CertCities.com -- The Ultimate Site for Certified IT Professionals
Free CertCities.com Newsletter via E-mail Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Saturday: April 5, 2014


 Dulaney on Certs  
Emmett Dulaney
Emmett Dulaney


 A Visual Guide to Phishing Variants
Phishing attacks come in a variety of disguises. Emmett breaks down the four different types and how to educate your users of the dangers of each.
by Emmett Dulaney  
5/13/2011 -- "Phishing" is a type of social engineering that has grown in popularity recently within the realm of IT security. There is a significant focus on it in the SY0-301 version of the CompTIA Security+ exam, and this visual guide -- based on definitions in the Security+ Study Guide, 5th Edition --  illustrates four of the most popular types of phishing.

Regardless of the phishing variant employed, the attacker's goal is always to take advantage of the gullibility of the user they interact with. Just as with most other forms of social engineering, there is no way as an IT administrator to prevent someone from trying these tactics against users in your company, but educating them is the best way to prevent those attempts from being successful.

Phishing
Phishing is any attempt to collect sensitive information from a user through the Internet. The most common implementation is through an e-mail message similar to the one shown in this first figure.

1
[Click on image for larger view.]

In this case, the user is told there is something wrong with their account and they need to go to a site to verify their information and correct the problem. In this case, a hyperlink is provided to Comcast.com My Account, but the URL at the bottom of the window shows where the user will really land if they click on the link and it is certainly not at their Comcast site. Almost always, these sites go to http instead of https, and that can provide a quick clue as to their illegitimacy. Another clue to their illegitimacy is that they tend to be addressed generically -- to "member," "user," "customer" and so on.

In most lists of the top companies used in phishing scams, the same names appear over and over again: PayPal, eBay, Chase Bank, American Express and Citibank. Since the scammer is sending out mass quantities of messages and attempting to generate as many clicks to their site as possible, it makes sense for them to focus on companies that most users do business with as opposed to organizations the majority may not have heard of.

In the following figure, clues to the dishonesty of the message abound, even though it is intended to be mistaken for a legitimate message from Netflix:

2
[Click on image for larger view.]

Among the clues:

  1. The To: field is "none," allowing it to be mass-mailed to a plethora of individuals.
  2. Instead of having the user's name, the salutation is "Dear Netflix."
  3. The hyperlink does not go to Netflix.com, but rather to "net-flix.co.cc" (see the bottom of the frame).

Spear Phishing
While regular phishing attacks send a standard message to as many users as possible -- trying to separate the easy to fleece from those who aren't -- spear phishing picks out a target and goes directly after them. This is accomplished by finding a relationship between the user and a company/organization/other individual and making it appear as if the message is from that entity. No longer does the salutation talk about member, user, customer -- instead it uses their name directly and appears to be far more legitimate message.

3

From an attacker's standpoint, this is much more time consuming to do. Instead of sending one message to thousands of users, you have to tailor each message and send it to only one person. From a user's standpoint, it is much more difficult to identify this quickly as a phishing attack and thus the odds of it being successful are significantly increased.

In the spring of 2011, one of the e-mail companies responsible for sending out opt-in e-mail for large companies was hacked and their database compromised. Armed with a database of relationships between users and companies, this opened the door for spear phishing attacks:

4
[Click on image for larger view.]

If you think this is something you would never fall for, imagine the e-mail looking as if it came from your significant other and asking you to click here to see the video that was just uploaded of your kids or telling you that you need to pay the utility bill now or it will be shut off at your house.

Whaling
The easiest way to think of whaling is to think of spear phishing targeted only at the person with the most senior-level privileges. Instead of trying to trick someone who has mid-level permissions/access/income, the attacker aims to deceive the one person who holds the keys to the kingdom.

5

As a general rule of thumb, when spear phishing is targeted only to senior-level executives, it gets classified as whaling. The secret to preventing its success is to educate the top executives of the dangers and risks and why they should not fall for the urgent must-act-now! e-mail messages that come through.

