By Ahmad Zaki

Introduction to Phishing
It is becoming increasingly common to tune in to the news or load your favorite news Web site and read about yet eanother Internet e-mail scam. An e-mail scam is a fraudulent e-mail that appears to be from a legitimate eInternet address with a justifiable request ² usually to verify your personal information or account details. One example would be if you received an e-mail that appears to eebe from your bank requesting you click a hyperlink in the email and verify your online banking information. Usually there will be a repercussion stated in the e-mail for not efollowing the link, such as "your account will be closed or suspended". The goal of the sender is for you to disclose personal and (or) account related information. This type of phishing. e-mail scam is also called phishing.

social security. is a variation on "fishing .What is Phishing? The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. and bank account numbers. the idea being that bait is thrown out with the hopes that while most will ignore the bait. . also referred to as brand spoofing or carding. such as passwords and credit card. is bogus and set up only to steal the user¶s information. however. some will be tempted into biting. The e-mail directs the euser to visit a Web site where they are asked to update personal information. The Web site. that the legitimate organization already has. Phishing.

Since hackers have a tendency to replacing "f" with "ph" the term phishing was derived. . The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users.When and Where is Phishing created? The word phishing comes from the analogy that Internet scammers are using e-mail lures to fish for passwords and financial data from the sea of Internet users.

. This is why phishing is profitable for scammers.Who i behi thi hi hi ? The people behind phishing e-mails are scam eartists. newsgroups or on a Web site) is more susceptible to phishing as the e-mail address can be saved by spiders that search the Internet and grab as many e-mail eaddresses as they can. they can cheaply and easily access millions of valid e-mail addresses to esend these scams to. They literally send out millions of these scam e-mails in the hopes that even a few erecipients will act on them and provide their personal and financial information. e-mail address that has been made public on the Internet (posting in forums. Any ephished. Anyone with an e-mail address is at risk of being phished.

but will in fact take you to a spoof Web site. Looks can be deceiving.How to pot hi hi ? At first glance. and the clickable link may also appear to be taking you to the company's Web site. it may not be obvious to the recipients that what is in their inbox is not a legitimate e-mail from a company ewith whom they do business. The "From" field of the e-mail may have the . but with phishing scams the e-mail is enever from who is appears to be! .com eaddress of the company mentioned in the e-mail.

Phishing e-mails will econtain some of these common elements: (view screen capture from Eudora) .

random names or e-mail addresses in the body of the text. The "From Field" appears to be from the legitimate company mentioned in the e-mail. this may also state something like "Log-in to Citibank" or "" to be "Logeven more misleading. or even e-mail eeheaders which have nothing to do with the company mentioned in the eemail. however. percentage signs followed by numbers or @ signs within the hyperlink. Note that the hyperlink does NOT point to the legitimate Citibank Web site URL. Additionally. that it is very simple to echange the "from" information in any e-mail client.citibank. spelling errors. It is important to note. In the image you will see that once the hyperlink is highlighted. This clickable area is only text and can be changed to anything the sender wants it to read. While we're not going eto tell you how. the bottom left of the screen shows the real Web site address to which you will go. the text you click is "here". However.      . rest assured it can be done in a matter of seconds! The e-mail will usually contain logos or images that have been taken from ethe Web site of the company mentioned in the scam e-mail. In this instance. eThe e-mail will contain a clickable link with text suggesting you use the einserted link to validate your information. you may spot some of these elements that did not appear in this particular scam: Logos that are not an exact match to the company's logo.

Are there a y ew hi h? The New Phish . the perpetrators find ways to make the attack a little different. Once hackers get this data they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link. Spear phishing scams will often appear to be from a company's own human resources or technical support divisions and may ask employees to update their username and passwords. The newest type of phishing scam is one that focuses on a single user or a department within an organization. make the phish harder to net. which deploys spyware that can steal data. The Phish appears to be legitimately addressed from someone within that company.Spear Phishing As with all malicious code. . in a position of trust. once a small percentage of the population starts to catch on. and this case. and request information such as login IDs and passwords.

Many companies do want to eknow if their company name is being used to try and scam people. you can also send details of a phishing scam to to the Anti-Phishing AntiWorking Group who is building a repository/database of common scams to help repository/database inform people of the risks. Additionally. Once you have e-mail. and depending on where you live. you can evisit the Web site of the company from whom the e-mail appears to be from and etake the time to notify them of the suspicious e-mail. First of all. you can report phishing to the Federal Trade Commission (FTC). The golden rule to avoid being phished is to never ever click the links within the text of the e-mail. This will provide you with accurate einformation about your account and allow you to completely avoid the possibility of landing on a spoof Web site and giving your information to someone you shouldn't. I hope that you will be able to spot a phishing e-mail without etoo much difficulty. If. This will eeprevent "accidental" clicks from happening as well. For those truly worried that an account may be in jeopardy if you do not verify your information. Lastly. Now that you know how to avoid being phished. some local authorities may also accept Internet phishing scam reports. for some really odd reason you have this nagging feeling that this could just possibly be a legitimate e-mail eand nothing can convince you otherwise. edeleted the e-mail then empty the trash box in your e-mail client as well. Always delete the e-mail immediately. and you'll find scam and spoof reporting links within some of these Web sites.Common (phish) Sense (phi h) After reading this far. there is still the question of what to do about phishing e-mails should you be a recipient of them. you still need to adhere to the golden rule and not click the link in the message. . you need to open your Web browser program of choice and type the URL to the Web site in the address field of your browser and log on to the Web site as you normally would (without going through the e-mail link as a quick route).

com www.Reference  .

Sign up to vote on this title
UsefulNot useful