# PHISHING --- Phishing is stealing information and credentials or taking a control of a computer or system with a malicious code by tricking targets into clicking on a link or downloading malicious file ex. From attachment. --- # Goals :goal_net: - Personal & financial information :money_with_wings: :id: - Credentials :information_source: - Confidental Intel :page_facing_up: - Control :computer: --- # Types ## Email - Includes attachment or malicious URL that leads to a phishing site. - Attachment may contain documents or files w/malicious code. - URL leading to fakesite which looks like a legitimate site. - Mass mailing ## Spear - Similar to email but more sophisticated approach, takes time and research. - Targeted to a specific individual, business or organization ## Methods: ### Display name spoofing: - Ex. Attacker is impersonating as co-worker. Only the senders name is falsified and does not correspond to the senders email address. ### Domain spoofing: - Senders address is falsified. More difficult to identify but different methods are used in companies and organizations for prevention such as: DMARC: https://dmarc.org/ SPF:https://web.archive.org/web/20190222070146/http://www.openspf.org/Introduction ### Look-alike domain: - Email address is similar to the real real address ex. acme.com can be acme.inc.com. This counts on user not paying attention. --- ## FLOW --- ```graphviz digraph hierarchy { nodesep=1.0 // increases the separation between nodes node [color=black,fontname=Courier,shape=box, fontcolor=black,] edge [color=black, style=dashed] Phishing_Start->{site attachment} site->{distribute_link} distribute_link->{social_media email} attachment->{email} social_media->{target} email->{target} target->{click_or_clickclick} click_or_clickclick->{phishing_site} click_or_clickclick->{download_execute} download_execute->{malicious_file} phishing_site->{ask} ask->{credentials credit_card} credentials->{result} credit_card->{result} result->{identity_freud__finacial_loss} malicious_file->{result} result->{control_systems data_theft } } ``` --- ## EXAMPLES -- ![](https://i.imgur.com/qIE6gNl.jpg) #### ex1 - Fake mail with signs of forgery --- ![](https://i.imgur.com/nHPuKBF.jpg) #### ex 2 - Page looks authentic with encrypted connection, but URL certainly does not. --- ![](https://i.imgur.com/MM64yOf.jpg) #### ex 3 - This is will rely on user not paying attention --- # :bulb: ## Checklist: ### Cloned sites - Original site is copied. Usually some type of login page, when user put his/hers credentials to the fakesite, the fakesite redirects user to the real site. ### URLs - Hyper links and short URLs can be used to hide the real URL - Hovering mouse over the hyperlink reveals the real URL - Different URL checkers can be used to reveal the full URL from short URL. ### Email characteristics - Spelling errors or strange statements - Urgency, vague threats or other consequenses - Requests account information, passwords etc... ### Look-alike / Typosquatting - Targets user that mistypes website name. - Name is close to the original. Ex. facebook facebook-team faceb00k etc.. - Squatters register domain names that are similar to the original. ### Padlock - The connection is encrypted.The padlock symbol in the address bar alone wont guarantee safety, Anyone can get a encrypted connection to their site. - Scammer can be running a look-alike domain website with cerificates for achieving that encrypted connection. --- slide: https://hackmd.io/@phish123/rJiLmuqZ_