Phishing - SY0-601 CompTIA Security+ : 1.1

Professor Messer
17 May 202108:51

Summary

TLDRThis script discusses phishing attacks, where scammers impersonate trusted entities to deceive users into revealing personal information. It covers various tactics like spoofing, typosquatting, pretexting, and the dangers of pharming and vishing. The importance of verifying links and being vigilant against spear phishing, especially whaling attacks targeting high-profile individuals, is emphasized to protect against such scams.

Takeaways

  • 📧 Phishing is a type of cyber attack where emails are disguised to appear as they come from trusted sources like ISPs, banks, etc., to trick users into clicking malicious links.
  • 🔗 Attackers use social engineering and spoofing to create emails that mimic legitimate services, aiming to gather personal information.
  • 🔍 Despite the deceptive appearance, phishing emails often reveal themselves through incorrect URLs or minor discrepancies in web page design.
  • 🛡️ Users should verify any links in emails by typing the website address directly into the browser rather than clicking on provided links.
  • 🆎 Typosquatting is a URL hijacking technique where attackers use domain names with slight misspellings to deceive users.
  • 📞 Pretexting involves creating a false scenario to manipulate users into acting, often used in phishing emails to make them seem more legitimate.
  • 🌐 Pharming is a more extensive attack where the DNS server or website is compromised to redirect all users to a phishing site.
  • 📞 Vishing (voice phishing) and smishing (SMS phishing) are methods where attackers use phone calls or text messages to gather personal information.
  • 🐟 Whaling is a targeted phishing attack aimed at high-profile individuals, such as CEOs, who have access to sensitive information or large sums of money.
  • 🔎 Attackers often conduct reconnaissance to gather detailed information about their targets, making phishing attacks more convincing and dangerous.

Q & A

  • What is phishing and how does it work?

    -Phishing is a type of cyber attack where attackers send emails that appear to be from legitimate entities like internet service providers, banks, etc., to trick recipients into clicking on a link that leads to a fake website designed to gather personal information. The goal is to obtain sensitive data such as login credentials or financial information.

  • How can you identify a phishing email?

    -Phishing emails can often be identified by inconsistencies in the sender's address, poor grammar or spelling, and a sense of urgency to act. The email may also contain a link that leads to a website that looks similar to a legitimate one but has minor discrepancies, such as incorrect logos or misspelled URLs.

  • Why can't attackers make the address bar show the actual URL of the service provider in a phishing attempt?

    -Attackers cannot manipulate the address bar to show the actual URL of a service provider because it is a secure feature of web browsers designed to prevent URL spoofing. The address bar displays the true location of the website, which can help users identify phishing attempts.

  • What is the difference between phishing and pharming?

    -Phishing requires the user to click on a malicious link, whereas pharming involves the attacker taking control of a domain name system server or website to redirect all visitors to a fake site without the need for them to click on anything. Pharming is a more passive attack that affects all users who access the compromised server or site.

  • What is typosquatting and how is it used in phishing attacks?

    -Typosquatting is a type of URL hijacking where a domain name is registered with a slight misspelling of a popular or well-known domain, intending to trick users into typing the wrong address and landing on the attacker's site. This can be used in phishing to create a sense of legitimacy and gather personal information.

  • What is pretexting and how is it related to phishing?

    -Pretexting is a social engineering technique where attackers create a fabricated scenario to manipulate individuals into performing certain actions, such as clicking a link or providing personal information. It is related to phishing as it often provides the narrative or context that makes the phishing email seem believable.

  • How can vishing, smishing, and spear phishing be categorized under phishing attacks?

    -Vishing (voice phishing), smishing (SMS phishing), and spear phishing are all variations of phishing attacks that use different communication channels. Vishing uses phone calls, smishing uses text messages, and spear phishing targets specific individuals or groups with highly personalized emails to gather information or money.

  • What is whaling in the context of phishing attacks?

