Phishing

Phishing is a form of social engineering attack that aims at encouraging internet users to reveal sensitive information such as bank login credentials and credit card numbers through websites that appear legitimate. Attackers, in this case, pretend to be companies or acquaintances that send messages containing links to phishing websites. Ollmann (2004) conducted a survey that revealed 57 million internet users received phishing emails in the United States and 2 million victims were compromised. Another survey revealed that there were 1,862 data breaches in 2021, with each breach costing businesses an average of $4.65 million (Fowler, 2022). This study discusses the types of phishing attacks, their implications, challenges and ways of identifying and preventing them.

Phishing attacks in the airline, education and healthcare sectors in the United States led to losses of about US$100 million (Sadiq et al., 2021). Attackers used email phishing to steal workers’ login credentials and personal information. Phishing attacks can be reduced and prevented by educating employees, changing passwords regularly, avoiding unknown links to suspicious websites, installing firewalls, updating browsers, using antivirus software and verifying websites’ security. Web extensions can also be used to warn users when they attempt to log in to malicious websites through compromised URLs. Companies can also use modern technologies to prevent their networks from accessing unapproved or suspicious websites.

In 2020, 88% of cybersecurity experts reported an increase in phishing attacks. Phishing attacks trigger data breaches which have significant consequences for any organization. Facebook, Google, Ubuquiti Networks, FACC and Crelan Bank have experienced phishing attacks leading to combined losses of $283 million. In addition, phishing attacks lead to reputational damage, business disruption and regulatory fines. Victims of phishing attacks risk financial loss, corrupted files, and shared documents.

Internet users and organizations should be aware of the types and techniques used in phishing. Phishing attacks aim to encourage users to visit fake websites where they are required to enter login credentials or sensitive information. Attackers may use multiple attack vectors but their end goal is the same (Chiew et al., 2018). Phishing attempts to exploit the gullibility of internet users to steal confidential data (Hong, 2012). Once cybercriminals upload a virus to a victim’s computer, they steal sensitive data such as passwords and login credentials for malicious purposes (Shestak & Pavlyukova, 2020).

Email phishing is where an attacker sends fraudulent messages that contain links to malicious websites. These links direct users to websites that are very similar to legitimate websites, but often have misspelled domain names or extra domains. These phishing emails often have infected attachments, misspelled email addresses, and create a sense of urgency (Jakobsson, 2005). Internet users are advised to avoid opening or downloading unfamiliar documents, hovering over links in emails using a mouse, and clicking links in emails from unfamiliar senders. 

Malicious links are very common and successful in tricking users through phishing attacks (Mansfield-Devine, 2018). CISCO revealed that 86% of organizations in 2021 had at least one employee clicking a phishing link (CISCO, 2021). Cybersecurity experts are working on devising ways of identifying these malicious links to reduce cases of phishing and ransomware attacks. However, progress in preventing these attacks is relatively slow since attackers are always finding new ways of manipulating internet users. It is also difficult to defend against highly sophisticated attacks from multiple threat actors.

Phishing is a persistent problem because businesses encounter more cybersecurity problems everyday which requires greater defense. There is no single strategy or solution to prevent all phishing attacks. This leaves internet users vulnerable to cyber criminals who can manipulate them into revealing sensitive information. Organizations should educate their employees on phishing attacks to promote awareness and reduce successful attacks. They should also use effective anti-phishing, anti-malware and anti-spam software to prevent malicious messages from reaching employees. Internet users should avoid using public hotspots to access websites with faulty and unsigned certificates because they allow attackers to successfully access and steal confidential information (Bauer et al., 2008). 

Smishing is a type of phishing attack that is conducted over mobile text messaging. Cybercriminals use malware or fraudulent websites to deceive their victims into revealing sensitive information. They send text messages to several internet users hoping that some users will click on the links provided in the messages. The acquired personal data is then used to commit cybercrimes such as fraud. Smishing victims can be sent text messages that seem to be from their bank asking them to provide financial or personal information such as their ATM or account number and pin. Internet users should carefully check the senders’ numbers, use multifactor authentication, avoid responding to unknown senders and call their banks directly when in doubt.   

In the Ishikawa diagram below, the first event, failure incident, is located on the far-right section of the diagram. The identified causes of failure are:

1.      Ineffective firewalls                                         10. Insecure desktop tools

2.      Ineffective spyware detectors                          11. Unverified source addresses

3.      Poor security protocols                                   12. Ineffective spam filters

4.      Insider threats

5.      Ineffective anti-phishing software

6.      Ineffective pop-up blockers

7.      Lack of user awareness

8.      Phishing-based Trojans

9.      Ineffective anti-malware software

 

 

 


In

 

 

 

 

 

 

 


Fig 1: Ishikawa diagram

The flow chart below analyzes the process that can be used to identify phishing attacks. It analyzes how a message can be used to conduct a phishing attack. The new message in a user’s inbox marks the beginning of the flow chart. The flow chart has decision steps to guide users on making the correct decisions in the event of a dilemma.