Vishing
When you combine phishing with voice (as in a phone call), you get vishing. With the rise in the use of quality Voice-over-IP, this type of attack can now take place quite easily and from anywhere in the world. The attacker attempts to convince the subject that they are calling on behalf of another -- whether it is an individual the subject may know, a bank, a vendor or anyone else -- and that they need some information from them. Again: Think phishing, but using the phone instead of e-mail.

6

To increase the likelihood of success with vishing, an attacker can also implement caller ID spoofing. Just as e-mail spoofing makes it look as if an e-mail is sent from someone it wasn't, caller ID spoofing alters the values that appear on a caller ID box to make it look as if the call is coming from a phone number other than the one it truly is.

Just as regular training should be given to users about what information not to divulge online, you should similarly remind them of the importance of what they give out over the phone. Common ruses are to pretend to be a salesman needing to give an important presentation and unable to remember the guest password or a new vendor needing to access the extranet and make sure the warehouse isn't running out of stock.

In early 2011, a number of vishing attacks used automated dialers ("war dialers") to call numbers and tell anyone who answered that it was the credit union calling and there was a problem with their debit card.  In order to correct the problem, the individuals were told to use their phones to punch in their debit card number and PIN to verify that the card was indeed still in their possession.

Basic Built-In Protection
Almost every browser that is widely used includes some sort of phishing protection that, when enabled, checks a site the user is attempting to visit against a database of known malicious sites and alerts or stops the user if the site is found in that database. The database is stored on the local computer and updated regularly (the amount of time between updates varies with each vendor).

In the Microsoft realm, Internet Explorer 7 introduced the Phishing Filter which was replaced in IE 8 and IE 9 by the SmartScreen Filter. Firefox 3 and later contain the Phishing and Malware Protection feature. Google Chrome also has the Phishing and Malware Protection feature and Safari includes phishing protection. With Opera, you have Opera Fraud and Malware Protection.

7
Summary
The four variants of phishing discussed here are among the most common implementations of social engineering. As with all social engineering, the key to minimalizing the impact they can have in your environment lies in educating your users. Regularly remind them of the dangers that each characterizes and encourage them to come to you or other members of the IT staff with any and all questions they have.

Emmett Dulaney is the author of several books on Linux, Unix and certification. He can be reached at .

 


More articles by Emmett Dulaney:

-- advertisement --


There are 22 CertCities.com user Comments for “A Visual Guide to Phishing Variants”
Page 1 of 3
7/1/13: michael kors outlet store from [email protected] says: ths michael kors outlet store http://www.michaelkorsioutlet.org/
7/1/13: louisvuittonttoutlet.com from [email protected] says: ths louisvuittonttoutlet.com http://www.louisvuittonttoutlet.com
7/4/13: christian louboutin outlet from [email protected] says: ths christian louboutin outlet http://www.christianlouboutinoutleta.com
7/24/13: Snapback Hats For Sale from [email protected] says: nice articles Snapback Hats For Sale http://www.discount-snapbackhats.com/
8/1/13: FakeOakleySunglasses from [email protected] says: The Spectacular Progressive sunglass approach Discovered By My Mate Fake Oakley Sunglasses http://www.replicaoakleysglasses.com
8/5/13: MacCosmeticWholesale from [email protected] says: The Most Detailed makeup Report You Ever Seen Or Your Cash Back Mac Cosmetic Wholesale http://www.cosmetics-wholesalerusa.com
8/5/13: nikebasketballshoes from [email protected] says: A shoes all the companions is speaking of nike basketball shoes http://www.runontheway.com/
8/8/13: Fakeoakleysunglasses from [email protected] says: The Amazing Progressive sunglass strategies Uncovered By My Buddy Fake oakley sunglasses http://www.sunglassesgood.com
8/11/13: fitflops uk from [email protected] says: A Care-free Man's Process To The shoes Achievement fitflops uk http://www.fitflopsshoesoutlet.com
8/14/13: Mac Makeup from [email protected] says: Essentially The Most Detailed makeup Report You Ever Read Otherwise Your Money Back Mac Makeup http://www.maccosmeticswholesaler2013.com
First Page   Next Page   Last Page
Your comment about: “A Visual Guide to Phishing Variants”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top