The Art of Phishing : What you should know
Arvind Vishwakarma
05/24/2019
The Art of Phishing : What you should know Arvind Vishwakarma - - PowerPoint PPT Presentation
The Art of Phishing : What you should know Arvind Vishwakarma 05/24/2019 Agenda 1. Phishing In a Nutshell 2. Phishing Types & Techniques 3. Phishing Stats & Modern Trends 4. Case-Study 5. Stay Safe 2 Speaker ABOUT ME
05/24/2019
2
3
Penetration Tester
Insert speaker image here ABOUT ME
KEY AREAS OF INTEREST
BLOGS & PUBLICATIONS
4
*Image Source: cio.com
5
Spear Phishing ★Targeting specific group of individuals & companies. ★General background information is collected to make emails specific. ★Example: EPF Attack (https://www.eff.org/deeplinks/2015/08/new-spear-
phishing-campaign-pretends-be-eff)
Whale Phishing ★Targeting specific Individuals. ★Intensive research is done to collect specific information related to individuals
roles.
★Example: SnapChat Attack
(https://searchsecurity.techtarget.com/definition/whaling)
Clone Phishing ★Cloning legitimate emails received by the victims ★Legitimate links and attachments are replaced with malicious one’s
6
★Making a malicious URL appear as an authentic
URL.
★Example:
Authentic URL thelegitbank.com vs. Shady URL theleg1tbank.com
★Spoofing a website to make it appear as
legitimate, authentic site using javascript and flash.
★Examples: Spoofed websites msfirefox.com &
msfirefox.net
★Forcibly redirecting users to attacker controlled
websites.
★Examples: Compromising websites and placing
code in them to redirect to malicious sites.
7
Sources: Verizon DBR-2018, PhishMe Stats, CSO Online, Check-Point Research, Rapid7 QTR
90% of Security Incident breaches include a phishing elements 92% of Malware spreads through Phishing 98% Social Media ATO are through Phishing 76% Org’s reported they experienced phishing attacks 91% Cyberattacks start with Phishing
8
Image Source: https://krebsonsecurity.com/2018/11/half-of-all-phishing-sites-now-have-the-padlock/
Phishing sites now use legitimate HTTPS
9
SAAS Providers are now targeted for Phishing
10
Image source: https://www.forbes.com/sites/forbestechcouncil/2019/01/10/four-phishing-attack-trends-to-look-out- for-in-2019/#3a106a824ec2
File-less Phishing attacks
11
Image Source: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social- engineering-techniques-using-pdf-attachments/
Phishing inside Shared Folders.
12
Source: https://www.channelnewsasia.com/news/singapore/phishing-scam-dbs-posb-customers-fake-sms- police-10957456
SMS-Phishing – Using cell phone text messages to deliver the bait to induce people
13
Image source: http://www.carmelowalsh.com/2015/07/phishing-and-vishing-attacks-are-up/
Vishing – Voice Phishing carried
calls
14
14
Study the Target Select Phishing Site Create Phishing Email Sent Phishing Email Capture Credentials / Execute Code
15
Step 1: Attacker studies the Target Organization (Eg: Rapid7)
etc.
15
16
Step 2: Selects the Target Domain
(insight.rapid7.com)
(insight-rapid7.com)
filtering
16
17
Step 3: Attacker creates Phishing Email (Pretext)
Pretexting is the process of using the collected information to craft a realistic communication to the target that is believable enough to get them to act upon it.
17
18
Step 4 - Phishing Email Sent
18
Phishing mail with the phishing link.
19
Step 5: Capturing Credentials
Victim clicks on the phishing link and is redirected to the login portal
19
Attacker captures Credentials
20
Attacker sets up Phishing Redirection
20
21
Step 5: Payload drops on the target system
21
22
A Word on Payloads
Delivering a malicious payload via a phishing email is the most and direct reliable way to get attackers code executed on a victims machine.
sandbox checks etc.
22
23
Be Proactive – Educate yourself Think twice before giving PII or Financial Info Enable 2 Factor Authentication Report Phishing Emails Conduct Awareness Training Conduct Phishing Simulations
Email apacsales@rapid7.com Visit http://rapid7.com