Monday, February 28, 2011

Poll question week 4

Link to us: http://snipurl.com/weekfour

This is the week 4 poll result



Poll question week four: Did you check your URL everytime when you access to website?There is a total of 12 votes, 8 of them voted "Yes", 4 of them voted "Sometimess", and none of them voted "No". The poll make us know that majority of them beware of phishing. To avoid be the victim of phishers, we should always check the URL of the website you accessing.

Sunday, February 27, 2011

Type of Phishing Attack

Link to us: http://snipurl.com/typeofphishingattack

Deceptive Phishing. The term "phishing" originally referred to account theft using instant messaging but the most common broadcast method today is a deceptive email message. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confidential information can be collected.

Malware-Based Phishing refers to scams that involve running malicious software on users' PCs. Malware can be introduced as an email attachment, as a downloadable file from a web site, or by exploiting known security vulnerabilities--a particular issue for small and medium businesses (SMBs) who are not always able to keep their software applications up to date.

Keyloggers and Screenloggers are particular varieties of malware that track keyboard input and send relevant information to the hacker via the Internet. They can embed themselves into users' browsers as small utility programs known as helper objects that run automatically when the browser is started as well as into system files as device drivers or screen monitors.

Session Hijacking describes an attack where users' activities are monitored until they sign in to a target account or transaction and establish their bona fide credentials. At that point the malicious software takes over and can undertake unauthorized actions, such as transferring funds, without the user's knowledge.

Web Trojans pop up invisibly when users are attempting to log in. They collect the user's credentials locally and transmit them to the phisher.

Hosts File Poisoning. When a user types a URL to visit a website it must first be translated into an IP address before it's transmitted over the Internet. The majority of SMB users' PCs running a Microsoft Windows operating system first look up these "host names" in their "hosts" file before undertaking a Domain Name System (DNS) lookup. By "poisoning" the hosts file, hackers have a bogus address transmitted,taking the user unwittingly to a fake "look alike" website where their information can be stolen.

System Reconfiguration Attacks modify settings on a user's PC for malicious purposes. For example: URLs in a favorites file might be modified to direct users to look alike websites. For example: a bank website URL may be changed from "bankofabc.com" to "bancofabc.com".

Data Theft. Unsecured PCs often contain subsets of sensitive information stored elsewhere on secured servers. Certainly PCs are used to access such servers and can be more easily compromised. Data theft is a widely used approach to business espionage. By stealing confidential communications, design documents, legal opinions, employee related records, etc., thieves profit from selling to those who may want to embarrass or cause economic damage or to competitors.

DNS-Based Phishing ("Pharming"). Pharming is the term given to hosts file modification or Domain Name System (DNS)-based phishing. With a pharming scheme, hackers tamper with a company's hosts files or domain name system so that requests for URLs or name service return a bogus address and subsequent communications are directed to a fake site. The result: users are unaware that the website where they are entering confidential information is controlled by hackers and is probably not even in the same country as the legitimate website.

Content-Injection Phishing describes the situation where hackers replace part of the content of a legitimate site with false content designed to mislead or misdirect the user into giving up their confidential information to the hacker. For example, hackers may insert malicious code to log user's credentials or an overlay which can secretly collect information and deliver it to the hacker's phishing server.

Man-in-the-Middle Phishing is harder to detect than many other forms of phishing. In these attacks hackers position themselves between the user and the legitimate website or system. They record the information being entered but continue to pass it on so that users' transactions are not affected. Later they can sell or use the information or credentials collected when the user is not active on the system.

Search Engine Phishing occurs when phishers create websites with attractive (often too attractive) sounding offers and have them indexed legitimately with search engines. Users find the sites in the normal course of searching for products or services and are fooled into giving up their information. For example, scammers have set up false banking sites offering lower credit costs or better interest rates than other banks. Victims who use these sites to save or make more from interest charges are encouraged to transfer existing accounts and deceived into giving up their details.


Reference : http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html

Thursday, February 24, 2011

E-banking scams on the rise

Link to us: http://snipurl.com/ebankingscam

According to the scams targeting electronic banking have increased of 1426 reports were made to CyberSecurity Malaysia last year compared with 634 in 2009. CyberSecurity Malaysia had identified at least 900 phishing sites targeting financial institutions in the country, it is easy to obtain personal information, usernames, passwords or credit card information through the phishing websites. The rise in Internet banking scams to the increasing popularity of the online banking among Malaysians.

Step by step to scams targeting electronic banking: -

1. Phishing was to despatch e-mails to account holders informing them of a “hitch” in their accounts, and that they should quickly log in to the account to verify some information.

