Sunteți pe pagina 1din 5

(IJCNS) International Journal of Computer and Network Security, 59

Vol. 2, No. 10, 2010

Protecting Consumers from the Menace of Phishing


Vivian Ogochukwu Nwaocha

National Open University of Nigeria, School of Science and Technology,


Victoria Island, Lagos
webdevee@yahoo.com

Abstract: The number and sophistication of phishing scams or fraud. Users are tricked into disclosing their information
sent out to consumers is continuing to swell drastically. Banks, either by providing it through a web form or by
Vendors, and a number of organizations who provide their downloading and installing hostile software. Once this is
services online have had several incidents where their clients done, the attackers have the information they want, which
have been swindled by phishers. The internet industry is starting puts the ball squarely in their court. This has been a very
to take the threat very seriously seeing the exploding trend of
successful avenue for attackers in the past. They have been
attacks and the tendency for the phish hits to afflict the big
able to harvest various users’ personal information with
industries. Today, both the spam and phishing enterprises are
blooming. These fraudsters send spam or pop-up messages to ease. As a whole, the Internet is unsecure because many of
lure personal and financial information from unsuspecting the constituent networks are unsecure. [5]
victims. The hostile party then uses this information for The first major phishing attempt was made in 1995 against
criminal purposes, such as identity theft and fraud. In spite of
AOL users (ASTALAVISTA, 2010). Back then, AOL just
the measures being taken by researchers, internet service
recently finished adapting measures that prevented using
providers and software vendors to curb this scam, phishing
scams have been on the rise as phishers continue to devise new fake credit card numbers to open new AOL accounts.
schemes to deceive consumers. In this paper, we present the Because of this Crackers resorted to the phishing to get real
different forms of phishing; highlighting specific phishing credit card numbers from authentic users to create their
features that would help consumers identify an imminent accounts. Phishers usually posed as AOL employees. These
phishing scam in order to avoid being phished. It is hoped that fake AOL employees contacted their victims using instant
promoting valuable consumer education would help protect messaging in an attempt to get them to reveal their credit
Internet users worldwide from becoming victims of phishing card details. [6]
scams. By providing their consumers with the tools, resources,
and guidance they need to protect themselves from these threats, Due to the fact that many phishers were successful in
industries and organizations would equally help reduce the obtaining credit card details from AOL customers, they
threat of phishing attacks.
realized that it might be profitable to attack online payment
institutions. Phishing has become a critical problem for
Keywords: consumers, emails, phishing, vishing, websites.
every major financial institution in the world. Nowadays,
phishers usually target people who deal with online payment
1. Introduction services and banks. Phishers now have the ability to target
Phishing attacks are rapidly increasing in frequency. specific customers of different financial institution. By
According to the Anti-Phishing Working Group (APWG), narrowing down the which bank service you are using,
[1] reports of phishing attacks increased by 180% in April phishers can then send targeted emails by posing as
2004 alone, and by 4,000% in the six months prior to April. employees from a specific financial institution. This makes
A recent study done by the antispam firm MailFrontier Inc. their data gathering attempts much more efficient and
found that phishing emails fooled users 28% of the time.[2] difficult to stop. This process is referred to as ‘spear
Estimates of losses resulting from phishing approached $37 phishing’. Some phishers have targeted VIPs and high-
million in 2002.[3] ranking executives in a practice that has been labeled as
The term phishing refers to the act of sending an e-mail to a ‘whaling’.
user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering With the advent of social networking sites such as Facebook
private information that will be used for identity theft. The and MySpace, phishers have now moved to new hunting
e-mail directs the user to visit a Web site where they are grounds. The details obtained from phishing on social
asked to update personal information, such as passwords networking sites are known to be used in identity theft.
and credit card, social security, and bank account numbers, Phishers prefer targeting social networking sites because the
that the legitimate organization already has. [4] success rate is often high. In fact, experts have estimated
A phishing attack is said to be successful when a user is that 70% of all phishing attacks in social networking sites
tricked into forming an inaccurate mental model of an are successful. This is because phishers use a fake login
online interaction and thus takes actions that have effects page to track social networkers to punch in their login
contrary to the user's intentions. The attacker can then use details. File sharing sites like Rapidshare and Megaupload
this information for criminal purposes, such as identity theft have also been targeted by phishing schemes. Phishers
60 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