    -Whaling is a targeted phishing attack aimed at high-profile individuals, such as CEOs or CFOs, who have access to sensitive information or large sums of money. The goal is to deceive these individuals into performing actions that benefit the attacker, such as transferring funds.

  • How can attackers gather information about their targets before launching a phishing attack?

    -Attackers can gather information about their targets through open-source intelligence (OSINT) techniques, which involve searching for and analyzing publicly available data on the internet. This can include social media profiles, professional networking sites like LinkedIn, and other third-party websites that contain personal or professional information.

  • Why is it recommended not to click on links in emails and instead type the website address directly into the browser?

    -It is recommended to avoid clicking on links in emails to prevent falling for phishing attempts. Typing the website address directly into the browser allows users to verify the URL and ensure they are visiting the legitimate site, reducing the risk of landing on a phishing page.

  • How can users protect themselves against phishing attacks?

    -Users can protect themselves against phishing attacks by being vigilant, verifying the sender's email address, not clicking on suspicious links, using two-factor authentication, and keeping their software and security tools up to date. Additionally, they should be cautious about sharing personal information and use secure and private networks.

Outlines

00:00

🐟 Phishing and Social Engineering Tactics

This paragraph discusses the prevalence of phishing emails disguised as legitimate communications from service providers or banks to trick users into revealing personal information. It explains how these scams often involve social engineering and spoofing to mimic trusted websites, but the URL in the address bar can reveal their true identity. The importance of validating email links and manually entering website URLs is emphasized to avoid falling for such scams. The paragraph also covers the use of typosquatting and pretexting in phishing attempts, as well as the dangers of pharming, where attackers redirect users to fraudulent sites by compromising DNS servers.

05:01

📞 Advanced Phishing Techniques: Vishing, Smishing, and Spear Phishing

The second paragraph delves into more sophisticated phishing methods, such as vishing, where attackers use the telephone to spoof numbers and gather personal information, and smishing, which is phishing conducted via SMS messages. It highlights the difficulty in detecting these scams, even for antivirus software. The paragraph also touches on spear phishing, which targets specific individuals or groups with tailored messages based on gathered intelligence, and whaling, a type of spear phishing aimed at high-value targets like CEOs or finance department heads to gain access to significant financial resources.

Mindmap

Keywords

💡Phishing

Phishing is a fraudulent activity where attackers pose as trustworthy entities in an attempt to obtain sensitive information such as usernames, passwords, and credit card details. In the video's context, phishing is exemplified by emails that appear to be from legitimate services like internet providers or banks, but are actually designed to trick users into clicking malicious links or providing personal information. The script mentions that these emails often use social engineering and spoofing to deceive the recipient.

💡Social Engineering

Social engineering is a technique used by attackers to manipulate individuals into divulging confidential information or performing actions that compromise security. The video script describes how phishing emails use social engineering by pretending to be from known service providers to gain the trust of the recipient, making them more likely to click on a link or provide personal information.

💡Spoofing

Spoofing refers to the act of disguising a communication from an unknown source as being from a known, trusted source. In the script, spoofing is discussed in the context of emails that appear to come from legitimate companies but are actually fraudulent, aiming to deceive the user into interacting with a fake website that mimics the real one.

💡URL

A URL, or Uniform Resource Locator, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. The video script emphasizes the importance of checking the URL in the address bar of a browser to ensure it matches the legitimate website of the service provider, as attackers cannot spoof the actual URL.

💡Typosquatting

Typosquatting is a form of URL hijacking where a domain name is registered with a similar spelling to that of a well-known website, with the intention of misleading users into visiting a fake site. The script provides an example of 'professormessor.com' as a typosquatted version of a legitimate domain, where the misspelling is subtle enough to trick users.

💡Pretexting

Pretexting is a technique where a scammer creates a false narrative or scenario to manipulate someone into taking a particular action, often to provide personal information. The video script mentions pretexting in the context of emails or calls that create a fabricated situation to trick the recipient into acting on it, such as providing payment details.

