You are on page 1of 8

A PAPER PRESENTATION ON

“PHISHING”
-A THREAT TO NETWORK SECURITY

GODAVARI INSTITUTE OF
ENGINEERING AND TECHNOLOGY

Presented by:

N.SURAJ S.V.R.ADITYA

3RD BTECH IT 3RD BTECH IT


EMAIL_ID:suraj_2607 @ email_id:somisetty.aditya
Yahoo.com @gmail.com
PHONE:9948947026 PHONE:9704790680
ABSTRACT phishing’. Phishing is also referred to as
brand spoofing or carding and is a variation
“Give a man a fish," goes an old on "fishing," the idea being that bait is
adage," and you feed him for a day. Teach a thrown out with the hopes that while most
man to fish, and you feed him for life." In will ignore the bait, some will be empted
Internet parlance, “Teach a man to phish, into biting. It is a type of fraud unique to the
and he can feast on caviar for the rest of his Internet. Hackers challenge network security
life." It is becoming increasingly common to through ‘phishing’. Phishers use both
tune in to the news or load your favorite linguistic and technical ploys to steal
news Web site and read about yet another sensitive data. The term “phishing" was
Internet e-mail scam. An e-mail scam is a coined in 1996 and refers to email that
fraudulent email that appears to be from a directs users to counterfeit websites. The
legitimate Internet address with a justifiable goal is to collect personal and final
request —usually to verify your personal information, which can then be used to make
information or account details. One example unauthorized purchases, steal identities, or
would be if you received an e-mail that sell sensitive information to identify theft
appears to be from your bank requesting you things. In a typical phishing e-mail, the users
click a hyperlink in the E-mail and verify are directed to a proxy site that looks just
your online banking information. Usually like the original one but however the proxy
there will be a repercussion stated in the e- site might ask for additional detailed data
mail for not following the link, such as ( like bank account numbers, social security
"your account will be closed or suspended". number, mother's maiden name, credit/debit
The goal of the sender is for you to disclose card numbers, or the highly confidential
personal and account related information. CVV2 in the case of a proxy bank email). It
This paper presents one of the 21st is not unusual, however, for the link to be
century’s identity theft web crimes known as
dead, as phishing requires a very tight called ‘phishing’. Organizational size
timeline due to more effective detection doesn’t matter; the equality of the personal
tools. information reaped from the attack has a
Phishing is an example of social value all in itself to the criminals. Hidden
engineering techniques used to fool users. away amongst the mounds of electronic junk
Attempts to deal with the growing number mail, and bypassing many of todays best
of reported phishing incidents include anti-Spam filters, a new attack vector lies in
legislation, user training, public awareness, wait to steal confidential personal
and technical measures. Information. Such mails lure victims into
Our paper briefly gives the history of traps specifically designed to steal their
phishing and explains the various methods electronic identity.
of message delivery which includes delivery 1.2 HISTORY OF PHISHING:
with email, instant message delivery, and The word “phishing” originally comes

web based delivery, and trojoned host. In from the analogy that early Internet

addition to these, it describes the various criminals used email lures to “phish” (FISH)

phishing attack vectors. Phishing attacks for passwords and financial data from sea of

include man in middle attacks, confusing Internet users. The term Phishing covers not

URL attacks, hidden attacks, and confusing only obtaining user account details, but now

host names. Our paper also gives includes access to all personal and financial

information about various defence data.

mechanisms. Defence mechanisms is 2. PHISHING MESSAGE


deployed in three layers client, server, DELIVERY:
Phishing attacks rely upon a mix of
enterprise which help to implemented to
technical deceit and social engineering
guard oneself from the crippling effects of
practices. In the majority of cases the
phishing.
Phisher must persuade the victim to
1. INTRODUCTION:
intentionally perform a Series of

1.1 WHAT IS PHISHING? confidential information. Communication


channels such as email, web-pages, IRC and
The process of tricking or socially
instant messaging services are popular.
engineering organizations customers into
2.1 E MAIL:
imparting their confidential information is
Phishing attacks initiated by email are the • The use of pop-up or frameless
most common. As almost all the net users windows to disguise the true source of the
use Emails Phisher find it easy to do identity Phisher’s message.
theft. Techniques used within Phishing 2.3 IRC AND INSTANT MESSAGING:
emails: IRC and Instant Messaging (IM) forums
• Official looking and sounding emails are likely to become a popular phishing
• Copies of legitimate corporate emails with ground. As these communication channels
Minor URL changes. become more popular with home users, and
• HTML based email used to obfuscate more functionality is included within the
target URL information software, specialist phishing attacks will
• Standard virus/worm attachments to email increase. As many IRC and IM clients allow
for embedded dynamic content (e.g.
2.2 WEB BASD DELIVERY: graphics, URL’s, multimedia includes, etc.)
to be sent by channel participants, it is a
An increasingly popular method of
trivial task to employ many of the phishing
conducting phishing attacks is through
techniques used in standard web-based
malicious web-site content. This content
attacks. The common usage of Bots
may be included within a web-site operated
(automated programs that listen and
by the Phisher, or a third-party site hosting
participate in group discussions) in many of
some embedded content.
the popular channels, means that it is very
Web-based delivery techniques include:
easy for a Phisher to anonymously send
• The inclusion of HTML disguised
semi relevant links and fake information to
links (such as the one presented in the above
the victims.
email Example). Within popular web-sites,
2.4 TROJONED HOSTS:
message boards.
While the delivery medium for the
• The use of third-party supplied, or
phishing attack may be varied, the delivery
fake, banner advertising graphics to lure
source is increasingly becoming home PC’s
customers to the Phisher’s web-site.
that have been previously compromised. As
• The use of web-bugs (hidden items
part of this compromise, a Trojan horse
within the page – such as a zero-sized
program has been installed which allows
graphic) to track a potential customer in
Phisher’s to use the PC as a message
preparation for a phishing attack.
propagator. In fact, to harvest the • Bad domain names-which look similar
confidential information of several thousand to original domain names but actually link to
customers simultaneously, Phisher’s use phisher’s server.
information specific Trojans. • Friendly login URL’s-Many common
3. PHISHING ATTACK web browser implementations allow for

