create account

The What and Why of Phishing, and How to Avoid It by robrigo

View this thread on: hive.blogpeakd.comecency.com
· @robrigo · (edited)
$3.62
The What and Why of Phishing, and How to Avoid It
Salutations Steemians,

In this post I'm going discuss what phishing is, why it exists, and also give you some tips to avoid being phished. Considering the amount of value the Steem platform is generating, I think it's likely we could see phishing attacks attempting to capture the credentials of Steemit users. I'll also discuss a free tool my employer just launched to the public today that can be used to simulate phishing attacks and assess how at-risk your organization is to phishing, and the potential impact of a data breach.

![The Phisherman](https://ipfs.pics/ipfs/QmWjfdT3w9mSsc6mdKSuZjykN3GUoqRVTbtFDbWwbWu5N8)
[*Image source*](https://duo.com/blog/introducing-the-access-of-evil)

## What is phishing?
Phishing is a social engineering attack that exploits people's willingness to click on links, open attachments, or approve permissions in order to deliver drive-by malware or trick people into giving up their account credentials. Phishing is an especially effective method of compromising accounts, and it works because it takes advantage of human factors, such as greed, fear, curiosity, and human error in order to trick people into giving up the goods. 

A targeted phishing attack that is crafted to breach a specific person is known as spear phishing.

## How can you identify a phishing attack?
The best behavior to adopt in order to mitigate phishing is to **always check the URL domain**. You can do this by hovering over the link, then verifying the domain isn't different by looking in the bottom left corner of your browser. The most common phishing vectors are email and social media messaging. A swath of different phishing approaches exist. Next, I'll go over a few of the major types.

### Impersonation
![CEO phishing](https://ipfs.pics/ipfs/QmPrM1yHVa85J44jvoae479BqaKLPAEFhaBRfdYoEeAnXP)
Image source: Phishme

On the internet, people aren't always who they say they are. It's okay to trust, but always verify! Just because your email client tells you an email was sent from someone, doesn't necessarily mean that it was. It's possible to spoof the sender's information to trick people into believing they are receiving an email from someone that they trust.

### Disguise
LastPass
![LastPass](https://www.seancassidy.me/images/lastpass_login.png)
LostPass
![LostPass](https://www.seancassidy.me/images/lostpass_login.png)
Many phishing pages look exactly the same as a trusted page. This password manager phish is very convincing. Can you spot the difference? This is a common method used to capture credentials by impersonating login pages.

### Ransomware
![Ransomware email](http://cdn2.mobilesiri.com/wp-content/uploads/2016/02/locky-ransomware-email-with-attachment.png)
Don't download attachments that you don't expect without verifying authenticity out of band, even if they appear to originate from people you trust. They could encrypt your files and hold your data for ransom!

These are just a few examples, there are many others.