attempt to obtain login details to various premium accounts • A fraudster initiates phishing by sending thousands,
to gain access to unlimited upload and download service even millions, of emails to different mail accounts
that are provided by the site. disguised as messages from a well-known
company. The typical phishing email will contain a
There is yet another form of phishing where the scammers concocted story designed to lure you into taking an
exploit the phone channel to ask for sensitive information, action such as clicking a link or button in the email
rather than sending e-mails and cloning trustworthy or calling a phone number. [10]
websites. In some sense, the traditional phone scams are • In the email, there will be links or buttons that take
streamlined by attackers using techniques that are typical of ignorant consumers to a fraudulent website.
modern, e-mail-based phishing. • The fraudulent website will also mimic the
appearance of a popular website or company. The
2. Related Work scam site will ask for personal information, such as
A number preventive and detective solutions for phishing credit card number, Social Security number, or
threats have been provided by MarkMonitor, Panda account password.
Security, VeriSign, Internet Identity, Cyveillance, RSA, • As soon as the user is tricked to take actions contrary
WebSense, etc. [7], most of them are based on detecting to his intention, phishing is said to be successful.
fraudulent emails and embedded URL, identifying and Thus, the user thinks he’s giving information to a
closing down the scam site, bombing phishing sites with
trusted company when, in fact, he’s supplying it to
dummy information (but apparently real) in order to confuse
a criminal.
the attacker making it difficult to distinguish real data from
dummy data. The use of digital certificates is also a solution
proposed as a countermeasure for phishing attacks. 4. Types of Phishing
However, investigations reveal that the use of digital 3.1 Email and Bogus Website Phishing
certificates for server authentication is not enough to The most common form of phishing is by email. In this
mitigate phishing threats. This is for many reasons, for mode of phishing, phishers pretending to be from a genuine
example many users do not pay enough attention to the financial institution, or a legitimate retailer or government
digital certificate details or many others do not have the agency, ask their targeted victim to “confirm” their personal
knowledge to perform a correct validation of the digital information for some made-up reason. Typically, the email
certificate [8, 9]. In addition the attacker could decide not to contains a link to a phony Web site that looks just like the
use encrypted traffic (HTTP instead of HTTPS). real thing – with sophisticated graphics and images. In fact,
These solutions are not sufficient to provide a secure the fake Web sites are near-replicas of the real one, making
environment because most of them are reactive solutions it difficult even for experts to distinguish between the real
and others do not comply with security policies (e.g. deny as and fake Web sites. As a result, the victim enters his
default, allow only permitted, etc.). In particular for personal information onto the Web site – and into the hands
blocking an attacker site, detecting fraudulent emails is like of identity thieves.
making a black list, and this is the opposite of allowing only
permitted. Other solutions such as the use of two factor
3.2 Vishing
authentication are not enough. If we authenticate the user,
we also have to authenticate the server because both entities The main text for your paragraphs should be 10pt font. All
must be considered mutually untrusted. For this reason, in body paragraphs (except the beginning of a section/sub- As
order to work in a secure way in presence of innumerable computer users have become more educated about the
phishing attempts a multi-factor solution is required. dangers of phishing emails, perpetrators have begun
incorporating the telephone into their schemes. This
variation on the phishing ploy has been termed vishing,
3. Common Phishing Procedure
indicating that it is a combination of voice (phone) and
The most common phishing scams involves sending a
phishing. In a typical vishing attempt, you would receive a
fraudulent email that claims to be from a well-known legitimate-looking email directing you to call a number.
company. Below is an illustration of a typical phishing This would connect you to an automatic voice system, which
procedure: would ask for your credit card information. In some cases
email wouldn't be involved at all. Instead, you would receive
1. Mass 2. Phishing 3. Fraudulent
Email Email Website an automated phone call requesting your account
information. Often the perpetrators would already have your
credit card number and would be requesting only the
security code from the back of the card.

Internet Voice, also known as Voice over Internet Protocol


(VoIP) or Internet telephony, is a relatively new technology
that allows you to make phone calls over the Internet.
The Modus Operandi of Phishing Depending on the provider, VoIP can have several
advantages over conventional phone service, such as a flat
rate for long distance calls and no extra charge for popular
(IJCNS) International Journal of Computer and Network Security, 61
Vol. 2, No. 10, 2010

