You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/370608906

A COMPREHENSIVE STUDY OF PHISHING ATTACKS AND THEIR


COUNTERMEASURES

Research · April 2023


DOI: 10.13140/RG.2.2.36686.13120

CITATIONS READS

0 315

2 authors, including:

Sandeepta kumar Gouda


KIIT University
1 PUBLICATION 0 CITATIONS

SEE PROFILE

All content following this page was uploaded by Sandeepta kumar Gouda on 09 May 2023.

The user has requested enhancement of the downloaded file.


© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)

A COMPREHENSIVE STUDY OF PHISHING


ATTACKS AND THEIR COUNTERMEASURES
Mr. Sandeepta Kumar Gouda School of Computer Applications
Kalinga Institute of Industrial Technology Patia, Bhubaneswar

organizations better understand the nature of these threats


Abstract : This research paper presents a comprehensive and how to protect against them [1].
study of phishing attacks and their countermeasures. Phishing
attacks are a major threat to individuals and organizations Fig: 1 Background of phishing attacks
worldwide, and understanding the various types of attacks,
the techniques used, and the impacts of these attacks
is critical in developing effective countermeasures. This B. Importance of Phishing Attacks
paper discusses the different types of phishing attacks, the
techniques used by attackers, and the impacts of successful Phishing attacks are a significant threat to individuals and
attacks on individuals and organizations. It also provides an
overview of technical and non-technical countermeasures
that can be used to prevent and mitigate the risks of phishing
attacks. Additionally, this paper includes case studies of recent
high-profile phishing attacks and explores emerging trends in
phishing attacks and potential future countermeasures. The
findings of this study provide practical recommendations for
organizations to improve their security posture and protect
against the threat of phishing attacks.

IndexTerms - Phishing Attacks,Cyber security,Social


Engineering,Malware-based Techniques,Anti-Phishing,Two-
Factor Authentication,Training and Awareness
Programs,Case Studies.

I. INTRODUCTION

A. Definition of Phishing Attacks organizations worldwide, and their importance cannot be


Phishing attacks are a form of cyber attack that involves overstated. Phishing attacks have been responsible for
the use of fraudulent emails, text messages, or phone calls to significant financial losses, data breaches, and reputational
deceive individuals into divulging sensitive information, damage to organizations. Moreover, phishing attacks can
such as passwords, social security numbers, or credit card lead to identity theft, ransomware infections, and other
details. These attacks have become increasingly cyber crimes. It is crucial to recognize that phishing attacks
sophisticated in recent years, making them a significant are not limited to any specific industry or organization size.
threat to individuals and organizations worldwide. In
response, it is essential to develop a comprehensive Anyone with an email account or access to the internet can
understanding of phishing attacks and their countermeasures fall victim to a phishing attack. Therefore, it is essential to
to effectively protect against these threats. study and understand the nature of these attacks and the
techniques used by attackers to prevent and mitigate their
This research paper presents a detailed analysis of phishing impact. This comprehensive study of phishing attacks and
attacks, including the various types of attacks, the their countermeasures will provide individuals and
techniques used by attackers, the impacts of successful organizations with the knowledge and tools necessary to
attacks, and the countermeasures that can be used to prevent protect against these threats and ensure the safety of their
and mitigate the risks of these attacks. By providing a sensitive information.
comprehensive study of phishing attacks and their
countermeasures, this research aims to help individuals and

IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 78


© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
C. Purpose of the Research email filtering, employee education and training, and
incident response planning. Additionally, organizations can
The purpose of this research paper is to provide a
implement multi-factor authentication and access controls to
comprehensive study of phishing attacks and their
limit the impact of a successful attack.
countermeasures. The paper aims to examine the various
types of phishing attacks, the techniques used by attackers,
It is crucial for individuals and organizations to understand
and the impacts of successful attacks on individuals and
the techniques used in spear phishing attacks and the
organizations. Additionally, this research paper will explore
countermeasures available to prevent and mitigate the risks
the technical and non-technical countermeasures that can be
of these attacks. By implementing effective
used to prevent and mitigate the risks of phishing attacks.
countermeasures, individuals and organizations can
By providing a detailed analysis of phishing attacks and
significantly reduce the risk of falling victim to spear
their countermeasures, this research paper aims to equip
phishing attacks [3].
individuals and organizations with the knowledge and tools
necessary to protect against these threats. Additionally, this
C. HTTPS Phishing
research paper aims to contribute to the broader
conversation surrounding cybersecurity and the ongoing HTTPS phishing, also known as SSL phishing or secure
battle against cybercrime. phishing, is a type of phishing attack that takes advantage of
the trust users have in the HTTPS protocol. HTTPS is a
The findings of this study will provide practical protocol used to provide secure communication over the
recommendations for organizations to improve their security internet and is commonly used for secure online
posture and protect against the threat of phishing attacks. transactions, such as online banking or shopping. Attackers
can create fraudulent websites that use HTTPS to trick users
into thinking the website is legitimate and secure, making
II. TYPES OF PHISHING ATTACKS them more likely to enter sensitive information. This is
achieved by obtaining a valid SSL certificate or by using
A. Email Phishing Attacks free SSL certificates provided by various certificate
Email phishing attacks are a form of social engineering authorities. Once the user enters their sensitive information,
that uses fraudulent emails to deceive individuals into the attacker can use it for fraudulent activities, such as
divulging sensitive information such as usernames, identity theft or financial fraud.
passwords, or credit card information. These attacks often
involve spoofing legitimate emails from well-known To prevent and mitigate the risks of HTTPS phishing
organizations, making them difficult to detect. Additionally, attacks, users should be trained to verify the website's
attackers use a variety of techniques to persuade the legitimacy and look for visual indicators, such as a padlock
recipient to click on a malicious link or download malware, symbol or the website's URL, to ensure they are on the
such as using a sense of urgency, claiming to be from a correct website. Additionally, organizations can implement
reputable source, or offering a reward. web filtering and firewall rules to block access to fraudulent
websites. It is essential for individuals and organizations to
The success of email phishing attacks can result in understand the risks associated with HTTPS phishing
significant financial losses and reputational damage to attacks and the countermeasures available to prevent and
organizations. To prevent and mitigate the risks of email mitigate the risks of these attacks.
phishing attacks, technical and non-technical
countermeasures can be employed, such as email filtering, D. Pop-up Phishing
multi-factor authentication, employee education, and Pop-up phishing is a type of phishing attack that uses pop-
incident response planning [2]. up windows to trick users into revealing sensitive
information. Pop-up phishing attacks typically start with a
By implementing these countermeasures, individuals and legitimate-looking website or email that includes a link or
organizations can significantly reduce the risks of falling button that opens a pop-up window. The pop-up window
victim to email phishing attacks. Therefore, understanding may ask the user to enter personal or financial information,
the various techniques used in email phishing attacks and such as a credit card number or login credentials. The pop-
the countermeasures available to prevent and mitigate the up window may also contain a message that claims the
risks of these attacks is crucial for individuals and user's computer is infected with a virus or malware and
organizations in today's digital age. encourages them to download a software update or anti-
virus program.
B. Spear Phishing
In reality, the software is malicious and infects the user's
Spear phishing is a more sophisticated and targeted form computer with malware or spyware. Pop-up phishing attacks
of phishing attack that involves sending fraudulent emails to are often difficult to detect as they may look like legitimate
specific individuals or groups, often in organizations or pop-up windows from trusted sources. To prevent and
businesses. Spear phishing attacks are often personalized mitigate the risks of pop-up phishing attacks, users should
and may include information about the recipient's job, be trained to recognize phishing emails and websites and to
employer, or recent activities to make the email appear more avoid clicking on links or buttons in pop-up windows.
legitimate. Attackers use social engineering techniques to Additionally, organizations can implement web filtering and
persuade the recipient to click on a malicious link or ad-blocking software to block pop-up windows and prevent
download malware, which can give the attacker access to users from visiting fraudulent websites. It is crucial for
sensitive information or systems. Spear phishing attacks are individuals and organizations to understand the risks
particularly challenging to detect as they are often designed associated with pop-up phishing attacks and the
to bypass traditional email security systems. To prevent and countermeasures available to prevent and mitigate the risks
mitigate the risks of spear phishing attacks, technical and of these attacks.
non-technical countermeasures can be employed, such as E. Evil Twin Phishing
IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 26
© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
Evil twin phishing is a type of phishing attack that takes
advantage of public Wi-Fi networks. In an evil twin
phishing attack, an attacker creates a fake Wi-Fi access
point that appears to be a legitimate public Wi-Fi network,
such as a coffee shop or airport Wi-Fi. When users connect
to the fake network, the attacker can intercept their internet
traffic and steal sensitive information, such as login
credentials, credit card information, and personal data. Evil
twin phishing attacks are particularly effective as users often
connect to public Wi-Fi networks without verifying the
network's legitimacy [4].