2. Victims may will be to click on the link in the e-mail which leads the victims to a fake website.

3. The fake websites are used to mislead the victims log in by entering their usernames and passwords, which are immediately copied by the creator of the fake website.

4. The cyber criminal can then log in and empty the victim entire account in minutes if the amount is within the limit allowed to be transferred in a day.


References
E-banking scams on the rise , the star online,[Online],Retrieved on 17 February 2011.

Friday, February 18, 2011

Spear Phishing Trial in Canada

Link to us: http://snipurl.com/spearphishing
What is spear phishing?

Firstly,I would like to explain something more about spear phishing. Spear phishing is an
e-mail spoofing fraud attempt that targets a specific organization, seeking
unauthorized access to confidential data. As with the e-mail messages used in
regular phishing expeditions, spear phishing messages appear to come from a
trusted source. Phishing messages usually appear to come from a large and
well-known company or Web site with a broad membership base, such as eBay or
Pay Pal.

In the case of spear phishing, however, the apparent source of the e-mail is
likely to be an individual within the recipient's own company and generally
someone in a position of authority. From what I've read somewhere, spear
phishing attempts are not from random hacker, they are more likely conducted by
sophisticated groups out for financial gain, trade secrets or military
information.

In Toronto, computer hackers infiltrated some Canadian government computer systems
but were not able to access the classified data they were seeking. Stockwell Day,
the president of Treasury Board, which is also a federal administrative agency
said the attacks were significant but that Canada's cyber security systems
detected the intrusions and blocked them.

TheCanadian Broadcasting Corporation reported computers belonging to the Treasury
Board and Finance Department were among the systems infiltrated in early
January, along with Defence Research and Development Canada, which is a
research agency within the Department of National Defence. No indications that
any data relating to Canadians was compromised.

Prime Minister Stephen Harper said that federal security agencies were working to
deal with cyber threats. The CBC reported the cyber attacks were traced to
computer servers in China, but no government official would confirm the origins
of the attacks.

The report said hackers were using a technique known as spear phishing, which
involves impersonating bureaucrats via their e-mail accounts to snoop around
government computer systems and steal key passwords that unlock government data
systems.
Reference
http://biz.thestar.com.my/news/story.asp?file=/2011/2/18/business/20110218080041&sec=business

Thursday, February 17, 2011

Search Engine Phishing

Link to us: http://snipurl.com/searchenginephishing
Search engine phisher refer to using powerful search engine to locate high-value targets or to search for valuable information. Phishers always try to create web pages for fake products, get the pages indexed by search engines, and wait for unsuspecting customers to enter their confidential information as part of an order, sign-up, or balance transfer. Such pages usually offer product or services at a price slightly too good to be true.
Phisher is a clever and dishonest plan for making money involving fraudulent banks have been particularly successful. A scam creates a page advertising an interest rate slightly higher than any real bank. For example, victims find the site of searching for products or services and use these sites to save or make from interest charges to transfer existing accounts; they are fooled into giving up their information to search engine phishing. Some victims even provided their bank account numbers to “Flintstone National Bank,” of “Bedrock, Colorado” of fraudulent banks.
The best way to prevent search engine phishing is should be very careful to notice any signs of danger when dealing with something because you think that there may be a problem site that has offers that seem just too good to be true.
Google is known to have the cleanest design, fastest search results, and its unique Page Rank technology used by Internet users today. Google hacking involves using the Google search engine to locate specific strings of text within search engine. A web browser names as Mozilla Firefox plug-in website detections by leveraging the Google search engine. According to the Electrical and Computer Engineering Department, University of Toronto that search result of the unique keywords are then used to compare with the website that the users are currently visiting and to determine whether the website is a phishing website. Since most phishing sites are short-lived; they would have much less visitors compared to the legitimate sites they imitate. So it can be derived that the suspicious web site is unlikely to be the one that the users are expecting they are visiting when there is a mismatch in the domain result of the websites in the top search results and the suspicious web site.

References
1. Jessica Hunter, Search Engine Phishing-What you need to known, [Online], Retrieved on 16 February 2011.
URL: http://www.identitytheftfixes.com/search_engine_phishing_--_what_you_need_to_know.html
2. Robert Ma, Phishing Attack Detection by Using a Reputable Search Engine, [Online], Electrical and Computer Engineering Department, University of Toronto, Retrieved on 17 February 2011.
URL: http://www.eecg.toronto.edu/~lie/Courses/ECE1776-2006/Projects/Phishing2a-proposal.pdf

Monday, February 14, 2011

What is Phishing ?

什么是“网络钓鱼”?

(What is phishing ?)

