the art of phishing what you should know
play

The Art of Phishing : What you should know Arvind Vishwakarma - PowerPoint PPT Presentation

The Art of Phishing : What you should know Arvind Vishwakarma 05/24/2019 Agenda 1. Phishing In a Nutshell 2. Phishing Types & Techniques 3. Phishing Stats & Modern Trends 4. Case-Study 5. Stay Safe 2 Speaker ABOUT ME


  1. The Art of Phishing : What you should know Arvind Vishwakarma 05/24/2019

  2. Agenda 1. Phishing – In a Nutshell 2. Phishing – Types & Techniques 3. Phishing – Stats & Modern Trends 4. Case-Study 5. Stay Safe 2

  3. Speaker ABOUT ME Penetration Tester with 7 years of Experience ● Currently working with Rapid7 - Singapore ● KEY AREAS OF INTEREST Penetration Testing (Network & Web Apps) ● Social Engineering (Electronic) ● Internet of Things ● Insert speaker image here BLOGS & PUBLICATIONS http://resources.infosecinstitute.com/author/arvindvishwakarma ● TWITTER Find_Arvind ● Arvind Vishwakarma Penetration Tester 3

  4. Phishing - In a Nutshell *Image Source: cio.com 4

  5. Types of Phishing Attacks ★ Targeting specific group of individuals & companies. ★ General background information is collected to make emails specific. ★ Example: EPF Attack (https://www.eff.org/deeplinks/2015/08/new-spear- Spear phishing-campaign-pretends-be-eff) Phishing ★ Targeting specific Individuals. ★ Intensive research is done to collect specific information related to individuals roles. ★ Example: SnapChat Attack Whale (https://searchsecurity.techtarget.com/definition/whaling) Phishing ★ Cloning legitimate emails received by the victims ★ Legitimate links and attachments are replaced with malicious one’s Clone Phishing 5

  6. Common Phishing Techniques ★ Making a malicious URL appear as an authentic Link URL. ★ Example: Spoofing Authentic URL thelegitbank.com vs. Shady URL theleg1tbank.com ★ Spoofing a website to make it appear as Website legitimate, authentic site using javascript and flash. ★ Examples: Spoofed websites msfirefox.com & Spoofing msfirefox.net ★ Forcibly redirecting users to attacker controlled Malicious websites. ★ Examples: Compromising websites and placing Redirects code in them to redirect to malicious sites. 6

  7. Phishing - Stats 91% 92% of Malware Cyberattacks spreads through start with Phishing Phishing 90% of Security Incident breaches include a phishing elements 76% Org’s reported they 98% Social Media experienced ATO are through phishing Phishing attacks Sources: Verizon DBR-2018, PhishMe Stats, CSO Online, Check-Point Research, Rapid7 QTR 7

  8. Phishing – Modern Trends Phishing sites now use legitimate HTTPS Image Source: https://krebsonsecurity.com/2018/11/half-of-all-phishing-sites-now-have-the-padlock/ 8

  9. Phishing – Modern Trends SAAS Providers are now targeted for Phishing 9

  10. Phishing – Modern Trends File-less Phishing attacks Image source: https://www.forbes.com/sites/forbestechcouncil/2019/01/10/four-phishing-attack-trends-to-look-out- 10 for-in-2019/#3a106a824ec2

  11. Phishing – Modern Trends Phishing inside Shared Folders. Image Source: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social- 11 engineering-techniques-using-pdf-attachments/

  12. Phishing – Modern Trends SMS-Phishing – Using cell phone text messages to deliver the bait to induce people Source: https://www.channelnewsasia.com/news/singapore/phishing-scam-dbs-posb-customers-fake-sms- 12 police-10957456

  13. Phishing – Modern Trends Vishing – Voice Phishing carried out through phone- calls Image source: http://www.carmelowalsh.com/2015/07/phishing-and-vishing-attacks-are-up/ 13

  14. Phishing Attacks : Case Study Study the Target Select Phishing Create Phishing Sent Phishing Capture Site Email Email Credentials / Execute Code 14 14

  15. Phishing Attacks : Case Study Step 1: Attacker studies the Target Organization (Eg: Rapid7) Public Facing Domains • Looks for Corporate Website, Webmail, VPN Login Pages, Customer Portals, File Transfer Portals • etc. Gathers Information about the Domain he chooses to target. • Employee Data • Gathers Employee Email-ids (through LinkedIn, Hunter.io, Data.com etc.) • Generates a list of Email-Ids for the attack. • 15 15

  16. Phishing Attacks : Case Study Step 2: Selects the Target Domain Attacker chooses a File Transfer Portal • (insight.rapid7.com) Registers fake domain – • (insight-rapid7.com) Categorizes the Domains to bypass • filtering 16 16

  17. Phishing Attacks : Case Study Step 3: Attacker creates Phishing Email (Pretext) Pretexting is the process of using the collected information to craft a realistic communication to the target that is believable enough to get them to act upon it. Builds the pretext around the public facing file transfer portal. • For example: Sending an email that an invoice has been submitted through the File transfer portal. • Employee Appraisal Letters, Compensation letters, Tax Letters. • Creating a sense of urgency or fear. • Personalizing the Pretext • 17 17

  18. Phishing Attacks : Case Study Step 4 - Phishing Email Sent Phishing mail with the phishing link. 18 18

  19. Phishing Attacks : Case Study Step 5: Capturing Credentials Attacker captures Credentials Victim clicks on the phishing link and is redirected to the login portal 19 19

  20. Phishing Attacks : Case Study Attacker sets up Phishing Redirection Capturing the Credentials • Clones the Original file transfer portal to capture user credentials • Redirects to the payload hosted on the domain after capturing the user credentials • Executing the Payload • Payloads drops on the systems and executes. • Attacker gets a connection back from the payload on his CC Server. • 20 20

  21. Phishing Attacks : Case Study Step 5: Payload drops on the target system 21 21

  22. Phishing Attacks : Case Study A Word on Payloads Delivering a malicious payload via a phishing email is the most and direct reliable way to get attackers code executed on a victims machine. Malicious payloads are sent as attachments (For example: HTA, Clikckonce, LNK) • Payloads are embedded in form of macros in office documents. • Attackers are making stealthier payloads using obfuscation techniques, adding • sandbox checks etc. Tools like unicorn, sharpshooter, veil etc. all aid in making good payloads • 22 22

  23. Phishing – Stay Safe Think twice Be Proactive – Enable 2 Report Conduct Conduct before giving Educate Factor Phishing Awareness Phishing PII or yourself Authentication Emails Training Simulations Financial Info 23

  24. Thank You. Email apacsales@rapid7.com Visit http://rapid7.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend