Document 9387706

advertisement
[Type text]
[Type text]
[Type text]
A Trip to the Phishing
Hole
By
Joshua Curtis
For
Al Paparoni
A Trip to the Phishing Hole
Joshua Curtis
Table of Contents
Executive Summary....................................................................................................................................... 2
Ethics ............................................................................................................................................................. 3
What is Phishing? .......................................................................................................................................... 4
Usability ........................................................................................................................................................ 5
Phishing Incidents ......................................................................................................................................... 6
Conclusion ..................................................................................................................................................... 7
Bibliography .................................................................................................................................................. 7
1
A Trip to the Phishing Hole
Joshua Curtis
Executive Summary
In this report, the idea of ethics is briefly outlined, and the method of
phishing is related to it. Basically, ethics is the study of right and wrong, and
phishing is definitely wrong. After that, phishing, tricking someone into giving
information is explained; what it is, how it’s done, what it accomplishes, that sort
of thing. In short, phishing is done by sending a fake email that can include a link
to a fake website that convinces victims to give their information. Usually,
successful phishing can result in financial loss or personal violation. A couple of
recent phishing related incidents are outlined following that. These incidents
were very destructive in nature. In conclusion, phishing is a very unethical,
dangerous way of getting information.
2
A Trip to the Phishing Hole
Joshua Curtis
Ethics
Ethics refers to the study of morality and right and wrong. These morals
usually decide a group or person’s behavior and actions. To be ethical is to act
properly and be considerate of others and oneself. An example of ethical behavior
is to, like the famous line, “Give credit where credit is due”. On the other hand,
being unethical is almost like being unfair. Acting without reason, not telling the
truth, et cetera, are all examples of being unethical. In short, ethics is the
difference between right and wrong.
In regards to my report, ethics can refer to how phishing is unethical (which it
is). Obviously, taking someone’s information and using it for oneself is wrong and
terribly unethical. In this report, the information about phishing that I have found
will be presented.
3
A Trip to the Phishing Hole
Joshua Curtis
What is Phishing?
Phishing is the illegal act of stealing ones financial (private) information by
posing as a trustworthy entity. Usually this is done through links to seemingly
legitimate websites or surveys. An example of phishing can be seen below.
Usually, a small error can be seen in a phishing email or message. Like the
misspelling of “received” in this example. But for the most part, phishing is pretty
hard to recognise.
4
A Trip to the Phishing Hole
Joshua Curtis
Usability
From a technical standpoint, phishing is a pretty good way to acquire
information. It’s really useful and can trick quite a few individuals. When people
see something that looks clean, polished, and secure at the first glance, the
phisher has them on a hook and reeled in. Phishing is dangerous in that aspect.
Perhaps the scariest part of phishing is that it’s very easily accessible and
relatively easy to do. All our phisher needs to do is create a website that looks
similar to the original, send an official-looking email with an official-looking link,
and then our information is right at their fingertips. It doesn’t require rocket
science; just some creativity and intuition.
However, phishing is not a perfect method. It relies upon people’s stupidity
and disregard for reading long paragraphs. As soon as someone actually examines
the email or message, the phisher doesn’t get their information. The operation
failed. If a computer user were to discover something that looks fishy and out of
place, the phisher is done. The phisher needs to be very careful. They cannot slip
up.
Phishing can lead to many negative things including; financial loss due to
exposed account information, account loss for the same reason, and even
violence because of given addresses and the like. Phishing may sound tame, but it
can actually be very dangerous if given the chance.
5
A Trip to the Phishing Hole
Joshua Curtis
Phishing Incidents
Phishing is a real threat that businesses and other companies face. Like I
said, phishing is an effective way of getting what one wants. And of course,
people are going to take advantage of it. As a result, there have been several
cases regarding phishing in the past. Allow me to outline a couple of these
destructive happenings.
Back in 2007, there was a national cybercriminal case that regarded
phishing. 47 Egyptians and 53 Americans were charged later on, in 2009, for being
part of “Operation Phish Phry”. Basically, these 100 men and women tricked
thousands of E-mail service customers into giving away their credentials. Mostly,
the members of this operation collected banking information. Luckily the FBI was
able to catch them before they did too much damage. Regarded as the largest
national cybercrime case ever, Operation Phish Phry was a very destructive and
dangerous case of phishing.
In April 2013, a very important journalist fell for a phony phishing email
claiming to be from Twitter. This phisher was able to hack his Twitter account and
put out a tweet, saying that there was an explosion at the White House. Of
course, there really wasn’t, but it caused a chain reaction anyway. Because
everyone trusted that there truly was an explosion, $136.5 billion dollars was
erased from the S&P index’s value. So because of this relatively simple phishing
scandal, the stock markets took a large fall.
6
A Trip to the Phishing Hole
Joshua Curtis
Conclusion
Phishing is a very dangerous method of getting what one wants, and should
be looked out for. It is unethical, and there are better ways of obtaining
information, but people phish anyways because it’s easy to do. In short, phishing
is an unethical, destructive way of getting information for personal gain.
Bibliography
Phishing. (2015, March 5th). Retrieved March 6th, 2015, from Wikipedia, the free encyclopedia:
http://en.wikipedia.org/wiki/Phishing
Phishing. (2015, March 5th). Retrieved March 6th, 2015, from Wikipedia, the free encyclopedia:
http://upload.wikimedia.org/wikipedia/commons/d/d0/PhishingTrustedBank.png
Claburn, T. (2009, June 10th). 100 Phishers Charged In Largest Cybercrime Case. Retrieved March 6th,
2015, from DARKReading: http://www.darkreading.com/attacks-and-breaches/100-phisherscharged-in-largest-cybercrime-case/d/d-id/1083775?
Ethics, M. L. (2014, July 11th). Medical Laboratory Ethics. Retrieved March 6th, 2015, from Linkedin:
https://media.licdn.com/mpr/mpr/p/8/005/072/182/006fb46.jpg
Takahashi, K. (2013, April 30th). How Easy Was it for a Routine Phishing Scam to Rock Global Financial
Markets? Retrieved March 5th, 2015, from Return Path: http://blog.returnpath.com/blog/kentakahashi/how-easy-was-it-for-a-routine-phishing-scam-to-rock-global-financial-markets
7
Download