VECTORS: For a Phishing attack to be complex URL’s that can include

successful, it must use a number of methods Authentication information such as a Login

to trick the Customer into doing something name and password which trick many

with their server and/or supplied page customers into thinking that they are
actually visiting the target organization.
content .The most common methods are:
3.3 CONFUSING HOST NAMES:
3.1 MAN IN MIDDLE ATTACKS:
Most Internet users are familiar with
In this class of attacks, the attackers situate
navigating to sites and services using a fully
themselves between the customer and the
qualified domain name, such as
real web-based application, and proxies all
www.site.com. For a web browser to
communications between the systems.
communicate over the Internet, this address
must to be resolved to an IP address, such as
209.134.161.35 for www.site.com. This
resolution of IP address to host name is
achieved through domain name servers.
3.4 HIDDEN ATTACKS:
An attacker may make use of HTML,
DHTML and other scriptable code that can
3.2 CONFUSING URL ATTACKS: be interpreted by the customer’s web
browser and used to manipulate the display
The secret for many phishing attacks is
of the rendered information. In many
to get the message recipient to follow a
instances the attacker will use these
hyperlink (URL) to the attacker’s server,
techniques to disguise fake content as
without them realizing that they have been
coming from the real site – whether this is a
duped. The most common methods of URL
man-in-the-middle attack, or a fake copy of
obfuscation include:
the site hosted on the attackers own systems.
The most common vectors include: to detect and block the installation of
• Hidden Frames • Overriding Page malicious software like Trojans, spy wares.
Content • Graphical Substitution 4.1.2 Email Sophistication:
4. DEFENCE MECHANISM: Many of the attacks are successful due to
The Phisher has a large number of methods HTML-based email Functionality as
at their disposal consequently there is no Explained above.
single solution capable of combating all · HTML functionality must be disabled
these different attack vectors. However, it is in all email client applications capable of
possible to prevent current and future accepting        or sending Internet emails.
Phishing attacks by utilizing a mix of Instead plain-text email representation
information security technologies and should be used, and        ideally the chosen
techniques. For best protection, these font should be fixed-with such as Courier.
security technologies and techniques must · Email applications capable of blocking
be deployed at three Logical layers: “dangerous” attachments and preventing
The Client-side – this includes the user’s users from quickly executing or viewing
PC.The Server-side – this includes the attached content should be used whenever
businesses, Internet visible systems and possible.
custom applications. Enterprise Level – 4.1.3 Browser Capabilities:
distributed technologies and third-party The common web browser may be used as a
management services defense against phishing attacks – if it is
4.1 CLIENT SIDE: configured securely. Customers and
Client side is a representation of forefront of businesses must make a move to use a web
anti-phishing security. At this side browser that is appropriate for the task at
protection against phishing can be done by: hand. To help prevent many Phishing attack
· Desktop protection technologies vectors, web browser users should:
· Email sophistication • Disable all window pop-up functionality.
· Browser capabilities • Disable Java runtime support.
· Customer vigilance • Disable ActiveX support.
4.1.1 Desktop protection technologies: • Disable all multimedia and auto-play/auto-
By using anti-viruses, anti-spy wares, execute extensions.
personal firewall etc, which have the ability • Prevent the storage of non-secure cookies.
•Ensure that any downloads cannot be · Credit card and bank account
automatically run from the browser, and statements are to be reviewed as soon as
must Instead be downloaded into a directory they are received to determine whether there
for anti- Virus inspection. are any unauthorized charges. If the
4.1.4 Customer Vigilance: statement is late by more than a couple of
Customers may take a number of steps to days, a call to Credit Card Company or bank
avoid becoming a victim of a phishing must be made to confirm billing address and
attack that involve inspecting content that is account balances.
presented to them carefully.
Some measures that should be taken by the 4.2 SERVER SIDE:
customer are: By implementing intelligent anti-phishing
· If a customer gets an email that warns techniques into the organizations web
he/she, with little or no notice that their application security, developing internal
account will be shut down unless they processes to combat phishing vectors and
reconfirm billing information, they should educating customers – it is possible to take
not reply or click on the link in the email. an active role in protecting customers from
Instead, they should contact the company future attack. At the server-side, protection
cited in the email using a telephone number against Phishing can be done by:
or Web site address that is known to be 1. Improving customer awareness
genuine. 2. Host and Linking conventions
· Customer should never respond to 3. Enterprise Level
HTML email with embedded submission
forms. Any information submitted via the 5. CONCLUSION:
email (even if it is legitimate) will be sent in Phishing, which started off being part of
clear text that could be observed. popular hacking culture, has now increased
· Users should avoid emailing personal numerously with the growth of use of
and financial information. Before submitting Internet. The points raised within this paper,
financial information through a Web site, and the solutions proposed, represent key
the "lock" icon on the browser's status bar steps in securing online services from
should be observed .It signals that fraudulent phishing attacks – and also go a
information is secure during transmission.
long way in protecting against many other
popular hacking or criminal attack vectors.

You might also like