## Tips and tricks to prevent succumbing to a phishing attack
1. Employ a [web of trust extension](https://www.mywot.com/) to provide a signal as to the authenticity of a website.
2. Always double check the URL domain of websites before you visit them. Watch out for domains that are intended to look similar to a real domain, but are actually fake. Some techniques that these domains employ include:
    * **Bitsquatting**, which anticipates a small portion of systems encountering hardware errors, resulting in the mutation of the resolved domain name by 1 bit. (e.g., zteemit.com).
    * **Homoglyph**, which replaces a letter in the domain name with letters that look similar (e.g., steernit.com).
    * **Repetition**, which repeats one of the letters in the domain name (e.g., steemiit.com).
    * **Transposition**, which swaps two letters within the domain name (e.g., tseemit.com).
    * **Replacement**, which replaces one of the letters in the domain name, perhaps with a letter in proximity of the original letter on the keyboard (e.g, steenit.com).
    * **Omission**, which removes one of the letters from the domain name (e.g., stemit.com).
    * **Insertion**, which inserts a letter into the domain name (e.g., steeemit.com).
    * **Missing dot**, which removes a dot from the domain name (e.g., steemitcom.com).
    * **Singularization or Pluralization**, which adds or removes ā€œsā€ at the end of the domain name (e.g., steemits.com).
    * **Vowel swap**, which replaces a vowel within the domain name (e.g., steamit.com).
    * **Wrong TLD**, which replaces the top-level domain suffix (e.g., steemit.co).
[Read more about domain variations](https://zeltser.com/domain-name-variations-in-phishing/)
3. Sound the alarm. If you detect a phishing attack, tell others in your organization so they can avoid it.
4. Use [DMARC](https://dmarc.org/) to prevent your domains from being used in a phishing attack.
5. If you're prompted for account permissions, double check that you're on the proper website. 
6. Beware of emails that sound too good to be true (No, you didn't really win $10,000 and you aren't really going to get a free annual gym membership).
7. Keep your browser software up to date to patch it against the latest security vulnerabilities. Chrome tries to automatically handle this for you (sometimes you need to go to Settings > About Chrome to complete the update).
8. Un-install browser plugins, such as Flash and Java, that have a [history](https://helpx.adobe.com/security/products/flash-player.html) of being vulnerable. This reduces the likelihood of installing drive-by malware by a lot!

## Quantify how at-risk your company is to phishing with Duo Insight
Duo has just launched [Insight](https://insight.duo.com/) to the public, which is a free tool that allows companies to assess how susceptible they are to data breach by means of phishing. This tool makes it quick and easy to set up a phishing campaign, and the quantitative report it provides is a good way to build a case for implementing stronger security controls and practices in your organization. We'd love to hear your feedback about this tool. You can read more about it [here](https://duo.com/blog/now-available-duo-insight-a-tool-to-help-organizations-identify-phishing-risks). Duo Insight does not store any credentials captured during phishing campaigns.

**DISCLAIMER: I work for Duo, but my personal opinions on Steemit.com are not representative of Duo's views. This post is intended to inform the Steemit community of a potential attack vector they may face in the future.**

#steemit #phishing #duo
šŸ‘  , , , , , , , , , , , , , , , , , , , , , , , ,
šŸ‘Ž  
properties (23)
authorrobrigo
permlinkthe-what-and-why-of-phishing-and-how-to-avoid-it
categorysecurity
json_metadata{"tags":["security","steemit","phishing","duo"],"image":["https://ipfs.pics/ipfs/QmWjfdT3w9mSsc6mdKSuZjykN3GUoqRVTbtFDbWwbWu5N8"]}
created2016-07-12 20:34:45
last_update2016-07-12 20:38:12
depth0
children7
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value3.184 HBD
curator_payout_value0.435 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length6,588
author_reputation36,085,196,360,202
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id88,009
net_rshares9,307,870,215,226
author_curate_reward""
vote details (26)
@condra ·
$0.03
Just discovered this post. I'm going to link it as "further reading" in my latest post about phishing. 

https://steemit.com/steemit/@condra/public-wallets-and-the-target-on-your-back-original-article

I do think phishing represents a huge challenge for Steemit and crypto going forward.
šŸ‘  
properties (23)
authorcondra
permlinkre-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160725t024208539z
categorysecurity
json_metadata{"tags":["security"],"links":["https://steemit.com/steemit/@condra/public-wallets-and-the-target-on-your-back-original-article"]}
created2016-07-25 02:41:57
last_update2016-07-25 02:41:57
depth1
children0
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.020 HBD
curator_payout_value0.007 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length287
author_reputation56,189,611,335,832
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id337,297
net_rshares23,647,335,253
author_curate_reward""
vote details (1)
@michaelx · (edited)
Excellent post and full of great info as always @robrigo !!!