            Failure in preventing phishing attacks can be caused by:

i.                    Ineffective firewalls                                        

ii.                  Ineffective spyware detectors                      

iii.                Poor security protocols                            

iv.                Insider threats

v.                  Ineffective anti-phishing software

vi.                Ineffective pop-up blockers

vii.              Lack of user awareness

viii.            Phishing-based Trojans

ix.                Ineffective anti-malware software

x.                  Insecure desktop tools

xi.                Unverified source addresses

xii.              Ineffective spam filters

 

 

 

 

 

 

 

 

Text Box: Phishing Point
 

 

 

 

 


             No

  

 


Flowchart: Decision: Conveys urgent message                                                       Yes

 

Text Box: Phishing PointText Box: Phishing Point                            Yes

 


                                                                                                                                                       No

Flowchart: Decision: Does the link go to a legit site?                                                       No                                                                                   

Flowchart: Decision: Contains a linkText Box: Hover over the link to see its true destination                                                                     

                                                                         Yes

                                                                       

Flowchart: Decision: Asks for personal data                                                        No

 

Text Box: Phishing Point                   Yes                                                                     Yes

 

Text Box: The message is probably safe                                                           No

 

Figure 2: Flow chart diagram

After identifying the causes of phishing attacks, the group developed the failure analysis table shown below.

Event number

       Failure cause

Assessment

      Assignment

1

Ineffective Firewalls

Unknown

Automatically track network traffic

2

Ineffective spyware detectors

Unknown

Use spyware that provide full protection across networks and devices

3

Poor security protocols

Unknown

Develop effective security protocols

4

Insider threats

Unknown

Perform regular security awareness training

5

Ineffective anti-phishing software

Unknown

Regularly update anti-phishing software

6

Ineffective pop-up blockers

Unknown

Use updated pop-up blockers

7

Lack of user awareness

Unknown

Educate internet users on phishing

8

Phishing-based Trojans

Unknown

Use effective spyware software

9

Ineffective anti-malware software

Unknown

Use effective and updated anti-malware software

10

Insecure desktop tools

Unknown

Use secure desktop tools

11

Unverified source addresses

unknown

Only visit websites with verified source addresses

12

Ineffective spam filters

Unknown

Purchase effective spam filters

 

Table 1: Failure Analysis Table

Phishing has for long been a persistent problem in cybersecurity. Phishing attacks is the most common method of stealing sensitive information from internet users. Cybersecurity experts have deployed several countermeasures to prevent phishing attempts but cybercriminals have always found ways of getting around them by exploiting weaknesses in their defenses (Garera et al., 2007). The literature used in this report have all been in agreement about the state and nature of phishing. This study has discussed the types of phishing attacks and how they affect organizations. It also provides information on how organizations can identify and mitigate phishing attacks.

 

 

 

 

 

 

References

Bauer, K., Gonzales, H., & McCoy, D. (2008, December). Mitigating evil twin attacks in 802.11. In 2008 IEEE International Performance, Computing and Communications Conference (pp. 513-516). IEEE.

Chiew, K. L., Yong, K. S. C., & Tan, C. L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications106, 1-20.

CISCO. (2021). Cyber security threat trends: phishing, crypto top the list. https://cloudmanaged.ca/wp-content/uploads/2021/09/2021-cyber-security-threat-trends-phishing-crypto-top-the-list.pdf

Fowler, B. (2022). Data breaches break record in 2021. https://www.cnet.com/news/privacy/record-number-of-data-breaches-reported-in-2021-new-report-says/#:~:text=The%20number%20of%20reported%20data%20breaches%20jumped%2068%20percent%20last,of%201%2C506%20set%20in%202017.

Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007, November). A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode (pp. 1-8).

Hong, J. (2012). The state of phishing attacks. Communications of the ACM55(1), 74-81.

Jakobsson, M. (2005, February). Modeling and preventing phishing attacks. In Financial Cryptography (Vol. 5). Security: Terms, Laws, Threats and Protection. In 2021 International Conference on Computing Sciences (ICCS) (pp. 148-151). IEEE.

Mansfield-Devine, S. (2018). The ever-changing face of phishing. Computer Fraud & Security2018(11), 17-19.

Ollmann, G. (2004). The phishing guide understanding & preventing phishing attacks. NGS Software Insight Security Research.

Sadiq, A., Anwar, M., Butt, R. A., Masud, F., Shahzad, M. K., Naseem, S., & Younas, M. (2021). A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0. Human behavior and emerging technologies3(5), 854-864.

Shestak, V., & Pavlyukova, E. (2020, May). Phishing Attacks: Legal Regulation in the USA. In Shestak, VA & Pavlyukova, EV (2020). Phishing attacks: legal regulation in the USA. Technology of the XXI century in jurisprudence: Materials of The Second International Scientific-Practical Conference (22 May 2020). Yekaterinburg: Ural State Law University.

  

Comments

Popular posts from this blog