WHAT IS PHISHING | HOW DOES PHISHING WORK
Today I will write for something very powerful in hacking that is what is phishing. This is one of the most illegal techniques in hacking.
Hi guys, I am Jatin Gupta and Today's article is going to be very interesting so let's dive in. Phishing is a very common technique which is used in data theft. Hackers make a fake page of any website and send it to the victim by using any kind of source like a phony mail. Victim thinking that this is an official mail or massage and open the phishing website which is fake but looks similar to original and input there username and password and do login. Now the username and password are sent to the hacker and the victim redirects to another website as per hacker choice what he mentions in the PHP code of its fake website. By using this trick hacker tries to get some sensitive information such as username, password, credit card details and etc. Theses piece of information are used to access valuable accounts and the result is identity theft and loss in money.
The first legal action of phishing is filed in 2004 against a teenager who makes a fake page of an Americain website name "America Online" and he is able to get username, password, and credit card details to withdraw money.
COMMON TYPES OF PHISHING ATTACK
1. DECEPTIVE PHISHING
It is the most common type of phishing fraud. In this type of attack, hackers try to steal data like usernames and passwords of peoples of legitimate companies. Those mail contain some special type of content which make user scare and doing what the attackers want. Let's take an example an attacker sends a phishing email that contains a link of fake bank page and the user opens that link and inputs his username and password, now it redirects to another website and the username and password go to the attacker.
2. SPEAR PHISHING
In this type of attack, the attacker makes an attack mail-in realistic way like they add victim name, address, phone number, company, work and other information to attempt the trust of a victim that is, the mail is from an official. The goal is the same as deceptive phishing, even so, stunt the victim into tapping on a malicious URL or any attachment with the mail to steal the important data of the victim.
3. VISHING
In this type of attack, attackers use phone calls instead of emails to steal personal information from the victim. Attackers use Voice over Internet Protocol to manic various identity to steal confidential information. To protect against this kind of attack please avoiding to attempt the call from an unknown number and do not share any kind of personal information over the call.
4. SMISHING
In this type of attack, attackers use text message which contains malicious content and trick user to click on that malicious link and steal their personal information. To protect against this kind of attack, please avoid clicking on any link in any text message from an unknown source.
HOW DOES PHISHING WORK
Well, Most of the phishing mail form credit card company, bank, amazon, Facebook and other companies. These mails also looking authentic and attempt to get the victim to reveal their confidential information. Actually, email is not the only source of a piece of phishing. Basically, it is a five-step process first the fisher has to target the business and determine how to get the mail IDs of the customers of that company. Second, now fishers have to create the method of sending the message and collecting the data. Third, they have to execute the attack by sending a phony message that appears to be from an official source. Fourth, now the attacker has to record the information that victim input in the webpage. Fifth and the last step is the attacker use that information to make illegal purchases basically it is a case of identity theft and fraud.HOW TO PREVENT PHISHING
There are some specific properties of phishing emails:-
- The email content looks like a generalized way of addressing.
- The mail is not from any official source.
- When you click on the link it redirects to a fake page that has a different URL or not original URL. let's look at phishing examples a fake page of Facebook may fave an URL like www.facbook.com or www.facebok.com which are look similar to the original Facebook URL.
Conclusion
So this is how phishing work and how to prevent phishing I hope you like the article. So always be careful when dealing with phishing scams.😃

0 Comments