To prevent and mitigate the risks of evil twin phishing


attacks, users should be trained to verify the network's
legitimacy before connecting to public Wi-Fi networks.
Additionally, organizations can implement security Fig: 2 Man-in-the-Middle Attacks
protocols, such as VPNs, to encrypt internet traffic and
protect users from malicious attacks. It is essential for It is vital for individuals and organizations to understand the
individuals and organizations to understand the risks risks associated with MTM attacks and the countermeasures
associated with evil twin phishing attacks and the available to prevent and mitigate the risks of these attacks.
countermeasures available to prevent and mitigate the risks
of these attacks. H. Website Spoofing
Website spoofing is a type of phishing attack that involves
F. Clone Phishing
creating a fake website that looks like a legitimate website
Clone phishing is a type of phishing attack that involves to trick users into providing their sensitive information. In a
creating a nearly identical copy of a legitimate email or website spoofing attack, the attacker creates a website that
webpage. In a clone phishing attack, the attacker copies an looks almost identical to the original website and then sends
email or webpage and makes a few changes, such as out emails or messages directing users to the fake website.
replacing a link or attachment with a malicious one. The Once on the fake website, users may enter their login
attacker then sends the cloned email to the original credentials, personal information, and other sensitive data,
recipient, hoping to trick them into thinking it is a legitimate which is then stolen by the attacker. To prevent and mitigate
email. Clone phishing attacks are often successful because the risks of website spoofing attacks, users should be trained
the cloned email or webpage looks legitimate and may come to examine website URLs carefully, look for security
from a trusted source. indicators such as HTTPS, and avoid clicking on suspicious
links.
To prevent and mitigate the risks of clone phishing attacks,
users should be trained to examine emails and webpages Additionally, organizations can implement security
carefully and to verify their authenticity before clicking on measures such as multi-factor authentication and web
links or downloading attachments. Additionally, filtering to detect and block website spoofing attacks. It is
organizations can implement email security protocols, such important for individuals and organizations to understand
as DMARC, to detect and block clone phishing emails. It is the risks associated with website spoofing attacks and the
crucial for individuals and organizations to understand the countermeasures available to prevent and mitigate the risks
risks associated with clone phishing attacks and the of these attacks.
countermeasures available to prevent and mitigate the risks
of these attacks. I. Domain Spoofing
Domain spoofing is a type of phishing attack that involves
G. Man-in-the-Middle (MTM) Attacks
forging the sender's email address to appear as if it is
Man-in-the-Middle (MTM) attacks are a type of phishing coming from a legitimate domain. In a domain spoofing
attack that occurs when an attacker intercepts attack, the attacker crafts an email message that appears to
communications between two parties, such as a user and a be from a legitimate source, such as a bank or a popular e-
website. In an MTM attack, the attacker positions commerce website, and then sends it to the victim. The
themselves between the user and the website, intercepts and email may contain a call to action, such as clicking on a link
reads the communication, and then relays it to the other or downloading an attachment, which then leads the victim
party. This allows the attacker to steal sensitive information, to a fake website where their personal information is stolen.
such as login credentials and personal data, and even modify
the communication for their own purposes. MTM attacks To prevent and mitigate the risks of domain spoofing
are particularly effective against unsecured websites and attacks, organizations can implement email authentication
unencrypted communications. protocols, such as SPF, DKIM, and DMARC, to detect and
block spoofed emails. Additionally, users should be trained
to look for red flags, such as misspellings or suspicious
To prevent and mitigate the risks of MTM attacks, users requests, and to verify the authenticity of the email by
should be trained to use secure websites and communication contacting the sender through a trusted channel. It is crucial
channels, such as those that use HTTPS and VPNs. for individuals and organizations to understand the risks
Additionally, organizations can implement network security associated with domain spoofing attacks and to implement
protocols, such as firewalls and intrusion detection systems, the necessary countermeasures to protect against them [6].
to detect and block MTM attacks [5].

IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 27


© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
J. Image Phishing C. URL Spoofing
Image phishing is a relatively new type of phishing attack URL spoofing is a technique used in phishing attacks to
that involves the use of images to deceive users into create fake web pages that appear legitimate. Attackers use
divulging their personal information. In an image phishing various tricks, such as changing a single character in the
attack, the attacker sends an email that contains an image URL or using a similar-looking domain name to deceive
that appears to be legitimate and trustworthy. The image users into thinking they are accessing a legitimate website.
may contain a link or a call to action that leads the victim to In URL spoofing attacks, attackers usually send phishing
a fake website where their personal information is then emails containing a link to the fake website or use social
stolen. Image phishing attacks can be difficult to detect engineering tactics to convince the user to enter sensitive
because the image may not trigger the usual warning signs information into the fake website.
associated with phishing emails, such as misspellings or
suspicious requests. This technique is highly effective as users often rely on the
appearance of the URL and assume that it is legitimate.
To prevent image phishing attacks, individuals and However, there are several countermeasures available to
organizations should use security software that can detect detect and prevent URL spoofing attacks, such as using
and block suspicious images. Additionally, users should be browser extensions that verify the legitimacy of a website's
trained to be cautious when clicking on links or SSL certificate, using URL scanning services, and training
downloading attachments from unknown senders, even if users to recognize phishing emails and websites. It is
the image appears to be legitimate. By being aware of the essential for individuals and organizations to be aware of
risks associated with image phishing attacks and the risks associated with URL spoofing attacks and take
implementing the necessary countermeasures, individuals appropriate measures to protect themselves from potential
and organizations can better protect themselves against this threats.
increasingly common type of phishing attack.
D. Credential Harvesting Techniques
III. TECHNIQUES USED IN PHISHING ATTACK Credential harvesting is one of the most common
techniques used in phishing attacks, which involves stealing
sensitive login credentials from unsuspecting users.
A. Social Engineering Techniques Attackers often send phishing emails that impersonate
legitimate websites, asking users to enter their login
Social engineering techniques are commonly used in
credentials. Once the users enter their credentials, the
phishing attacks to manipulate victims into divulging
attackers can use them to gain unauthorized access to their
sensitive information. Phishers often use psychological
accounts, steal their personal information, or launch further
manipulation tactics to deceive individuals into revealing
attacks. Another credential harvesting technique used by
their personal or financial information. Common social attackers is the use of keyloggers or screen scrapers, which
engineering techniques used in phishing attacks include can capture every keystroke or screenshot entered by the
pretexting, baiting, quid pro quo, and phishing via phone.
user, including sensitive login credentials.
Pretexting involves the creation of a false narrative or
situation to gain the trust of the victim, while baiting
Additionally, attackers may also use fake login pages or
involves offering something of value in exchange for the
forms that mimic the look and feel of legitimate websites to
victim's information. Quid pro quo involves offering a trick users into entering their login credentials. It is essential
service or favor in exchange for the victim's information, for users to be aware of these credential harvesting
and phishing via phone involves using voice communication
techniques and take appropriate measures to protect their
to obtain the victim's information.
sensitive information, such as enabling multi-factor
authentication and being cautious of suspicious emails or
B. Malware-based Techniques websites.
Malware-based techniques are widely used in phishing
attacks to gain access to sensitive information, such as E. Session Hijacking
passwords and financial details. Malware is often delivered
Session hijacking is a technique used in phishing attacks
to the victim's device through email attachments, malicious
where an attacker takes control of a legitimate user's web
links, or software downloads. Once installed, the malware
session to gain unauthorized access to sensitive information.
can capture keystrokes, take screenshots, and even record In a session hijacking attack, the attacker intercepts the
audio and video. It can also steal files, send spam emails, communication between the user and the server, and steals
and create backdoors for hackers to access the victim's
the session ID or token. Once the attacker obtains the
device remotely. Common types of malware used in
session ID, they can use it to impersonate the user and
phishing attacks include Trojan horses, spyware,
access their account [7].
ransomware, and botnets.
This type of attack can be carried out in various ways, such
These types of malware can be difficult to detect and can as through the use of packet sniffers, cross-site scripting
cause significant damage to individuals and organizations.
(XSS) attacks, or by exploiting vulnerabilities in the web
To counteract these malware-based techniques, anti-virus
application. Session hijacking attacks can be particularly
software, firewalls, and other security measures can be
dangerous because they can give the attacker access to
implemented to prevent malware from infecting devices and sensitive information such as usernames, passwords, and
networks. Regular software updates and employee training personal data. To prevent session hijacking attacks,
on safe internet practices can also help reduce the risk of
techniques such as the use of secure cookies, enforcing
falling victim to malware-based phishing attacks.
secure communication channels (HTTPS), and
implementing multi-factor authentication can be employed.

IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 28


© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
IV. IMPACTS OF PHISHING ATTACKS In addition, organizations that fail to adequately protect
A . Financial Impacts their customers' data from phishing attacks may face
regulatory fines and lawsuits, leading to significant financial
Phishing attacks can have significant financial impacts on losses. Therefore, it is essential for organizations to
both individuals and organizations. For individuals, implement effective security measures to prevent phishing
phishing attacks can result in the loss of personal financial attacks and protect their customers' sensitive information.
information, such as credit card numbers and login
credentials, which can then be used to steal money from V. COUNTERMEASURES AGAINST PHISHING ATTACKS
bank accounts or make unauthorized purchases. In some
cases, victims may also be tricked into wiring money to A. Technical Countermeasures
scammers, thinking they are making a legitimate payment.
1 ) Anti-Phishing Software: Anti-phishing software is a
For organizations, phishing attacks can lead to the loss of critical countermeasure against phishing attacks. It is
sensitive financial data or the theft of funds from business designed to identify and block phishing emails, websites,
accounts. The costs associated with investigating and and other fraudulent activities. The software uses a
remediating the attack, as well as potential legal fees or combination of techniques such as signature-based
regulatory fines, can also add up quickly. Additionally, a identification, machine learning algorithms, and URL
successful phishing attack can damage an organization's reputation checks to detect phishing attempts. When an
reputation and result in the loss of customers and revenue. email or website is identified as a phishing attempt, the
Overall, the financial impacts of phishing attacks can be software will alert the user and block access to the
severe and long-lasting. fraudulent content [9].
B. Reputational Impacts
Phishing attacks not only cause financial damages to Additionally, some anti-phishing software can also provide
organizations but also have serious reputational impacts. real-time protection by monitoring user behavior and
When an organization falls victim to a phishing attack, it detecting suspicious activity. This type of software is
risks losing the trust of its customers, investors, and other continuously updated to keep up with the latest phishing
stakeholders. The breach of personal information, sensitive techniques and attack vectors. Anti-phishing software is an
data, or financial details of clients due to phishing attacks essential component of any comprehensive security strategy
can lead to negative publicity, tarnishing the image of the to protect against phishing attacks. However, it is important
organization. It can also result in a loss of business to note that no software is 100\% effective, and user
opportunities as potential customers may switch to awareness and education are also crucial to preventing
competitors who have better security measures. In addition, successful phishing attacks.
reputation damage can also impact the morale and
motivation of employees, leading to a decline in 2 ) Email Authentication: Email authentication is an
productivity and performance. Therefore, it is crucial for effective countermeasure against phishing attacks. It
organizations to implement effective countermeasures to involves using various protocols to verify the authenticity of
prevent phishing attacks and safeguard their reputation. emails and ensure that they have not been forged or
C. Legal Impacts tampered with in any way. One such protocol is
DomainKeys Identified Mail (DKIM), which adds a digital
Phishing attacks not only result in financial and signature to outgoing emails that can be checked by the
reputational damage, but they can also lead to legal recipient's email server. Another protocol is Sender Policy
consequences for both individuals and organizations. The Framework (SPF), which verifies that the sending server is
use of deceptive practices to acquire sensitive information authorized to send emails on behalf of the domain. DMARC
or unauthorized access to systems can be deemed illegal and (Domain-based Message Authentication, Reporting, and
subject to prosecution. Laws such as the Computer Fraud Conformance) is a policy that uses both DKIM and SPF to
and Abuse Act (CFAA) and the Electronic Communications determine the validity of an email message.
Privacy Act (ECPA) in the United States have been
established to prevent such cybercrimes and impose legal These protocols can detect and prevent spoofed emails from
consequences on perpetrators [8]. being delivered to recipients, reducing the risk of phishing
attacks. Additionally, user education and awareness can also
help in mitigating the impact of phishing attacks. Educating
users about the telltale signs of phishing emails, such as
suspicious URLs or requests for personal information, can
help users identify and avoid phishing emails. By
combining email authentication and user education,
organizations can significantly reduce the risk of phishing
attacks and protect their sensitive information.

