AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise...

33
AWARENESS OF PHISHING SCENARIO Name Of The Presenter: Vasileios Fotis Month Year: Nov 2020

Transcript of AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise...

Page 1: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

AWARENESS OF PHISHING SCENARIO

Name Of The Presenter: Vasileios Fotis

Month Year: Nov 2020

Page 2: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

PHISHING DEFINITION

Page 3: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

• Acquisition of confidential data

• Persuade to provide sensitive data

• Access account information and

results in:

➢ identity theft

➢ financial loss

• Uses Social Engineering

Definition

3

Page 4: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

➢What is it?

Exploiting the generally trusting nature of people

4

Social engineering

• Vishing

• Pharming

• Communication Spoofing

• Tailgating

• Dumpster diving

• Shoulder surfing

Offline

• Bulk phishing (aka phishing)

• Spear phishing

• Whale phishing (whaling)Online

Page 5: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Offline:• Smishing• Vishing• Pharming• Communication

Spoofing• Tailgating• Dumpster diving• Shoulder surfing

5

Social engineering

Page 6: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Offline:• Smishing• Vishing• Pharming• Communication

Spoofing• Tailgating• Dumpster diving• Shoulder surfing

6

Social engineering

6

Page 7: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Offline:• Smishing• Vishing• Pharming• Communication

Spoofing• Tailgating• Dumpster diving• Shoulder surfing

7

Social engineering

7

Page 8: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Offline:• Smishing• Vishing• Pharming• Communication

Spoofing• Tailgating• Dumpster diving• Shoulder surfing

8

Social engineering

Page 9: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Offline:• Smishing• Vishing• Pharming• Communication

Spoofing• Tailgating• Dumpster diving• Shoulder surfing

9

Social engineering

Page 10: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Types:

➢ Online:• Bulk phishing

(aka phishing)• Spear phishing• Whale phishing

(Whaling)

10

Social engineering

Page 11: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Bulk phishing (aka Phishing)

• Sending emails

purporting to be from

reputable sources

• General attack: it is

like spam email, sent

to a large pool of

people

11

Categories of phishing

Page 12: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Spear Phishing

• sending emails

ostensibly from a

known or trusted

sender to targeted

individuals

• Specific Attack: sent

from a person who we

know in order to make

the email more

trustful

12

Categories of phishing

Page 13: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Whale phishing (Whaling)

• Sending email to

wealthy, powerful, or

prominent individuals.

• Specific Attack:

addressed to people

by whom it is possible

take greater

advantages because

of their hierarchy

position

13

Categories of phishing

Page 14: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

PHISHING ATTACK KILL CHAIN

Page 15: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

15

Main stages of the phishing attack

• Receive an email (phishing, spear phishing, whaling)

• Trusted sender

#1 Social engineering

• Specific request with a deadline

• Website to visit

• Attachment to download

#2 Call to action

Users enter personal

information fill out in Websites

perfectly imitated

3# Malicious website

• Identity theft

• Free access and operations

#4 Scammer uses

information gained

Page 16: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

• Enhance effectiveness of

the attack itself by

undertaking advantage

from

✓ human weak behaviours

✓ habits

✓ believes

16

Importance of social engineering in a phishing attack

Humans are more

likely to comply with

a request under

certain

circumstances

Page 17: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

PHISHING IS STILL SO POPULAR

Page 18: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

❑ First step to other cyber threats

• Malware

• Botnet

• Spam

• Information leakage

• Data breaches

Who is using phishing and the need to use it

18

Weak counter-

measures

Impersonating employees

Access gained to internal systems

SCAMMERSperson who commits fraud

Page 19: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

➢ Employees have not enough awareness-> Attacks based on social engineering

-> Only one person necessary to have a successful attack

➢ Sophisticated and targeted attacksHarder to detect

Phishing increasingly threat

19

Page 20: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

➢ Business processed are targeted

❑76% of businesses have reported

being a victim of a phishing attack

❑ 33% of breaches included social

attacks

❑ 29% of breaches involved use of

stolen credentials (Symantec)

❑ 94% of malware was delivered via

email (Verizon Data)

Latest statistics (2019-2020)

20

Page 21: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

➢ Criminals use COVID19 phishing

emails.

WHO reported that at the beginning of

the pandemic everyone got spoofed

➢ Hackers hiding behind file sharing

services: phishing emails

impersonating Microsoft SharePoint

and OneDrive.

Latest Phishing Trends

21

Page 22: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

CYBERWISER HANDS-ON SCENARIO

Page 23: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Phishing attack exercise

23

Page 24: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

1. Verify the sender’s address

2. Verify the recipient’s address

3. Hover over the link

4. Don’t trust a company you don’t do business

with

5. Notice grammatical error

6. Don’t click on any links

7. Don’t open any attachments

24

User actions to identify Phishing indicators

1

12

Page 25: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

1. Verify the sender’s address

2. Verify the recipient’s address

3. Hover over the link

4. Don’t trust a company you don’t do business

with

5. Notice grammatical error

6. Don’t click on any links

7. Don’t open any attachments

25

Identify Phishing indicators

1

4

4

6

6

Page 26: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

1. Verify the sender’s address

2. Verify the recipient’s address

3. Hover over the link

4. Don’t trust a company you don’t do business

with

5. Notice grammatical error

6. Don’t click on any links

7. Don’t open any attachments

26

Identify Phishing indicators

63

5

Page 27: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

1. Verify the sender’s address

2. Verify the recipient’s address

3. Hover over the link

4. Don’t trust a company you don’t do business

with

5. Notice grammatical error

6. Don’t click on any links

7. Don’t open any attachments

27

Identify Phishing indicators

1

2

7

7

1

Page 28: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

User actions evaluation on handling an email

• Open an email: +1

• Open a link or an attachment in a legitimate email: +1

• Report a malicious email to the SOC: +1

• Delete of a malicious email: +1

• Open a link or an attachment in a malicious email: -1

• Report a legitimate email to the SOC: -1

• Delete of a legitimate email: -1

28

Page 29: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

User Performance evaluation tool

29

Page 30: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Economic Risk evaluation

30

Page 31: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Phishing attack exercise

• Identify phishing indicators in an email.

• Distinguish phishing from legitimate emails.

• Understand the right actions to be taken when receiving a phishing email.

• Understand the importance of having training on cyber risks topics.

31

Page 32: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.

Exercise presentation

32

Page 33: AWARENESS OF PHISHING SCENARIO - CYBERWISER.eu · 2020. 11. 19. · Phishing attack exercise •Identify phishing indicators in an email. •Distinguish phishing from legitimate emails.