Here are some posts to help you get more traction and exposure to your Steemit posts, startup, business or self:

**[[HOW TO] Public Relations Training For Startups, Steemers & Steemit: PART 1](https://steemit.com/public/@michaelx/public-relations-training-for-steemers-and-steemit)**

**[[HOW TO] Public Relations Training For Startups, Steemers & Steemit: PART 2](https://steemit.com/marketing/@michaelx/public-relations-training-for-startups-steemers-and-steemit-part-2)**

**[[HOW TO] Public Relations Training For Startups, Steemers & Steemit: PART 3](https://steemit.com/marketing/@michaelx/how-to-public-relations-training-for-startups-steemers-and-steemit-part-3)**

Please let me know if there is anything I can do to help you become more successful!

Oh and followed you too!
šŸ‘  , , , ,
properties (23)
authormichaelx
permlinkre-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160712t203635415z
categorysecurity
json_metadata{"tags":["security"],"users":["robrigo"],"links":["https://steemit.com/public/@michaelx/public-relations-training-for-steemers-and-steemit"]}
created2016-07-12 20:36:24
last_update2016-07-12 20:36:48
depth1
children2
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length847
author_reputation10,068,003,664,289
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id88,019
net_rshares23,497,953,152
author_curate_reward""
vote details (5)
@robrigo ·
Thank you @michaelx. I'll give your articles a read this evening.
properties (22)
authorrobrigo
permlinkre-michaelx-re-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160712t205507094z
categorysecurity
json_metadata{"tags":["security"]}
created2016-07-12 20:55:06
last_update2016-07-12 20:55:06
depth2
children1
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length65
author_reputation36,085,196,360,202
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id88,166
net_rshares0
@michaelx · (edited)
Thank you sir.  

Good to see you from the BTS forum.  If you don't put a space after you @robrigo tag someone it won't work currently for some punctuation.
šŸ‘  ,
properties (23)
authormichaelx
permlinkre-robrigo-re-michaelx-re-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160713t003319932z
categorysecurity
json_metadata{"tags":["security"],"users":["robrigo"]}
created2016-07-13 00:33:09
last_update2016-07-13 00:33:45
depth3
children0
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length156
author_reputation10,068,003,664,289
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id89,250
net_rshares116,140,960
author_curate_reward""
vote details (2)
@oholiab ·
That chrome-extension phish is a really nasty one and  was probably super easy to do... chrome should totally be adding some builtin protection for things like that because it's particularly insidious. They should probably have a CA and associated cert generated by the browser in-memory on each startup to sign all local pages which will display a special padlock indicator so you at least have a visual prompt for when you're not on your actual settings pages.

Or something more sensible.
šŸ‘  ,
properties (23)
authoroholiab
permlinkre-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160713t112456984z
categorysecurity
json_metadata{"tags":["security"]}
created2016-07-13 11:24:54
last_update2016-07-13 11:24:54
depth1
children1
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length491
author_reputation1,894,810,279,063
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id94,128
net_rshares42,523,567,860
author_curate_reward""
vote details (2)
@robrigo ·
Agreed, thankfully LastPass has taken some steps to make it harder to pull off.
properties (22)
authorrobrigo
permlinkre-oholiab-re-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160713t145614217z
categorysecurity
json_metadata{"tags":["security"]}
created2016-07-13 14:56:15
last_update2016-07-13 14:56:15
depth2
children0
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length79
author_reputation36,085,196,360,202
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id96,042
net_rshares0
@tjpezlo ·
thanks for this, it takes vigilance to curb it...
šŸ‘  ,
properties (23)
authortjpezlo
permlinkre-robrigo-the-what-and-why-of-phishing-and-how-to-avoid-it-20160726t175040656z
categorysecurity
json_metadata{"tags":["security"]}
created2016-07-26 17:50:45
last_update2016-07-26 17:50:45
depth1
children0
last_payout2016-08-25 04:02:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length49
author_reputation11,144,454,418,634
root_title"The What and Why of Phishing, and How to Avoid It"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id380,075
net_rshares29,306,665,001
author_curate_reward""
vote details (2)