3 ) Two-Factor Authentication: Two-factor authentication


(2FA) is a security measure used to counter phishing attacks
by providing an additional layer of protection to user
accounts. It requires the user to provide two forms of
identification, such as a password and a one-time code
generated by a mobile device, before granting access to the
account. This means that even if an attacker obtains the
user's password through a phishing attack, they would still
need the additional form of identification to access the
account. 2FA can greatly reduce the effectiveness of
Fig: 3 Organisations hit by phishing

IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 29


© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
phishing attacks, as it makes it much more difficult for VII. CASE STUDIES
attackers to gain unauthorized access to user accounts [10].

Many online services now offer 2FA as an optional security A. Target Data Breach
feature, and some even require it for certain high-risk In January 2021, one of the largest cyberattacks in US
activities, such as transferring large amounts of money or history occurred, affecting over 30,000 US companies (and
accessing sensitive information. However, it is important to 60,000 worldwide) that used Microsoft Exchange email
note that 2FA is not foolproof and can also be vulnerable to servers. The hackers took advantage of four zero-day
certain types of attacks, such as SIM swapping or social vulnerabilities to gain unauthorized access to email accounts
engineering attacks aimed at convincing the user to provide from small businesses to local governments [11]. Exploiting
a second form of identification. coding errors, they were able to control vulnerable systems
that only required two conditions: connection to the internet
and on-premises, locally managed systems.
VI. NON-TECHNICAL COUNTERMEASURES

A. Training and Awareness Programs


Non-technical countermeasures such as training and
awareness programs play a crucial role in mitigating the risk
of phishing attacks. Many organizations have recognized the
importance of educating their employees about phishing and
its associated risks. These programs typically involve
regular training sessions and simulated phishing attacks to
test employees' awareness and response.