💡Pharming

Pharming is an attack that redirects a user to a fraudulent website even if they have entered the correct URL. This is done by manipulating the DNS server or website itself. The script describes pharming as a method where an entire group of people can be simultaneously directed to an attacker's website, making it difficult for users to realize they are being targeted.

💡Vishing

Vishing, a portmanteau of 'voice' and 'phishing,' is the practice of using phone calls to carry out phishing attacks. The script explains that attackers may spoof phone numbers to appear as local or legitimate, with the goal of tricking the recipient into providing personal information over the call.

💡Smishing

Smishing is a type of phishing attack conducted through SMS or text messages. The video script describes smishing as a method where attackers send text messages with enticing links, hoping that the recipient will click on them and provide personal information, similar to email phishing but through a different communication channel.

💡Spear Phishing

Spear phishing is a targeted form of phishing where the attacker crafts a message that is personalized to the target, often using information gathered through open-source intelligence. The script mentions spear phishing as a method where attackers go after specific individuals or groups, using detailed information to create a believable pretext for their attack.

💡Whaling

Whaling is a type of spear phishing attack that targets high-profile individuals, such as CEOs or executives, who have access to sensitive information or large sums of money. The script refers to whaling as an attack where the goal is to gain access to corporate bank accounts or other valuable assets by convincing a high-level executive to engage with a fake user account.

Highlights

Phishing emails often pretend to be from trusted institutions to gather personal information.

Social engineering and spoofing are common tactics used in phishing attacks.

Phishing emails use links that lead to fake pages resembling the legitimate site.

Attackers cannot replicate the actual URL in the address bar of a spoofed site.

Visual discrepancies in graphics can indicate a phishing page.

Always validate links in emails to avoid falling for phishing scams.

Typing a website's URL directly into the browser is safer than clicking email links.

Pharming is a type of attack where the DNS server redirects users to a fake site.

Pharming can make a legitimate-looking site appear through poisoned DNS.

Vishing, or voice phishing, uses telephone calls to trick users into revealing information.

SMS phishing, or smishing, uses text messages to lure users into clicking malicious links.

Attackers use reconnaissance to gather personal information for targeted spear phishing.

Whaling is a phishing attack aimed at high-profile individuals with access to significant resources.

Pretexting involves creating a believable scenario to deceive users into acting.

Typosquatting is a URL hijacking technique that uses similar domain names to trick users.

Attackers may prepend text to a URL to create a convincing but fake address.

Third-party security products may not always recognize phishing or pharming attacks.

The subreddit r/Scams is a resource for learning about various scam tactics.

Transcripts

play00:02

If I look into my spam folder right now,

play00:04

I bet I could find a number of emails that are pretending

play00:07

to be from my internet service provider, my cable

play00:10

company, my bank, and many places that are not

play00:14

who they say they are.

play00:16

This is called phishing.

play00:17

They're trying to get me to click

play00:18

a link so they can gather some type of personal information

play00:22

from me.

play00:22

This is generally a bit of social engineering combined

play00:25

with spoofing.

play00:26

So the email is going to pretend to be

play00:28

from my email provider or my internet service provider,

play00:32

but when I click the link, it's going

play00:33

to bring up a page that looks almost exactly like the one

play00:37

that I would receive if I was at my actual internet service

play00:40

provider's website.

play00:42

The one thing that the attacker can't

play00:44

do though is make the address bar

play00:46

show the actual URL of your internet service provider.

play00:50

It's very often looking into your browser,

play00:52

you can see that this really did not come from the Rackspace

play00:56

website because the URL will not show Rackspace.com at the top.

play01:01

And usually there's something that

play01:02

is not quite right with the screen that's being presented.

play01:06

In this example, it's trying to get

play01:07

me to log in to my Rackspace email service,

play01:10

and you could see, it does look like a legitimate login page.

play01:13

Although you'll notice, they didn't quite

play01:16

get the graphics right on the page.

play01:18

There's usually something about the page that isn't quite right

play01:22

or doesn't ring true.

play01:23

But you do have to make sure and validate any link

play01:27

that you see in an email.

