Phishing Problem - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Phishing Problem

Description:

Bulk-mailing tool identification. ... Good idea product evaluated by a professional security team. Thank you for your attention ... – PowerPoint PPT presentation

Number of Views:78
Avg rating:3.0/5.0
Slides: 15
Provided by: krs3
Category:

less

Transcript and Presenter's Notes

Title: Phishing Problem


1
Phishing Problem
  • Kristián Kucerák
  • Milan Just

2
Abstract
  • In this age of broadband, wireless, and
    network interconnectivity, we enjoy the
    unprecedented power of information exchange and
    commerce at our fingertips. Networks and systems
    are continuously evolving to become more robust,
    thereby maximizing our convenience and
    productivity 24 hours a day, seven days a week.
    Over the last few years, online banking,
    including online bill paying, has become very
    popular as more financial institutions begin to
    offer free online services.With the increase in
    online fraud and identity theft, financial crimes
    have changed from direct attacks to indirect
    attacksin other words, rather than robbing a
    bank at gunpoint, the criminals target the bank's
    customers. This type of indirect attack
    significantly impacts the financial institutions
    themselves because their inability to adequately
    protect their customer assets tarnishes their
    reputations and overall trust.

3
Spam Classification
  • Spam organization
  • Bulk-mailing tool identification. Identification
    of unique mailing attributes found in the e-mail
    header.
  • Feature subsets Items such as hash busters,
    (format and location), content attributes
    (spelling errors, grammar), and unique feature
    subsets from the bulk-mailing tool.
  • Sending methods
  • Classification techniques
  • Unsolicited commercial e-mail (UCE)
  • Nonresponsive commercial e-mail (NCE)
  • List makers
  • Scams (Phishing)

4
Cyber Crime Evolution
5
What is Phishing ?
  • Gather private information (credit card
    information, bank account passwords
  • First Phishing reported against financial
    institution in July 2003
  • It introduced a new class of attack vektor
    overlooked human element

6
Phishing Statistics
  • Phishers are refining their e-mail techniques
  • Phishers of 2005 build their own PHP bulk-mailing
  • Phishers are becoming more technically savvy
  • Phishers are taking advantage of Cross-Site
    Scripting (XSS) vulnerabilities
  • Phishers are refining their key-logging malware

7
Go Phish!
  • Most popular phishing methods
  • Impersonating Attack
  • Forwarding Attack
  • Pop-up Attack

8
Impersonating Attack
9
Forwarding Attack
10
Popup Attack
11
Harvesting e-mail Addresses
  • 86 percent of the e-mail addresses posted to Web
    pages receive spam (_at_ sign)
  • the majority of spammers and phishers use bots or
    crawlers (www.bestextractor.com)
  • Extract Link, Whois Extractor, List Monitor,
    Email Verifier

12
Sending Spam/Phish
  • Two competing popular bulk mailers
  • Send-Safe ( real anonymous mailer, was authored
    by Ruslan Ibragimov author of Sobig Virus )
  • Dark-Mailer ( easy of use, forging headers,
    sending roughly 500,000 e-mails per hour,
    supports HTTP and SOCKS proxies )

13
Conclusion
  • Significant and growing problem
  • A lot of antiphishing vendors be careful
  • secure by marketing campaing just to get
    sales
  • Good idea product evaluated by a professional
    security team

14
Thank you for your attention
  • Any questions ???
Write a Comment
User Comments (0)
About PowerShow.com