Page 72 - index
P. 72







With the latest report in 2014, 27 websites in Hong Kong reported to be bogus and having
phishing scripts implied on them. Therefore whenever, we login for our online banking account,
we always have been encountered by a webpage showing “Beware of Phishing”, just because
72% bank accounts are compromised due to Phishing or Social Engineering.



2. Vishing Attack


It comprises of the words “Voice and Phishing”, in this attack hacker gains access to the victim’s
data just by having a telephonic conversation and intimating to be called up from a trustworthy
person and due to human biases, victim rely on him and shares all the confidential data with the
hacker. This attack only needs two things, confidence and soft spoken personality.

Mostly, hackers spoof their caller id with the authentic caller id, in order to seem a call from a
legitimate source using VoIP or IVR so that their work should also be bit easier.

A case in New Delhi, India is been most prominent where a person called 57 persons in the
local region having bank accounts in common branch and gain their net-banking passwords
posing them, that he is being calling from bank’s side and get away with approx. 49 crore
rupees.



3. SmiShing


This term is introduced with the combination of SMS Phishing, where attacker spoofs an SMS
sender’s id and sends it to the victim in order to claim the passwords, ATM pins and many more.
Usually attackers send a message “Your Net Banking account has been used from an unknown
location and Rs. 1,00,000/- has been transacted, for details call #2222221118888*** (any
number) immediately.”

Actually these attacks are bit rare but they have the highest success rate and 9 out of 10 SMS
phishing attacks are successful. In 2012, walmart has also issued a Fraud Alert as someone
baiting of $1000 gifts.



4. Baiting Attack

This attack is having high success rate due to one reason i.e. Human nature of greediness.
Baiting attack is actually when a hacker uses some physical media dangling something that an
attacker wants to entice. Generally, we all having a nature that if something alluring seems to
us, we just need to have it and that is where attacker actually attacks.

Usually, attackers binds their malwares, virus, trojans with some important files or implanted in
USBs or CDs and as the victim insert it to PC, these malwares automatically gets installed into it
in the background process not even been known to the victim and they got hacked even without
72 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   67   68   69   70   71   72   73   74   75   76   77