The training sessions aim to teach employees how to


identify phishing emails, avoid clicking on suspicious links,
and report any potential threats to the organization's security
team. By creating a culture of security awareness,
organizations can reduce the likelihood of employees falling
victim to phishing attacks. Moreover, these programs can
also be tailored to specific job roles, ensuring that
employees understand the risks that are relevant to their Fig : 4 Phishing Attacks 2021-2022
work. However, these programs require ongoing investment
and support from management to ensure their effectiveness.
Therefore, organizations need to prioritize employee With access to the email servers, the attackers requested
training and awareness as a crucial component of their data access, deployed malware, used backdoors to gain
overall cybersecurity strategy to effectively combat the access to other systems, and took over the servers. Since the
threat of phishing attacks. requests appeared to come from the Exchange servers
themselves, many people assumed they were legitimate.
B. Incident Response Plans Microsoft eventually patched the vulnerabilities, but servers
Incident response plans are an essential component of a that weren't updated could still be exploited by attackers.
comprehensive cybersecurity strategy, including protection Due to the systems not being on the cloud, Microsoft
against phishing attacks. These plans outline the actions an couldn't immediately push a patch to fix the issues. In July
organization should take in response to a security incident, 2021, the US administration and FBI accused China of
including a phishing attack. Incident response plans provide being behind the data breach, and Microsoft named
a structured approach to responding to a security incident, Hafnium, a Chinese state-sponsored hacker group, as the
minimizing the risk of damage to the organization and its responsible party.
systems.
B. Gmail Phishing Scam
The plan should include specific procedures for detecting In November 2014, Sony Pictures fell victim to a massive
and responding to a phishing attack, such as isolating cyberattack orchestrated by a hacking group known as
affected systems, assessing the extent of the attack, and 'Guardians of Peace.' According to Stuart McClure, the
notifying relevant stakeholders. Incident response plans also CEO of cybersecurity firm Cylance, the attackers had been
help organizations to maintain continuity of operations by preparing for months before the attack took place. They
ensuring that critical systems are available during and after targeted Sony executives with phishing emails that appeared
an incident. Regularly testing and updating incident to be from Apple, prompting them to enter their login
response plans is crucial to ensure that they remain effective credentials on a bogus website. With this information, the
in response to evolving threats. By implementing an hackers gained access to sensitive data, including private
incident response plan, organizations can mitigate the correspondences, personal information of employees and
impact of a phishing attack and reduce the risk of future their families, and details of unreleased films [12].
attacks.
To make matters worse, the attackers used a variant of the
Shamoon wiper malware to wipe Sony's computer systems.
This incident was just the beginning of the cybercriminals'
true motives. The attackers, later discovered to be a state-
sponsored North Korean group, demanded that Sony cancel
the release of their comedy movie, 'The Interview,' which
portrayed a plot to assassinate North Korean leader Kim
IJRAR23B1376 International Journal of Research and Analytical Reviews (IJRAR) 30
© 2023 IJRAR April 2023, Volume 10, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
Jong-un. They even threatened terrorist attacks on cinemas 1). IEEE Conference Publication | IEEE Xplore.
that screened the film, resulting in many chains choosing https://ieeexplore.ieee.org/document/7379731
not to show it.
[2] A Study On Phishing Attacks. (n.d.).
Due to the severity and unique nature of the attack, it is https://www.legalserviceindia.com/legal/article-
difficult to estimate the exact cost of damages, but Jim 9288-a-study-on-phishing-attacks.html
Lewis, a senior fellow at the Center for Strategic and
International Studies, estimated that Sony Pictures incurred [3] A Survey of Man In The Middle Attacks. (2016,
losses exceeding \$100 million. January 1). IEEE Journals & Magazine | IEEE
