial institutions and individual customers for fighting phishing attacks. Digital signature usage should be promoted for secure mail transactions.