Thursday, November 11, 2021

Phishing Attack - 'Cyber Jaagrookta Diwas' (Awareness) Lect - 2 (06 Nov 2021)

 Types of Cybercrime


Phishing

Identity Theft

Cyber Stalking

Cyber Obscenity

Computer Vandalism

Ransomware

DDoS Attacks

Botnets

Social Engineering

PUPs

Prohibited/Illegal Content

Online Scams

Exploit Kits


Phishing Attack


Phishing is a type of cybersecurity attack that attempts to obtain data that are sensitive like Username, Password, and more. It attacks the user through mail, text, or direct messages. Now the attachment sends by the attacker is opened by the user because the user thinks that the email, text, messages came from a trusted source.


It is a type of Social Engineering Attack. For Example, The user may find some messages like the lottery winner. When the user clicks on the attachment the malicious code activates that can access sensitive information details. Or if the user clicks on the link that was sent in the attachment they may be redirected to a different website that will ask for the login credentials of the bank.



Types of Phishing Attack :



Spear Phishing –
This attack is used to target any specific organization or an individual for unauthorized access. These types of attacks are not initiated by any random hacker


Clone Phishing –
This attack is actually based on copying the email messages that were sent from a trusted source. Now the hackers alter the information by adding a link that redirects the user to a malicious or fake website.


Catphishing –
It is a type of social engineering attack that plays with the emotions of a person and exploits them to gain money and information. They target them through dating sites. It is a type of engineering threat.


Voice Phishing –
Some attacks require to direct the user through fake websites, but some attacks do not require a fake website. This type of attack is sometimes referred to as vishing. Someone who is using the method of vishing, use modern caller id spoofing to convince the victim that the call is from a trusted source. They also use IVR to make it difficult for the legal authorities to trace, block, monitor. It is used to steal credit card numbers or some confidential data of the user. This type of phishing can cause more harm.

SMS phishing –
These attacks are used to make the user revealing account information. This attack is also similar to the phishing attack used by cybercriminals to steal credit card details or sensitive information, by making it look like it came from a trusted organization. Cybercriminals use text messages to get personal information by trying to redirect them to a fake website. This fake website looks like that it is an original website.



Symptoms of the phishing :

  • It may request the user to share personal details like the login credentials related to the bank and more.

  • It redirects to a website if the user clicks on the link that was sent in the email.

  • If they are redirected to a website it may want some information related to the credit card or banking details of the user.

Preventive measures of phishing :

  • Do not try to open any suspicious email attachments.

  • Do not try to open any link which may seem suspicious.

  • Do not try to provide any sensitive information like personal information or banking information via email, text, or messages.

  • Always the user should have an antivirus 


1 comment:

  1. Really helpful down to the ground, happy to read such a useful post. I got a lot of information through it and I will surely keep it in my mind. Keep sharing. Data Security Consulting

    ReplyDelete