play01:28

That's why we often say, never click a link in an email.

play01:32

You should instead type in the website

play01:34

directly in the bar of the browser.

play01:37

Here's a comparison of the actual Rackspace Webmail login

play01:41

page and the one that I received on the left side

play01:43

when I was phished to the Webmail login page.

play01:47

If you weren't paying attention, you

play01:49

might think that this is absolutely a legitimate page

play01:52

and you could type in your email address and your password,

play01:55

and when you click that Login button,

play01:57

you've now sent your credentials directly

play01:59

to the phishing attacker.

play02:02

The attackers try to use many different tricks

play02:04

to get us to click these links and input

play02:06

our personal information into these pages

play02:09

and making the pages look very common and similar to what

play02:12

we would expect is only one of the things that they do.

play02:15

They also try to present to us a domain name in the address bar

play02:19

that looks very similar to what we are expecting.

play02:22

For example, you might find a bad guy

play02:24

using typosquatting, which is a type of URL hijacking.

play02:28

For example, professormessor.com almost looks like

play02:32

it's legitimate, except my last name is spelled M-E-S-S-E-R.

play02:36

This one is spelled M-E-S-S-O-R. But if the bad guy wanted

play02:39

to use that particular domain name and then have a website

play02:43

that looked exactly like mine, they might be able to fool

play02:46

a few people into typing in their email address

play02:49

and their password.

play02:50

Another example of something they might do

play02:52

is to prepend to the address, which

play02:54

means they add onto the beginning,

play02:56

and you could see pprofessormesser.com.

play02:58

It's all spelled correctly except for the additional text

play03:01

at the beginning.

play03:02

And if you aren't looking closely,

play03:03

you might not even realize that text is there.

play03:07

Very commonly, these messages have some type

play03:10

of pretexting, which is a fancy way of saying that they're

play03:12

going to lie to you.

play03:14

They put some type of situation in place,

play03:16

and they try to see if they can get you to act on it.

play03:19

For example, they may have a message that they're

play03:21

calling with or an email that says, hi, we're

play03:23

calling from Visa regarding an automated payment

play03:26

to your utility service.

play03:28

And then they might have click on something or offer

play03:31

to provide that particular payment over the phone.

play03:34

Well, I definitely have an automated payment.

play03:36

I do pay my utility service automatically,

play03:39

and this might get me relaxed enough to think

play03:41

that the person who's calling me really is from Visa,

play03:44

and they really are trying to take

play03:46

care of a financial problem.

play03:48

But of course, this is an attacker

play03:50

who's trying to gather my credit card information,

play03:52

and I would simply be handing over

play03:54

all of the details of that account

play03:56

to whoever happened to be calling.

play03:59

Of course, we often see these emails

play04:00

being sent to individuals, and the attackers

play04:03

are trying to gather this information one

play04:05

person at a time until they have all

play04:07

of the information they need.

play04:09

But there are times when the attacker

play04:10

might want to attack an entire group of people simultaneously.

play04:14

This is called pharming, and it's usually

play04:16

created when the attacker is able to take over

play04:18

an entire domain name system server

play04:20

or be able to take over an entire website

play04:23

so that everybody who visited the DNS server

play04:26

or visited the website will be automatically directed

play04:29

to the attacker's website.

play04:31

This means that you could be typing

play04:33

in the correct address in your browser,

play04:35

but because the DNS has been poisoned,

play04:37

now you're at the attacker's website,

play04:39

and you would simply put in your user credentials,

play04:41

because to you, it looks like the normal website.

play04:45

So now there are two different kinds of attacks in place.

play04:47

The pharming is redirecting everybody

play04:49

who visits that DNS server to the attacker's website,

play04:52

and then the phishing takes place

play04:54

once they arrive there, as they're

play04:55

putting in their email address, username, password,

play04:58

and other personal information.

play05:01

In this particular scenario, it's

play05:02

very difficult for the end user to even realize

play05:05

they're being phished.