Xplore.
https://ieeexplore.ieee.org/document/7442758
VIII. CONCLUSION
[4] Ahmad, D. R. M., Dubrawsky, I., Flynn, H.,
A. Recap of Key Findings Grand, J., Graham, R. M., Johnson, N. R.,
Kaminsky, D. E., Lynch, F. W., Manzuik, S. W.,
In conclusion, this comprehensive study of phishing Permeh, R., Pfeil, K., & Russell, R. P. (2002,
attacks and their countermeasures has revealed several key January 1). Session Hijacking.
findings. Firstly, phishing attacks continue to be a major https://doi.org/10.1016/b978-192899470-1/50014-
threat to individuals and organizations alike, with attackers 8
using increasingly sophisticated techniques to trick their
victims. Secondly, the most effective countermeasures [5] Babu, P. R., & Bhaskari, D. L. (2010). A
against phishing attacks include a combination of Comprehensive Analysis of Spoofing.
technology-based solutions such as anti-phishing software International Journal of Advanced Computer
and user education and awareness programs. Science and Applications, 1(6).
https://doi.org/10.14569/ijacsa.2010.010623
Thirdly, there is a need for greater collaboration between
industry, government, and academia in developing and [6] Detection of phishing attacks. (2018, March 1).
implementing effective countermeasures against phishing IEEE Conference Publication | IEEE Xplore.
attacks. Additionally, this study highlights the importance of https://ieeexplore.ieee.org/document/8355389
ongoing research and development in this area to stay ahead
of evolving phishing tactics. Overall, this research [7] Elkind, P. (2019, June 27). Sony Pictures: Inside
emphasizes the need for a multifaceted approach to combat the Hack of the Century, Part 3. Fortune.
phishing attacks, including both technological and human- https://fortune.com/longform/sony-hack-final-part/
centered solutions, to mitigate the risks and protect against
potential damage caused by these attacks. [8] Email Phishing, Vishing & Other Types of. (n.d.).
© Copyright 2004 - 2023 Webroot Inc. All Rights
B. Implications for Practice and Research Reserved.
https://www.webroot.com/in/en/resources/tips-
The implications for practice and research in the area of articles/what-is-phishing
phishing attacks and their countermeasures are significant.
From a practical standpoint, organizations need to
implement multifaceted and continuous training programs [9] Phishing attacks: defending your organisation.
for employees to increase their awareness of phishing (n.d.). https://www.ncsc.gov.uk/guidance/phishing
attacks and how to detect and respond to them. Furthermore,
companies need to adopt technical solutions such as two- [ 10 ] phishing attacks Latest Research Papers |
factor authentication, secure email gateways, and anti- ScienceGate. (n.d.).
phishing tools to provide an additional layer of defense https://www.sciencegate.app/keyword/540229
against these attacks.
[ 11 ] Security, P. (2023, February 14). What is an Evil
Organizations should also perform regular vulnerability Twin Attack? - Panda Security Mediacenter. Panda
assessments and penetration testing to identify and Security Mediacenter.
remediate any security weaknesses in their systems that https://www.pandasecurity.com/en/mediacenter/sec
could be exploited by phishers. From a research perspective, urity/what-is-an-evil-twin-attack/
there is a need for more studies that explore the psychology
behind why people fall for phishing attacks and how to [ 12 ] Timm, C., & Perez, R. (2010). Introduction.
effectively mitigate these attacks. Additionally, researchers Elsevier EBooks, xiii–xxi.
need to continue to develop and evaluate new technical https://doi.org/10.1016/b978-1-59749-545-
solutions to prevent and detect phishing attacks. Overall, the 5.00011-2
findings from this comprehensive study suggest that
combating phishing attacks requires a multifaceted and [ 13 ] What Is a Phishing Attack? Definition and Types.
collaborative approach that involves both technical and non- (2023, March 22). Cisco.
technical countermeasures. https://www.cisco.com/c/en_in/products/security/e
mail-security/what-is-phishing.html
References [ 14 ] Wikipedia contributors. (2022). 2021 Microsoft
Exchange Server data breach. Wikipedia.
[1] A Study of Preventing Email (Spear) Phishing by https://en.wikipedia.org/wiki/2021_Microsoft_Exc
Enabling Human Intelligence. (2015, September hange_Server_data_breach

IJRAR23B1376
View publication stats
International Journal of Research and Analytical Reviews (IJRAR) 31

You might also like