features such as caller ID and voice mail. Internet voice 5. Tips for Spotting Phishing Scams
(VoIP) vulnerabilities are facilitating this form of fraud. Essentially, fraudulent email and websites are designed to
Users can telephone anonymously. In addition, caller ID deceive you and can be difficult to distinguish from the real
devices can be fooled into displaying a false source for a thing. Whenever you get an email about your account, the
call. safest and easiest course of action is to open a new browser,
. type the website address of your online transaction and log
3.3.1 Samples of Phishing in to your account directly. Do not click on any link in an
email that requests personal information.
Sample 1:
"Is this Mr. Shola? I'm calling from PSP Bank. Do you have 5.1 Identifying Fraudulent Emails
a Visa® card? I need to verify your account number because There are many telltale signs of a fraudulent email.[11]
it seems that someone may be fraudulently a. Sender's Email Address. To give you a false sense
charging purchases to your account. Can you read me the of security, the “From” line may include an official-
account number and expiration date on the front of your looking email address that may actually be copied
Visa® card? OK, now the last four digits on the back..." from a genuine one. The email address can easily
be altered – it’s not an indication of the validity of
Sample 2:
any email communication.
"Hello, Mr. Peter Johnson? I represent the ICC Company
b. Generic Email Greeting. A typical phishing email
and our records show that you have an overdue bill of $500
will have a generic greeting, such as “Dear User.”
plus interest and penalties. You don't know anything about
Note: All PayPal emails will greet you by your first
this bill? Well, there could be a mix-up. Is your address 34
and last name.
Hall Street? What is your Social Security number...?"
c. False Sense of Urgency. Most phishing emails try
Sample 3: to deceive you with the threat that your account will
"This is Inspector Danladi calling from the Economic and be in jeopardy if it’s not updated right away. An
Financial Crimes Commission. Are you Mr. Samuel? We email that urgently requests you to supply sensitive
have received several reports of telemarketing personal information is typically fraudulent.
fraud involving attempted withdrawals from bank accounts d. Fake Links. Many phishing emails have a link that
in your area. In order to safeguard your account, we need to looks valid, but sends you to a fraudulent site that
confirm your account number, could you please call out your may or may not have an URL different from the
account number...” link. Always check where a link is going before you
click. Move your mouse over the URL in the email
3.3.2 Common Phishing Features and look at the URL in the browser. As always, if it
looks suspicious, don't click it. Open a new browser
While phishing scams can be sophisticated, one needs to be window, and type https://www.paypal.com.
vigilant in order to recognize a potential scam. The e. Attachments. Similar to fake links, attachments can
following features are often pointers that something is wide be used in phishing emails and are dangerous.
of the mark: Never click on an attachment. It could cause you to
download spyware or a virus. PayPal will never
… Someone contacts you unexpectedly and asks for your email you an attachment or a software update to
personal information such as your financial institution install on your computer.
account number, an account password or PIN, credit card
number or Social Security number. Legitimate companies
and agencies don’t operate that way.

… The sender, who is a supposed representative of a


company you do business with, asks you to confirm that you
have a relationship with the company. This information is
on record with the real company.

… You are warned that your account will be shut down


unless you “reconfirm” your financial information.

… Links in an email you receive ask you to provide personal


information. To check whether an email or call is really Model of a fraudulent email
from the company or agency, call it directly or go to the
company’s Web site (use a search engine to find it). 5.2 Identifying a Fraudulent Website
… You’re a job seeker who is contacted by someone A phishing email will usually try to direct you to a
fraudulent website that mimics the appearance of a popular
claiming to be a prospective employer who wants your
website or company. The fraudulent website commonly
personal information.
referred to as a ‘spoof ‘website will request your personal
information, such as credit card number, Social Security
number, or account password.
62 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

You think you are giving information to a trusted company Web page window). Double click on the symbol to see the
when, in fact, you are supplying it to an online criminal. security certificate for the site and make sure that it matches
a. Deceptive URLs. the site you think you're visiting. But beware - a scammer
Be cautious. Some fraudsters will insert a fake browser may also use a secure Web site.
address bar over the real one, making it appear that you’re
on a legitimate website. Follow these precautions: Even if an • Regularly check your bank, credit and debit
URL contains the word "PayPal," it may not be a PayPal card statements (paper and online).
site. Verify each account at least once a month. Ensure that all
Examples of fake PayPal addresses: transactions are legitimate. If anything is suspicious, contact
http://signin.paypal.com@10.19.32.4/ your bank and all card issuers.
http://83.16.123.18/pp/update.htm?=https://
www.paypal.com/=cmd_login_access • Ensure that your browser is up to date.
www.secure-paypal.com Make sure that you have applied the latest security patches
Always log in to PayPal by opening a new browser and and updates. If you use the Microsoft Internet Explorer
typing in the following: https://www.paypal.com. browser, go to http://www.microsoft.com/security/ and
The term "https" should precede any web address (or download a special patch relating to certain phishing
URL) where you enter personal information. The "s" schemes.
stands for secure. If you don't see "https," you're not in a
secure web session, and you should not enter data. • Install and maintain antivirus and anti-spyware
b. Out-of-place lock icon.
Software.
Make sure there is a secure lock icon in the status bar at the
Some phishing email may contain software that can track
bottom of the browser window. Many fake sites will put this
your activities, disrupt your computer or simply slow it
icon inside the window to deceive you.
down. Detect, manage and delete these threats by installing
effective antivirus software and antispyware and keeping it
updated, either automatically or by downloading updates
manually from the manufacturer's Web site.

• Consider installing a phish-blocking toolbar on


your Web browser.
EarthLink ScamBlocker is part of a free browser toolbar that
alerts you before you visit a page that's on EarthLink’s list
of known fraudulent phisher Web sites. It's free to all
Internet users and can be downloaded at EarthLink Toolbar.

Handle a vishing attempt as you would a phishing situation:

• Don't respond to it.

• Don't call a number given in an email.


Model of a Bogus Website
• Don't give out your account information in
response to a phone call you didn't initiate.
6. Phishing Protection: Multi-factor Approach Contact your credit card company directly and only by your
The primary responsibility for protecting yourself from usual means.
phishers lies with YOU. Here are some steps you can take:
7. Conclusion
• Be on guard
Be wary of any email with an urgent request for personal, It is thus important that consumers are watchful in
account or financial information. Unless the email is handing out critical user-specific information. Creating
digitally signed (a method of authenticating digital passwords that use a combination of upper and lower
information), you can't be sure it is authentic. case and special characters will also contribute to a hard
data encryption. For businesses, educating employees on
• Don't fill out a form on a Web site unless you how to recognise a phishing attempt makes it competitive
know it is secure. in computer security. It is also wise to install advanced
You should communicate information such as credit card browsers that alert users when fraudulent or suspicious
numbers or account information only through a secure Web websites are visited. Moreover, exchanging details should
site or over the telephone. To ensure that you're on a secure be done in secured manner and channel where strong
Web server, check its address in your browser's address bar. cryptography is used for server authentication. In the
It should begin with "https" rather than just "http." In struggle against phishers and Internet scam perpetuators,
addition, there should be a symbol such as a padlock or key, being a smart Internet user makes a difference. Internet
usually at the bottom of your browser window (not in the
(IJCNS) International Journal of Computer and Network Security, 63
Vol. 2, No. 10, 2010

fraud can be eliminated or reduced to a great extent when Author Profile


common sense and safety precautions are applied.
Vivian Ogochukwu Nwaocha is currently
involved in coordinating Computer Science and
Information Technology programs at the
National Open University of Nigeria. Her main
References research interests are computer security,
artificial intelligence, mobile learning and
[1] Anti-Phishing Working Group, Phishing Attack Trends
assistive technologies. A good number of papers authored by
Vivian have been published in various local and international
Report, April 2004. [Online]. Available: journals. Vivian has equally written a number of books which are
http://antiphishing.org/APWG_Phishing_Attack_Repor accessible online. She has participated in several community and
t-Apr2004.pdf. service development projects in Nigeria and beyond. Vivian is a
[2] Bob Sullivan, "Consumers Still Falling for Phish," member of Computer Professionals Registration Council of
Nigeria, Nigeria Computer Society, Prolearn Academy, elearning
MSNBC, July 28, 2004. [Online]. Available: Europe, IAENG society of Computer Science, IAENG society of
Artificial Intelligence, IAENG society of Bioinformatics and
http://www.msnbc.msn.com/id/5519990/
several online social networking communities.
[3] Neil Chou, Robert Ledesma, Yuka Teraguchi, and John
C. Mitchell, "Client-Side Defense Against Web-Based
Identity Theft," 11th Annual Network and Distributed
System Security Symposium, 2004. [Online]. Available:
http://theory.stanford.edu/people/jcm/papers/spoof
guard-ndss.pdf.
[4] WEBOPEDIA, Everything you need to know is right
here, 2010. [Online]. Available:
http://www.webopedia.com/TERM/P/phishing.html
[5] C. Douglas, “The INTERNET Book, Everything You
Need to Know About Computer Networking and How the
Internet Works,” Fourth Edition, pp. 311-312, 2006.
[6] ASTALAVISTA,"The Hacking and Security
Community, Introduction to Phishing”. July, 2010.
[Online]. Available:
http://www.astalavista.com/blog/5/entry-90-
introduction-to-phishing/
[7] Anti-Phishing Working Group, Vendor solutions, 2010.
[Online]. Available:
(http://www.antiphishing.org/solutions.html)
[8] R. S. Katti and R. G. Kavasseri, “Nonce Generation For
The Digital Signature Standard,” International Journal
of Network Security, vol. 11, no. 1, pp. 23-32, July
2010.
[9] C. Yang, “Secure Internet Applications Based on Mobile
Agents,” International Journal of Network Security, vol.
2, no. 3, pp. 228-237, May 2006.
[10] PayPal, Phishing Guide Part I, [Online]. Available:
https://www.paypal.com/cgi-
bin/webscr?cmd=xpt/Marketing/securitycenter/general/
UnderstandPhishing-outside
[11] PayPal, Phishing Guide Part II, “Recognizing
Phishing," [Online]. Available: https://www.paypal.com
/cgibin/webscr?cmd=xpt/Marketing/securitycenter/gene
ral/RecognizePhishing-outside

S-ar putea să vă placă și