Phishing - CompTIA Security+ SY0-701 - 2.2

Professor Messer
6 Nov 202306:31

Summary

TLDRThe script delves into the deceptive world of phishing, a form of social engineering that tricks individuals into revealing sensitive information through seemingly legitimate emails, texts, or other communication channels. It highlights common tactics such as typosquatting and pretexting, and warns of the dangers of falling for these scams, including account takeover and malware infections. The speaker advises on best practices like scrutinizing email senders and links, and cautions against clicking on suspicious links. The importance of recognizing and avoiding phishing attempts is emphasized to protect personal and financial information.

Takeaways

  • 🔒 Phishing is a form of social engineering that tricks people into thinking a communication is genuine to obtain private information.
  • 📧 Phishing attacks are commonly delivered through emails, text messages, and other communication methods.
  • 🔎 It's important to verify the links in messages to check if they lead to a well-known and trusted site.
  • ⚠️ Phishing messages often contain errors, such as incorrect spacing and fonts, which can be a red flag.
  • 📬 Be cautious of emails with deadlines and prompts to click on links, as they may be phishing attempts.
  • 🤔 Always check the sender's email address for authenticity and consistency with the company they claim to represent.
  • 🚫 Avoid clicking links within emails as a best practice to prevent falling for phishing scams.
  • 🕵️‍♂️ If an email looks suspicious, conduct further research before interacting with any links or providing personal information.
  • 📲 Smishing is phishing via text messages, such as SMS, and should be treated with the same caution as email phishing.
  • 📞 Vishing, or voice phishing, involves scammers pretending to be from a trusted organization over the phone to extract sensitive information.
  • 💡 Awareness of various phishing techniques and scams can help protect you and others from falling victim to these fraudulent practices.

Q & A

  • What is phishing?

    -Phishing is a form of social engineering that uses various communication methods to deceive recipients into believing that a fraudulent communication is legitimate, with the goal of obtaining sensitive information such as usernames, passwords, and personal details.

  • How is phishing typically delivered?

    -Phishing is commonly delivered through emails, text messages, or other communication channels, often appearing to come from a trusted source to trick recipients into revealing private information.

  • How can one verify the authenticity of links in suspicious messages?

    -One can check the destination of the links to see if they point to well-known and trusted sites. If the link leads to an unexpected or suspicious location, it may be part of a phishing attempt.

  • What are some visual cues that might indicate a phishing attempt in an email?

    -Visual cues can include unusual spacing, incorrect fonts, and poor design quality that may suggest the email is not from the purported legitimate source.

  • What is an example of a phishing email mentioned in the script?

    -An example given is an email pretending to be from Rackspace, with issues like incorrect spacing and fonts, and directing users to a login page that looks similar but has subtle differences from the actual Rackspace login page.

  • Why might an attacker use an email address associated with a different service in a phishing attempt?

    -Using an email address from a different service can create confusion and make the phishing attempt seem more legitimate, as recipients may not immediately notice the inconsistency.

  • What is the purpose of the 'Confirm Email Now' link in a phishing email?

    -The 'Confirm Email Now' link is a tactic used to create a sense of urgency and prompt the recipient to click on it, potentially leading them to a fraudulent site designed to steal their login credentials.

  • What is typosquatting and how is it related to phishing?

    -Typosquatting is the practice of registering domain names that are similar to well-known ones but contain minor misspellings or variations. Attackers use this to trick users into visiting fake websites, which can be part of a phishing scam.

  • What is pretexting and how does it relate to phishing?

    -Pretexting is a form of deception where attackers create a false narrative or scenario to manipulate recipients into taking an action, such as clicking a link or providing personal information, which is a common tactic used in phishing.

  • What is smishing and how does it differ from traditional phishing?

    -Smishing is a type of phishing attack that is delivered via SMS text messages rather than emails. It uses the same principles of deception to trick recipients into revealing sensitive information or clicking on malicious links.

  • Why is it important to be aware of different phishing techniques and scams?

    -Being aware of phishing techniques and scams is crucial for personal security and to help protect others from falling victim to these fraudulent practices. Knowledge enables individuals to recognize and avoid potential threats.

Outlines

00:00

🎯 Phishing and Social Engineering Techniques

This paragraph discusses phishing, a form of social engineering that tricks individuals into revealing sensitive information through deceptive communication methods like emails or text messages. The paragraph highlights how attackers use fake emails, often with subtle signs like incorrect spacing or fonts, to lead victims to counterfeit websites that mimic legitimate ones, like a Rackspace login page. It also touches on the importance of scrutinizing the sender's email address and being cautious of deadlines and prompts to click links within emails. The speaker demonstrates the dangers by clicking on a suspicious link, which leads to a fake login page designed to steal usernames and passwords. The paragraph concludes with a warning about the broader implications of falling for phishing scams, such as malware infections and unauthorized access to personal accounts.

05:01

📞 Vishing, Smishing, and the Dangers of Phishing Scams

The second paragraph delves into different types of phishing attacks, including vishing, where attackers spoof caller IDs to impersonate bank representatives or other trusted entities, and smishing, which involves sending phishing text messages, like fake notifications from USPS about a package delivery issue. The paragraph underscores the importance of being aware of various scams and phishing techniques to protect oneself and potentially help others avoid falling victim to such schemes. It also mentions other common scams, such as fake check scams and phone verification code scams, emphasizing the need for vigilance and education to counteract these fraudulent practices.

Mindmap

Keywords

💡Phishing

Phishing is a fraudulent activity where attackers attempt to acquire sensitive information such as usernames, passwords, and credit card details by disguising themselves as a trustworthy entity. In the video, it is the central theme, as it describes how attackers use various communication methods to deceive individuals into giving up private information. The script provides an example of a phishing attempt through an email pretending to be from Rackspace, a webmail service.

💡Social Engineering

Social engineering is the practice of manipulating individuals into divulging confidential information or performing certain actions. It is related to phishing in the video as it is a method used to trick people into believing that the communication is coming from a legitimate source. The video script explains that phishing is a form of social engineering that uses deception to make people think something is real when it is not.

💡Communication Methods

Communication methods in the context of the video refer to the various ways through which phishing attacks are conducted, such as email, text messages, or other messaging platforms. The script mentions that phishing is usually delivered by these methods to trick recipients into providing private information, as illustrated by the example of an email claiming to be from Rackspace.

💡Private Information

Private information in the video script refers to personal details that are typically kept secure, such as usernames, passwords, and personal data. The video emphasizes the importance of protecting this information, as phishing attacks often aim to extract it from unsuspecting individuals, as shown in the example where the attacker tries to get the user's email credentials.

💡Links

Links in the video are used to direct users to websites, which may appear legitimate but are actually part of a phishing scam. The script advises checking the links in messages to verify if they lead to well-known and trusted sites, highlighting the importance of scrutinizing links before clicking on them to avoid falling for phishing attempts.

💡Typosquatting

Typosquatting, as mentioned in the video, is a deceptive practice where a domain name is registered in order to benefit from typographical errors made by internet users. The video script uses the example of 'professormessor.com' instead of 'professormesser.com' to illustrate how attackers may use similar-looking domain names to trick users into visiting fake websites.

💡Pretexting

Pretexting is a form of social engineering where a scammer creates a false narrative to persuade the target to take an action or provide information. The video script describes pretexting as a technique used by attackers to lie and create a story, such as pretending to be from a bank or a service provider, to manipulate the user into revealing sensitive information.

💡Vishing

Vishing, a term derived from 'voice phishing', is the practice of using the telephone to carry out phishing attacks. The video script categorizes over-the-phone communication that attempts to extract sensitive information as vishing, providing an example of a fake call from 'Visa' to illustrate how attackers may spoof caller IDs to deceive users.

💡Smishing

Smishing is a type of phishing attack conducted through SMS text messages. The video script refers to smishing as a method where attackers send text messages, such as one claiming to be from USPS about a package delivery issue, with the goal of tricking recipients into clicking on malicious links and revealing their login credentials.

💡Scams

Scams in the video script refer to fraudulent schemes designed to deceive individuals into giving away money or sensitive information. The script mentions various types of scams, such as the fake check scam and phone verification code scam, emphasizing the importance of being aware of these tactics to protect oneself from falling victim to them.

Highlights

Phishing is a form of social engineering that tricks people into revealing private information.

Phishing attacks are often delivered through email, text messages, or other communication channels.

Victims are persuaded to give up sensitive information like usernames, passwords, or personal details.

Phishing messages can be identified by checking links against well-known and trusted sites.

Phishing emails may have inconsistencies like incorrect spacing and fonts, as seen in the Rackspace example.

The sender's email address can be a clue; it may not match the company's domain, as in the icloud.com vs. Rackspace example.

It's best practice never to click links within emails, to avoid potential phishing scams.

Phishing pages often mimic legitimate sites but have subtle differences, like the Rackspace login page example.

Email sources are trusted, making people more likely to click on links within them, leading to security risks.

Email addresses in phishing attempts may be spoofed or closely resemble the company's actual email.

Attackers can gain access to your email, potentially sending emails from your account or accessing sensitive information.

Attackers may use reset password features to gain access to accounts, as demonstrated with the PayPal example.

Clicking on phishing links can lead to websites that download malware and infect your system.

Typosquatting is a phishing technique where attackers use domain names similar to legitimate ones to deceive users.

Pretexting involves attackers making up stories to trick users into clicking links or revealing information.

Vishing, or voice phishing, is when attackers spoof caller IDs to impersonate bank officials or service providers.

Smishing is phishing via text messages, such as the USPS package delivery scam example.

There are numerous other scams like the fake check scam and phone verification code scam.

Becoming familiar with phishing techniques can help protect you and others from falling victim to scams.

Transcripts

play00:01

Phishing is a term we use to describe social engineering

play00:05

that uses a number of different communications methods to make

play00:09

you think that something is real, when in fact,

play00:12

it really isn't.

play00:13

This is usually delivered by mail, text message,

play00:16

or some other communication method

play00:18

in order to have you give up information

play00:20

that normally would be private.

play00:22

This might be a username and password

play00:24

you use to log into a service or it

play00:26

may be some private information about yourself.

play00:28

We can usually check the links in these messages

play00:31

to see if they're pointing towards a well-known and

play00:34

well-trusted site, but if it's a phishing message,

play00:37

it probably is going to a different location

play00:39

than what you would normally expect.

play00:41

And very often there's something not quite right

play00:44

with the information that's being provided.

play00:46

For example, this is the web mail login to Rackspace,

play00:49

or at least it's pretending to be that.

play00:51

You can see that it tends to have a problem with the spacing

play00:54

and some of the fonts inside of this message, which

play00:57

might lead us to believe that this is not really

play01:00

the Rackspace login page.

play01:02

I got to that page by following this email that

play01:05

was inside my spam folder.

play01:07

And it says, "dear user, we notice

play01:08

your email has not been confirmed for the new upgraded

play01:11

service."

play01:12

Well, I certainly want the upgraded service.

play01:14

It says, "I will be blocked from sending and receiving

play01:16

emails if not confirmed."

play01:18

So now they're giving us a deadline

play01:20

on when we need to click this link,

play01:22

and we can simply click the Confirm Email Now.

play01:25

If you look closely at the sender of this message,

play01:28

it's associated with an icloud.com address,

play01:31

which is an Apple service.

play01:33

This is obviously a message for someone

play01:35

who has email on a Rackspace service.

play01:38

This means the information contained in this message

play01:40

doesn't quite ring true and we might

play01:42

want to do a little bit of extra research

play01:44

before clicking any of these links.

play01:46

As a good best practice, in fact, you

play01:48

would never click a link that's inside of your email,

play01:51

but for the purposes of showing you what can really happen,

play01:53

I went ahead and clicked the link

play01:55

that said Confirm Email Now.

play01:57

It brought me then to a Rackspace login page,

play02:00

and it almost looks like a real Rackspace page.

play02:04

There are a few things that are a little bit different.

play02:06

If we put these side by side, you

play02:08

can see that the phishing email took me to the image

play02:11

that you see on the top, but the actual Rackspace login page

play02:15

is the one on the bottom.

play02:16

It's interesting that they added the same suspicious email image

play02:21

to try to make you think that you really

play02:23

were logging in to a legitimate Rackspace page.

play02:27

In that previous example, the attacker

play02:29

was trying to get us to give up our username and password

play02:32

into that email service.

play02:34

And that's what these email messages are trying to do

play02:37

is convince you that they are someone else

play02:39

and convince you to give up some of your information.

play02:42

We tend to trust email sources, and because of that,

play02:45

we tend to click on links that are inside of the email.

play02:48

But obviously, this can run into some significant security

play02:52

problems.

play02:52

As we noticed with the message that was in my Spam folder,

play02:55

the email addresses that were used as the sender were

play02:59

not quite what we expected.

play03:01

In some cases, they might spoof an actual email address

play03:04

from that company or they'll use an address

play03:07

that's very close to the email of that company.

play03:10

For example, if you receive an email that says it's from

play03:12

[email protected] you might say that looks like

play03:17

the same domain name, but in reality,

play03:20

my last name is spelled M-E-S-S-E-R .com.

play03:24

And that's how you would know that this particular address

play03:27

probably wasn't sent by Professor Messer.

play03:30

Someone gaining access to my email

play03:32

could certainly allow them to send other emails

play03:34

from my account or they could look through the emails that

play03:37

are already in my account to see if there's

play03:39

some financial information or logins that they could use.

play03:43

For instance, they could go to PayPal.

play03:45

They could use the reset password feature.

play03:48

It's sent back to my email, which

play03:50

now the attacker has access to.

play03:52

Or they may just be trying to have you click that link,

play03:55

and if you click that link, it takes you to a website

play03:58

that downloads malware and infects your system.

play04:01

The attackers use a number of different ways

play04:04

to trick and misdirect you into clicking the links

play04:07

or believing that what you've received

play04:09

is from a legitimate source.

play04:11

This might be something like typosquatting.

play04:13

If you look at the destination for the link they've provided,

play04:17

you might see that the destination is

play04:19

professormessor.com, and we've already

play04:21

seen that is not a legitimate, fully qualified domain

play04:24

name, which normally would be professormesser.com.

play04:28

We refer to this type of misdirection or hijacking

play04:31

as typosquatting.

play04:33

But what the attackers are really good at

play04:35

is outright lying.

play04:37

We refer to this as pretexting.

play04:39

They're going to make up a story and drag you

play04:41

into this particular drama in the hopes

play04:44

that you'll click a link or login to a site

play04:46

and they can gain access to your username and password.

play04:50

Or maybe they call you on the phone and say, "hi,

play04:52

we're from Visa, and this is about an automated payment

play04:55

to your electrical services.

play04:56

It didn't go through.

play04:58

So you'll need to give me those details over the phone."

play05:00

In reality, of course, they're not from Visa,

play05:03

there's not any problem with your automated payments,

play05:05

but they're trying to gain access to your credit card

play05:08

information.

play05:09

We even categorize that type of over-the-phone communication

play05:13

as vishing, or voice phishing, where

play05:16

someone will spoof a caller ID, say

play05:19

that they're from your bank, and then

play05:20

get you to give up information about your account

play05:23

details, your login, and other private information.

play05:26

If you have a mobile phone, you've

play05:28

probably seen this type of phishing

play05:29

delivered as a text message.

play05:31

We refer to this type of phishing as smishing, which

play05:35

is a reference to SMS, or the Short Message

play05:38

Service, which is the formal name for this text messaging.

play05:41

I get text messages like this one all the time.

play05:44

This one says it's from USPS, and it

play05:46

says that I have a package that needs to be delivered,

play05:49

but it's been suspended due to an incorrect delivery address.

play05:52

And they're hoping that you click that link

play05:54

to be able to log into your account, and at that point,

play05:58

they have your username and password.

play06:00

And of course, there are many, many, many, many other scams

play06:03

that they can go through.

play06:04

There's the fake check scam, the phone verification code scam,

play06:08

and many others.

play06:09

I would highly recommend you become

play06:11

familiar with these types of scams and phishing techniques.

play06:15

You may be the person that's able to stop your friends

play06:17

or family from falling victim to one of these scams.

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Phishing AwarenessCybersecurityEmail ScamsOnline SafetySocial EngineeringFraud PreventionSecure MessagingIdentity TheftScam TacticsProtection Tips
Benötigen Sie eine Zusammenfassung auf Englisch?