Top Banner
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly
16

Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

Hey check out this cool PHISHING presentation!

Benjamin Ross Lyerly

Page 2: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

PHISHING: A BRIEF HISTORYWORD ORIGIN (1996) from the hacking community to describe the act of fishing for account info with emails as lure.

Page 3: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

•Can be done on paper or phone, but much more successful on the net•AOL in the mid 90s experienced the most phishing issues since it was a pay to use •Phishers would lure AOL users to give username and password information which was termed “phish”•Phishers could then trade these as currency for warez, serials, or phish they wanted

Page 4: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

WHAT’S AOL?

• After AOL phishing continued but grew out of just USERNAME and PASSWORD

• Now any personal information is valuable• Current phishers are looking for credit card numbers, social

security numbers, date of births, and they even want to know your mother’s maiden name

Page 5: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

NOT JUST E-MAIL AND IM

• A better target than ignorant surfers is desperate surfers

• The same trick in a new way, phishers now fill the job sites, credit scores, prize giveaways, and many other get rich schemes

Page 6: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

THE PRESENT

• False apps are being put on DROID and IPHONE online stores

• Most common are banking applications that send your information to its creator

• Others pose as bookstores, pizza ordering, anything that you place your card number in

• Some have malicious code that will trawl your phone for contacts’ information

Page 7: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

PHAMOUS PHISHING ATTACKS

Page 8: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

• had to reset passwords to thousands of accounts after emails were sent out to users with a link to change their passwords at http://twitter.access-logins.com/login

• These kinds of attacks are bulk e-mails in which the phisher sends out at random hoping to pick up people who just don’t know better

Page 9: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

•User database was hacked and e-mail addresses were stolen for 6.3 million customers at TD AMERITRADE•These specific addresses were the victims of SPEAR PHISHING attacks

Page 10: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

• Many CEOs were sent phishing e-mails to disguised as subpoenas that directed them to a site that appears to be on a government site. They were then told to update their adobe acrobat, and upon doing so they were given a malicious trojan that spied on everything they did

Page 11: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

SOME EXAMPLES

Page 12: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Page 13: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Page 14: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

HOW TO PROTECT YOURSELF

• Financial sites will never ask you to confirm your identity through an email

• Never click hyperlinks through an email or im• Keep your browsers and antivirus updated• If you suspect you’ve been scammed alert your

credit companies immediately and change all of your passwords

• Smart phones have begun installing malware as of this year

Page 15: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Page 16: Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.

• http://www.allspammedup.com/2010/01/phishing-and-malware-in-the-smart-phone-era/

• http://www.cnn.com/2010/TECH/02/02/twitter.phishing/?hpt=T2

• http://isc.sans.org/diary.html?storyid=4289• http://

blogs.pcmag.com/securitywatch/2008/04/whale_phishing.php

• http://www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html

• http://www.articlesbase.com/home-and-family-articles/what-you-should-know-about-internet-phishing-1039201.html

• http://www.fraud.org/tips/internet/phishing.htm