The Dangers of Phishing

Date: May 2, 2011

Return to the article

Phishing is an email attack tactic that attempts to trick users into either clicking a link or responding to an email with personal information. Due to its wide use, several security exams include questions covering phishing including the CompTIA Security+ exam, the (ISC)2 SSCP, and the (ISC)2 CISSP. This article covers phishing formats, characteristics, and variants.

Phishing is an attack tactic using email. Attackers send out thousands of emails with the intent of getting the recipients either to respond to the email with personal information or to get the recipient to click a link. It’s a tactic used very often, so security professionals need to be aware of phishing and some of the common tactics. Phishing topics are included in many security-related certifications.

Certifications that include Phishing

If you’re planning on taking the CompTIA Security+ exam, or the (ISC)2 SSCP or CISSP, you should be aware of some basics on phishing. Each of these exams may include topics on phishing from these objectives:

Phishing Email Characteristics

Phishing emails share some classic characteristics. While they may implement these characteristics differently, most phishing emails will include the following elements:

Don’t Click That Link

Phishing emails that include links are much more common than simple requests for information. If the user does click the link, one of several scenarios occurs—and none of them are good.

The worst-case scenario is that the website automatically downloads and installs malicious software (malware) on the user’s system without any further interaction from the user. This is also known as a driveby download. This download could be malware that joins the computer to a botnet as a zombie. From here on, the user’s system does the bidding of a criminal managing the botnet’s command and control center. Some secure systems will prevent a driveby download, especially if the user is not logged on with administrator or root permissions, but some driveby downloads are still successful. Even if the driveby download is successful, the user may still be prompted to provide their credentials, or other personal information as mentioned earlier.

Users may look at the URL to see if it matches the impersonated company but the URL can be misleading. For example, the URL may be http://www.paypal.hacker.net. If the email and website looks like PayPal’s with the same graphics, a user may glance at the URL, see “PayPal,” and assume everything is OK. However, the actual site is hacker.net.

One other common tactic is to trick the user into installing a Trojan horse by prompting users with a problem. For example, users may be informed that they don’t have the correct version of software installed so that they can’t see the page can’t be displayed, or a file can’t be opened. They would then be prompted to update to a new version of Flash Player, Media Player, Adobe Reader, or something else. If the user bites, they won’t be downloading and installing an update to a legitimate application. Instead, they’ll be installing malware on their system. Of course, this is a classic Trojan horse— a download looks like it’s something useful—but it’ actually malicious.

Beware of Shortened Links

As users become educated, attackers adapt. Originally, attackers simply placed a link directly to the malicious website since users just clicked without examining the URL. As users became suspicious of sites with foreign names, attackers modified the link. For example, an attacker may have displayed http://www.pearson.com, but actually had an embedded link taking the user to the attacker’s website. Today, many users know that you can simply hover over the link and a tooltip or other display will identify the actual destination.

A newer technique is to use shortened URLs. Sites like http://bit.ly and http://tinyurl.com can take a long URL and make it short. For example: http://www.portvapes.co.uk/?id=Dumps-300-135-exams-date&exid=promotions/promotion.aspx?promo=137954 can be shortened to http://bit.ly/djT7m9. This is especially useful in tweets limited to only 140 characters. However, you can’t tell where a link like http://bit.ly/hoLB55 will take you. A phishing email could say it’ll take you to http://www.portvapes.co.uk/?id=Dumps-300-135-exams-date&exid=promotions, but it could just as easily take you to a malicious website.

Thankfully, you can check out the actual destination of these shortened URLs with sites like longurl.org. Enter the shortened URL into longurl.org, and it will let you know the actual destination.

Phishing Email Format

While it’s common for phishing emails to try and get users to click a link, some simply ask a user to reply with information. For example, I recently received the following phishing email which includes the common characteristics of a phishing email. It’s an actual cut and paste, including all the obvious typos and problems with English grammar.

Due to the high number of emails that have caused problems by violating our email policy, terms, and conditions, we are verifying each email account in our database.

Provide us with the below info:

Username:

Password:

Birth date:

Account owners that refuse to verify his or her account after 3-4 working days of this notification will lose account permanently from our site.

© 1998-2011

Cox Communications, Inc.

While the English and grammar has some problems, the email does have the classic characteristics of a phishing email. It’s impersonating Cox Communications, Inc. and presenting a problem in the first paragraph of many emails violating a policy. It includes a call to action, prompting the user to respond with their username, password, and birthdate. Last, it includes ominous consequences of losing their account permanently if the user chooses not to act.

On the surface, you may think that no one will answer this email and provide this information. However, I continue to get these types of emails about once a week. Why? I can only conclude that they’re working. Some people don’t recognize them as malicious. If the email is sent out to 10,000 addresses, only a few recipients need to respond to make it useful. Attackers can hijack these accounts and use them for other types of attacks.

Phishing Variants

There are several variants of phishing emails that you may come across:

800 East 96th Street, Indianapolis, Indiana 46240

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |