Legal Information
PC Knowledge Base - Phishing Defined

Good Knowledge Is Good2Use

Phishing, also known as 'Brand Spoofing,' is a variation on the word fishing. The idea is that bait is thrown out with the hopes that a user will grab it and bite into it. In most cases, bait is either an e-mail or an instant messaging site, which will take the user to hostile websites. Phishing changed with malware. Bait such as an open site that is not secure will be compromised and have a hostile code installed on it so that it could attack a machine and steal information.

In a general sense, someone sends the user an e-mail that looks like it is from the user's bank:

' This is so-and-so bank. We have a problem with your security. We need you to login to reset your security settings'.
The user is not really at that bank website, but at a website that is not real, but it is hostile and it is asking for user information.

Phishers mainly use three web attack methods, with minor variations. The three attack methods are called impersonate, forward, and popup. This does not include malware.

Impersonate

First is the impersonation of a respected company. It targets the reputation. It weakens customer confidence, because the customer does not know whether they are real bankers or a phishing banker, especially when banks themselves send out e-mails. It gives mixed messages. It is fraud to misplace trust to gain customer accounts. In most cases, identity theft results where a user's identity has been stolen, whether it is a credit card, social security number or driver's licence.

When phishers set up a website, they take the images and add a link to the target images so that they really come from a target. This looks real because it is real. These are X bank's images and sometimes they will mirror to a phishing server to prevent the target site from removing the images. This looks real but could get outdated when the target site updates its website.
Lots of the scam kits will have all the pictures included and sometimes there will be a difference between the font sizes because the scam kit is six months old. Phishing web pages link to the target server's web page.

Many times phishers create a man-in-the-middle POST. This logs the user into the real site, so the user is at a fake PayPal site for a second. The user is logged into the real site afterwards, so that it prevents victim detection, after they disclose information. The victim will not notice this as a phishing site, because they are logged back into the PayPal site, but their credentials have been stolen.

The phishing flow works as follows:

Forward Attack

The forward attack is more sophisticated. This happened to Amazon and eBay and to some banks in 2004 and 2005. Typically what the phishers do is collect via phishing e-mail. It is not as effective because the victim's anti-virus software may pick up some of that code. Also it is not as effective because, depending on the e-mail client, it may not parcel that data that a person used in the mail until the information is sent.
There will be an e-mail that has all the logos, the actual 'Submit' button in there, so the login and the password will be within the e-mail.

Then the site collects data. It performs a meta-refresh to the target, which is an HTTP redirect. Once the victim has logged-in, it takes the user back to the real site. But a lot of times it will also perform a man-in-the-middle POST to login, so that it can prevent victim detection.
When the user logs in, it will take the person to the real site, where he is logged-in as well. This attack has been seen more frequently with e-commerce, like the auction type setup, because a lot of those people are used to getting e-mails with search engines and other such things.

Popup Attack

The popup is a more creative attack. It was first seen in 2003. It was one of the first phishing attacks.
Hackers figured out how to get around a lot of popup blockers. What happens is they will put the legitimate site, such as www.xbank.com, on the back, and then they will have a hostile popup in front of that with the login credentials. The 'real' site gives it credibility and prevents it from victim detection because the user cannot tell that the hostile popup is not valid.
The user is quickly redirected to the real site, including the hostile popup. Then it will perform the man in-the-middle POST login.

Technically, with the hostile popup it is a visual man-in-the-middle and it mirrors the links and the images for credibility. Once the user signs in to that popup program, it just says, thank you for submitting your credentials.



Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE