官术网_书友最值得收藏!

Phishing 

Phishing is a cyberattack whereby an attacker uses a disguised email to obtain sensitive information from a target. Information that's obtained can be anything from credit card details, user login information, network credentials, and more. This type of attack is done against both individuals and large organizations. You have probably noticed a lot of phishing emails in your personal email, since these attacks are performed at a very large scale. In this type of attack, the attackers are not interested in anyone specifically. They are simply casting a wide net, so to speak, in order to persuade any unsuspecting person into providing valuable information.

Some of the common features of a phishing email are as follows:

  • Attachments: You often notice attachments in emails that claim to contain an invoice or document. These usually contain a macro, which contains a payload that can drop a remote shell, allowing an attacker to access your computer, or even drop malware such as ransomware. Lately, some of these emails have been containing .html files, which are often in .doc or .js format. These have a low detection rate by antivirus software as they are not generally associated with email attacks. Of course, as antiviruses mature, so does the attacker's tactics.
  • Hyperlinks: Some phishing emails may contain a link redirecting you to a website that may look legit. Common types of phishing emails are those that request you to reset your password, or confirm your details to avoid your account being disabled, and so on. Usually, when you hover over the link, you will see the actual URL, which is not legitimate, but as the attackers mature in their tactics, they start using URLs that seem very similar to the legitimate one. For example, https://www.facebook.com/ could be depicted as www.faccebook.com or www.faceboook.com, which can be easily missed if you don't look carefully.
  • Too good to be true: Many phishing emails have statements that are designed to attract people's attention. These are usually related to lucrative offers, such as winning a device, the lottery, or inheriting a small fortune from a distant relative. One thing to keep in mind is that if it seems too good to be true, it probably is.

Phishing kits are easily available on the dark net. The availability of these kits makes it easy for attackers with minimal skills to launch a phishing campaign. A phishing kit bundles website resources and tools that are ready to be installed on a server. Once installed, all that is required is for the attacker to send emails to the victims, which directs them to the phishing site.

To keep abreast of current phishing links, take a look at the phishing feeds hosted on OpenPhish ( https://openphish.com) and PhishTank ( https://www.phishtank.com).
主站蜘蛛池模板: 乳山市| 谷城县| 长乐市| 驻马店市| 班玛县| 资中县| 西华县| 宝山区| 如皋市| 蒙阴县| 敖汉旗| 两当县| 喀什市| 安庆市| 依兰县| 湾仔区| 夏邑县| 眉山市| 张家口市| 沐川县| 延寿县| 罗江县| 珲春市| 巴塘县| 大安市| 陆丰市| 金秀| 高陵县| 溧水县| 南乐县| 宜君县| 三原县| 永春县| 镇远县| 德江县| 绵竹市| 通山县| 咸阳市| 酒泉市| 呼图壁县| 金门县|