PHISHING
Presented by Abhinav Goyal
20232303
Topic Outline
1 Introduction
2 What is Phishing?
3 Methods of Phishing
4 Red Flags
5 Impacts of Phishing
6 Case Studies
7 Safeguarding Against Phishing
What is Phishing?
Phishing is a type of cyber attack where individuals
or organizations are tricked into revealing sensitive
information such as usernames, passwords, credit
card numbers, or other personal details by
impersonating a trustworthy entity in an electronic
communication. This can be done through email,
instant messaging, social media, or even phone
calls. The attackers typically use tactics such as
creating fake websites or emails that appear to be
from legitimate sources like banks, online
retailers, or government agencies, aiming to
deceive recipients into providing their confidential
information. Phishing attacks are a common
method used by cybercriminals to steal identities,
financial information, and other valuable data.
METHODS OF PHISHING
Spear Phishing
Targeted attacks on specific individuals or organizations,
often using personalized information to enhance credibility
and increase the likelihood of success.
Email Phishing Clone Phishing
The most prevalent form, where deceptive Attackers create replicas of legitimate emails,
emails impersonate trusted sources to modifying links or attachments to install malware or
extract personal or financial data from extract sensitive information
unsuspecting recipients.
RED FLAGS
URGENT OR THREATENING LANGUAGE
Phishing attempts often create a sense of urgency
or use threatening language to prompt immediate
action. Phases like “urgent action required”,
“account suspended" or "your account will be
deleted" may indicate a phishing attempt.
SUSPICIOUS SENDER INFORMATION
Check the sender's email address or social
media profile. Phishing emails or messages
often use generic or suspicious email
addresses that do not match the legitimate
entity they claim to represent.
RED FLAGS
REQUEST FOR PERSONAL INFORMATION
Legitimate organizations do not request personal
information, such as usernames, passwords, or
credit card numbers, via email, social media, or
other online means. Be cautious of any request for
personal information.
MISSPELLING AND GRAMMATICAL
ERRORS
Phishing emails or messages may contain
misspellings, grammatical errors, or
awkward phrasing. Legitimate organizations
usually have professional communications
and do not contain obvious errors.
RED FLAGS
SUSPICIOUS LINKS OR ATTACHMENTS
Be cautious of links or attachments in emails or
messages from unknown or untrusted sources.
Hover over links to check their actual destinations,
and do not click on suspicious links or download
attachments that you were not expecting.
GENERIC GREETINGS
Phishing emails may use generic greetings
like "Dear Customer" instead of addressing
you by your name. Legitimate organizations
often personalize their communications with
your name or other relevant information.
IMPACTS OF PHISHING
Financial Losses Reputational Data Breaches
Damage
Phishing scams can Successful
result in significant Falling victim to phishing attempts
financial phishing can tarnish can lead to data
repercussions for the reputation of breaches,
individuals and businesses and compromising
organizations, individuals, personal and
leading to theft of impacting trust and
sensitive
funds or sensitive credibility.
information.
data.
CASE STUDIES
PayPal Phishing Scam
A fraudulent email impersonating PayPal requested urgent verification
of account details, leading to financial theft from unsuspecting
recipients.
CASE STUDIES
Corporate Data Breach
An employee fell victim to a spear phishing attack, resulting in a
significant data breach and financial losses for the organization.
CASE STUDIES
Personal Identity Theft
A phishing email disguised as a bank notification led to the
compromise of personal banking information, resulting in identity
theft.
SAFEGUARDING AGAINST PHISHING
Email Security Two-Factor
Verification Software Authentication
Install and Implement two-
Always verify the
regularly update factor
authenticity of
reputable antivirus authentication for
emails, especially
and antimalware email and other
those requesting
software to detect sensitive accounts
sensitive
and prevent to add an extra
information or
phishing attempts. layer of security.
immediate action.
Thank you for
listening!