网络钓鱼是通过大量发送声称来自于银行或其他知名机构的欺骗性垃圾邮件,意图引诱收信人给出敏感信息(如用户名、口令、帐号 ID 、ATM PIN 码或信用卡详细信息)

Phishing is sent through a large number of something claim to be from banks or other reputable organizations deceptive spam, intended to give sensitive information to lure the recipient such as user name, password, account ID, ATM PIN code or credit card details.

最典型的网络钓鱼攻击将收信人引诱到一个通过精心设计与目标组织的网站非常相似的钓鱼网站上,并获取收信人在此网站上输入的个人敏感信息,通常这个攻击过程不会让受害者警觉。

The most typical phishing attack to lure the recipient to a target organization through well-designed/perfectly designed sites with very similar phishing site, and collect whatever sensitive personal information the recipients insert, usually the process will not alert the Victim.

这些个人信息对黑客们具有非常大的吸引力,因为这些信息使得他们可以假冒受害者进行欺诈性金融交易,从而获得经济利益。

Those information collected is very attractive for hacker, because the information collected allow hackers to act as the victims and to cheat in financial transaction to gain economy benefits.

受害者经常遭受显著的经济损失或全部个人信息被窃取并用于犯罪的目的。

Victims often suffer from significant economic loss or theft of personal information and to use for criminal purposes.

Online Refferences:
1. 什么是“网络钓鱼”?,[Online], Retrieved on 14 February 2011.
URL: http://iask.sina.com.cn/b/12785184.html?from=related

Thursday, February 10, 2011

Poll week 2

Link to us: http://snipurl.com/weektwo


Poll question of the second week, "Did you know more about phishing after reading this blog?". The result of 8 votes from our readers, 37.5% of them voted "I have gained a lot of knowledge", thanks for the vote and this blog is going to contribute wider information to you people. 12.5% of them voted "A little", and 50% of them voted "Normal", we'll continue gather more information about phishing in this blog.

Why phishing website still exist?


Link to us: http://snipurl.com/whyphishingwebsitesstillexits

Mengikut statistik yang dikeluarkan pada tahun lepas, sebanyak 45% daripada 3 juta pengguna internet seluruh dunia tertipu dengan taktik laman web phishing ini.
According to statistics released last year (2009) of many 45% from 3 million internet users worldwide fooled by the tactics of these phishing websites.

A Group of people is easy to fooled

Figure 1: Phishing websites (Click the picture to enlarge)

The people are easily fooled by a phishing websites because they are first time uses the internet or online banking. Another reason is some of the group of people are very lazy to read perkara2 (matter2) like that and also lazy to find information on the latest taktik2 (tactics2) fraud on the internet.

The figure 1 show that you can look at the logo it still can be fooled, but when we look at the url (Uniform Resource Locator) given indeed sah2 (valid2) this phishing websites. For those who do not know, victims may be deceived by the tactics of these phishing websites.

How to avoid phishing websites


Figure 2: Phishing websites (Click the picture to enlarge)

To help you protect yourself from phishing websites by the following:

  1. Do not click on links from a link provided via email.
In general, the bank or the controlling party ap2 (what2) online financial transactions will no contact us via the email. We should be contacted by phone if the party needs to updates the relevant maklumat2 (information2).

  1. Communicate personal information only via phone or secure web sites.
You should be verify the identity of the person contact they and if possible, do the updates your account information in the nearest branch of a face to face.

  1. Check the url in the address bar. It is pointing to the right websites.
Every time you login whatever websites, you must be double check the URL in the address bar of your browser. If you sure the correct url then can proceed with the transaction, if not, you can use the Google websites search list to compare it with the website address above (show the figure 2).


References:
Jmay, Kenapa laman web phishing masih wujud?,[Online], updates on 27 December 2010.
URL: http://www.jmayz.com/kenapa-laman-web-phishing-masih-wujud/

Sunday, February 6, 2011

What does a phishing E-mails look like ?


It is never a good idea to click on any hyperlink in an e-mail, especially from unknown sources. You never know where the link is really going to take you or whether it will activate malicious code. Some hyperlinks can take you to a fake HTML page that will try to scam you into typing sensitive information. If you really want to check out the link, manually retype it into a Web browser.Whenever you are passing sensitive information such as credit cards or bank information, make sure the address bar shows "
https://" rather than just "http://" and that you have a secure lock icon at the bottom right hand corner of your Web browser. You can also double-click the lock to guarantee the third-party SSL certificate that provides the https service. Many types of attacks are not encrypted but copy an encrypted page. Always look to make sure the Web page is truly encrypted.



