Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Social media threats. Warning! May contain mild peril.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Cyber X-Force-SMS alert system for threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Spam Sonia Jahid University of Illinois Fall 2007.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet Security In the 21st Century Presented by Daniel Mills.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Cyber crime & Security Prepared by : Rughani Zarana.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Scams & Schemes Common Sense Media.
IT Security  .
Digital Citizenship Middle School
ISYM 540 Current Topics in Information System Management
Cyber Security Awareness Workshop
Lesson 2- Protecting Yourself Online
Scams and Schemes.
Information Security Session October 24, 2005
Lesson 2- Protecting Yourself Online
Presentation transcript:

Phishing Problem Kristián Kučerák Milan Just

Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power of information exchange and commerce at our fingertips. Networks and systems are continuously evolving to become more robust, thereby maximizing our convenience and productivity – 24 hours a day, seven days a week. Over the last few years, online banking, including online bill paying, has become very popular as more financial institutions begin to offer free online services.With the increase in online fraud and identity theft, financial crimes have changed from direct attacks to indirect attacks—in other words, rather than robbing a bank at gunpoint, the criminals target the bank's customers. This type of indirect attack significantly impacts the financial institutions themselves because their inability to adequately protect their customer assets tarnishes their reputations and overall trust.

Spam Classification Spam organization 1. Bulk-mailing tool identification. Identification of unique mailing attributes found in the header. 2. Feature subsets Items such as hash busters, (format and location), content attributes (spelling errors, grammar), and unique feature subsets from the bulk-mailing tool. 3. Sending methods Classification techniques 1. Unsolicited commercial (UCE) 2. Nonresponsive commercial (NCE) 3. List makers 4. Scams (Phishing)

Cyber Crime Evolution

What is Phishing ? Gather private information (credit card information, bank account passwords First Phishing reported against financial institution in July 2003 It introduced a new class of attack vektor – overlooked human element

Phishing Statistics Phishers are refining their techniques Phishers of 2005 build their own PHP bulk- mailing Phishers are becoming more technically savvy Phishers are taking advantage of Cross-Site Scripting (XSS) vulnerabilities Phishers are refining their key-logging malware

Go Phish! Most popular phishing methods : Impersonating Attack Forwarding Attack Pop-up Attack

Impersonating Attack

Forwarding Attack

Popup Attack

Harvesting Addresses 86 percent of the addresses posted to Web pages receive spam sign) the majority of spammers and phishers use bots or crawlers ( Extract Link, Whois Extractor, List Monitor, Verifier

Sending Spam/Phish Two competing popular bulk mailers: Send-Safe ( “real anonymous mailer”, was authored by Ruslan Ibragimov – author of Sobig Virus ) Dark-Mailer ( easy of use, forging headers, sending roughly 500,000 e- mails per hour, supports HTTP and SOCKS proxies )

Conclusion Significant and growing problem A lot of antiphishing vendors – be careful “secure by marketing” – campaing just to get sales Good idea product evaluated by a professional security team

Thank you for your attention Any questions ???