Social Engineering Phishing
Social Engineering Phishing
Social Engineering Phishing
Social Engineering
Phishing
Billy Gargita
Effin Alfianto
Nirwanda Pacchuzi Silaban
Discussion
IDENTIFY
PROTECT
points DETECT
RECOVER
CONCLUSION
What's Phishing
Phishing is a cyber attack that uses email as a tool. Its purpose is to trick email
recipients into believing the message is something they want or need
to click on a link or download an attachment.
Whaling Vishing
Whaling is an even more targeted type of phishing than Vishing or Voice phishing is a type of attack carried out
just spear phishing as it goes after the whales, the BIG over the telephone and utilizes Voice Over Internet
fish. Protocol (VOIP) technology.
How Phishing
STEP 1 STEP 2
The modified files are The phishing kit is Emails are sent with
bundled into a zip file to uploaded to the hacked links pointing to the new
make a phishing kit website, files are spoofed website
unzipped
There are a couple of different ways to break attacks down into categories. One is by the purpose of
the phishing attempt. Generally, a phishing campaign tries to get the victim to do one of two things:
Phishing emails can be targeted in several different ways. sometimes they aren't targeted
at all emails are sent to millions of potential victims to try to trick them into
logging in to fake versions of very popular websites.
How to Identify
IT’S POORLY WRITTEN THERE’S A SUSPICIOUS ATTACHMENT THE MESSAGE IS DESIGNED TO MAKE YOU PANIC
Read the email and check for The attachment could contain a It is common for phishing emails to instill
spelling and grammar mistakes, as malicious URL or trojan, leading to panic in the recipient. The email may claim
well as strange phrase changes. If the installation of a virus or that your account may have been
you receive an unexpected email malware on your PC or network. compromised and the only way to verify it is
from a company, and the email is Even if you think an attachment is to enter your login details. Make sure you
full of errors, this can be a strong genuine, it’s good practice to really think about whether an email asking
indicator that the email is actually always scan it first using antivirus you something makes sense. If you are
phish. software. unsure, please contact the company via
another method.
Turn on 2-Step Verification
PROTECT against
With 2-Step Verification (two-factor authentication), you add
an extra layer of security to your account in case your
password is stolen.
Phishing Scams
Install an Anti-Phishing toolbar
This won't block all phishing messages, but will reduce the
number of phishing attempts.
Be cautious about all Do not click on any links Do not enter personal
communications you listed in the email message, information in a pop-up
receive. If it appears to be a and do not open any screen. Legitimate
phishing communication, do attachments contained in a companies, agencies, and
not respond. Delete it. suspicious email. organizations don't ask for
personal information via
pop-up screens.
RECOVERING FROM PHISHING ATTACK
Make a Back-up