As the technologies gets better and better, the people behind the phishing scams also become more devious. They now use pop-up windows, official logos, and mock-secure connections copied from actual Web sites.

Picture 1 shows an example of a fishing scam e-mail.

The link in this e-mail, which is suppose to go to eBay, actually goes somewhere else.You can see that this text is actually hiding a link to another site (66.246.90.60), as shown in the close up in Picture 2. And also, the original link text does not have a "https://" secure address, but if a link like this read "https://" you might think it was safe while it could actually be hiding a fake, non-secure URL.

Picture 2



Thursday, February 3, 2011

Describe Phishing attacks

Link to us: http://snipurl.com/describephishingattacks

Phishing is one of the most common attack vectors used by hackers and social engineers to steal identities. Phishing involves sending an e-mail, usually posing as a bank, credit-card company, or other financial organization. The e-mail requests that the recipient confirm banking information or reset password or PIN numbers.

            Phishing is the practice of sending fraudulent e-mail messages to addresses requesting them to supply confidential information. The e-mail is disguised to look like a request from a legitimate organization such as a thrift, or a credit card company. Victims may be directed to provide personal account information by responding to the e-mail. The hacker and social engineering is able to capture this information and use it for financial gain. The brief e-mails that addressed masses were no longer the most effective way to trick a victim into giving up their credentials.

Attacks method
1. Fake Website
Attackers try to convince the user that the email has been by a trusted organization. The phisher then sends out messages to fool a victim into clicking the link in the email and is redirected to a fake website. Links in those emails lead to fake websites that look like the original website. The purpose of the fake websites is to catch the log in data of the user who does not realize that the fake websites is not the real one. The unsuspecting victim log in and their credentials logged.

2. Pop-up windows
A pop up appears that is from a company that you have open in another tab. They may have several tabs or windows open with several different websites including PayPal, Google, Amazon.com and Ebay.When the real website loads, a pop-up appears asking for the user's credentials,to enter your password and your credit card information.The victim viewing the legitimate site in the background would think the pop-up was from a legitimate source and enter their information.

References:
What is Phishing, [Online], Retrieved  1 February 2011.
How to Identify Phishing,[Online],Retrieved 3 February 2011.
URL:http://loginhelper.com/login-security/identify-phishing-attacks/
Phishing PopUps- Fake Requests for Personal Financial Information,[Online],Retrieved 3 February 2011.
URL:http://www.consumerfraudreporting.org/phishingpopups.php

Tuesday, February 1, 2011

Facebook Phishing

Phishing is "the activity of tricking people by getting them to give their identity, bank account members, etc. over the Internet or by email, and then using these to steal money from them.", Nowadays phishing is so common that everyone can simply learn it by watching phishing tutorials videos from youtube.

This post is going to discuss about phishing in facebook. First, people will fall into phishing in facebook mainly because they have clicked into some link that sent by a phisher. Those message can be from e-mail, user wall or any website.
(example of e-mail from phisher)
*can you spot the typo error in the picture?
After clicking to the link, a fake page created by facebook phisher will appear, bear in mind that facebook.com login URL is always "http://www.facebook.com/login.php".
(this is not facebook URL)
Ways to avoid from falling from facebook phishing.

- Choose a unique username and password for it, try not to set the same password for every accounts because this may cause you keep stolen information from compromising other accounts. (If it's too difficult for you to remember every single password from each site, I suggest to write a note and paste it beside the screen of your own personal computer)

- Always check the URL whenever you enter facebook.com, as I have stated earlier.

- Always update Anti-Virus Program for protecting your site from unknown virus.

- Remember facebook will not ask for re-enter password whenever you access to applications in facebook. (except: when you set a security question, send a virtual gift, or change your contact email.)

- Be extra aware of weird wall post, do not simply click on them unless you know very well where they go.

- Set a security question on your Facebook Account Setting page. For victims who have been phished, Facebook User Operations team needs you to answer to that question to let you back in your facebook account.

- Look for typo error!

(note: we helpS - typo error)
Online reference:
1. Ryan McGeehan, No Phishing,[Online],Retrieved on 1 February 2011.
URL: http://blog.facebook.com/blog.php?post=14600297130
2. Pinoytek, How to Stay Away From Phishing Websites That Look Like Facebook?,[Online], Retrieved on 1 February 2011.
URL: http://pinoytek.net/internet/how-to-stay-away-from-phishing-website-that-looks-like-facebook
3. MIKE, Facebook Phishing Attack, [Online], Retrieved on 1 February 2011.
URL: http://gadgetsteria.com/2009/04/29/facebook-phishing-attack-uh-oh/#
back to top