“In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication” . This is of use to a social engineer, as this is a way to utilizing a trusted pretext to obtain information or a tool that can be utilized to obtain the final target information.
Protection from phishing messages
Stereotypically phishing messages have been associated with poor English and frequent misspellings. This is not the case in modern phishing, as they are typically very realistic replicas. The best defense against phishing messages is to not follow links embedded in messages which are sent to you, or utilize log in fields embedded within the messages themselves. Instead, manually type in the trusted entities address into your browser from what you know the address to be (not just copying it from the message, or utilize a previously saved bookmark.
URL and Email Manipulation
One reason why phishing schemes work so well is that people tend to trust messages that appear to come from an important entity or look important. The attacker can easily manipulate a URL to look very close, fooling the victim to click on it. For example a URL like (http://www.company.com) looks almost identical to (http://www.cornpany.com) if the font is right and the reader scans over it. By purchasing a domain that closely resembles the legitimate URL, the attacker sets up an email account and spoofs the website, requiring very little time and effort. This seemingly simple process fools many people into clicking the link and then being hacked.
In just over 9 months the number of reported phishing attacks has more than doubled.
Due to the success of phishing attacks, malicious phishers have developed spear phishing. Instead of sending out thousands of e-mails randomly hoping a few victims will bite, spear phishers target select groups of people with something in common and usually higher profile. The e-mails usually are sent from organizations or individuals the potential victims would normally get e-mails from, making them even more deceptive.
Penetration Testers and Social Engineers
Phishing is a well used attack vector for penetration testers. Using all of the methods mentioned above, but without malicious intent, penetration testers will employ these methods to show a company how devastating these attacks can be. Many companies will spend thousands of dollars on IDS systems, firewalls and other protection devices to monitor the network, but one skilled phishing attack can lead to total devastation in a company without having to hack one thing.
- University of Texas at Dallas
- University of Northorn Iowa
- Northwestern University
- University of California