play05:06

They've gone to what they thought was a legitimate DNS,

play05:10

and they were able to go to a website that looks

play05:12

like the legitimate website.

play05:14

So of course, they're going to provide

play05:15

their normal credentials.

play05:17

And because everything looks normal,

play05:19

it's even difficult for third party products,

play05:21

like anti-malware or antivirus, to even recognize

play05:25

that there's any type of problem happening at all.

play05:27

These types of pharming situations

play05:29

are thankfully relatively rare, but they do occur,

play05:32

and it's something that you need to know

play05:33

how to mitigate if you happen to find

play05:35

this situation on your network.

play05:38

The attackers have moved to the telephone as a way

play05:40

to gather your personal information.

play05:42

Performing this attack over a voice line

play05:45

is called vishing, for voice phishing.

play05:48

Very often, the attacker is spoofing the phone number

play05:50

that's appearing on the incoming call

play05:53

so it looks like it's a local phone number.

play05:55

But in reality, they could be calling from anywhere.

play05:58

The point of the phone call or the voicemail that they leave

play06:01

ultimately leads to you giving up

play06:03

some type of personal information

play06:05

that they can use to gain access to your accounts.

play06:08

Of course, they may not even need to talk to you.

play06:10

They can do everything over SMS--

play06:12

that's the Short Message Service, or what we commonly

play06:15

refer to as text messages.

play06:17

This is also referred to as smishing or SMS phishing,

play06:22

where this phishing is all done over a text message

play06:25

communication.

play06:26

Often these text messages have a link,

play06:29

and the attacker tries to entice you into clicking that link

play06:32

and providing them with more information.

play06:34

There are many, many different ways

play06:36

that attackers try to entice you to give up

play06:39

your information or your money.

play06:41

Many of these scams can be found in a large list on Reddit.

play06:45

You can find it at reddit.com/r/Scams.

play06:49

With some of these attacks, the attacker

play06:51

isn't after an email password.

play06:53

They're instead trying to get large sums of money transferred

play06:57

into their personal account.

play06:59

To be able to do that, they need to gather as much information

play07:02

as possible on the victim.

play07:04

So they'll perform a number of different steps

play07:06

of reconnaissance prior to performing the actual phishing

play07:10

attack.

play07:11

It's remarkable how much open source information

play07:14

is available on the internet, and you

play07:16

can gather information about individuals,

play07:18

groups of individuals, or large organizations

play07:21

by simply visiting third party websites, Facebook, LinkedIn,

play07:25

and other locations.

play07:27

Based on the information they gather,

play07:28

they can create a very believable pretext.

play07:31

They might be able to determine where you live, where you work,

play07:34

who you work with, be able to use people's names,

play07:37

be able to understand places that you shop,

play07:39

and put all of that information into a very believable phishing

play07:43

attack.

play07:44

These types of very directed phishing attacks

play07:47

are called spear phishing attacks.

play07:50

They're going after a very specific person

play07:52

or very specific group of people to be

play07:55

able to gather the information that they need.

play07:58

A spear phishing attack that goes

play07:59

after a person who has control of a lot of money

play08:02

or a lot of information is called whaling.

play08:05

It's very common to go after the CEO or the head

play08:08

of the accounting department because they have access

play08:10

to the entire corporate bank account.

play08:13

All you need is one very well-crafted

play08:15

phishing attack to be able to convince somebody

play08:18

to log into a fake user account that would then provide

play08:22

the attacker with all of the banking

play08:24

information for the organization.

play08:26

These types of whaling attacks happen all too often.

play08:30

And if you're in an organization that

play08:31

has people who are in charge of these particular accounts,

play08:35

then you need to make sure that they

play08:36

are very familiar with the type of phishing attacks

play08:39

that they might run into.

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
Phishing AwarenessEmail ScamsSpoofing TacticsCybersecurityPersonal InfoSecure BrowsingSpear PhishingWhaling AttacksTyposquattingVishing Smishing
هل تحتاج إلى تلخيص باللغة الإنجليزية؟