What Are The More Common Phishing Malware Attacks
Phishing means sending email messages that
comes from supposed to be reliable sources but the end result is to get
important information from the user’s data. This could mean getting hold of the
user’s personal banking accounts and even your credit cards. The user can be
fooled by clicking a link that leads them to go to a website and they are told
to update personal information. This is a fraudulent website that will steal
the user’s information.
Here Are Some
Common Phishing Malware Attacks
1. Deceptive Phishing
- it is a type of phishing scam
where cybercriminals imitate and
copy a legal website. It’s purpose is to steal a person’s confidential
information. Mostly they will issue threats and emergency that will make you do
what these cybercriminals want.
2. Pharming - This kind of attack emanates from the Domain
Name System. It will now use the DNS
servers to convert alphabetical website names to numerical services in order to
look for computer services and machines. This cybercriminal will set his sights
on a DNS server and he will now alter the IP address related to the alphabetical
website name. This is a way which the
cybercriminal can redirect users to a malicious website that they have chosen.
This can happen even if they enter the right website name.
3. Dropbox Phishing -
Dropbox is a legitimate site where you can keep your files safe. Cyber criminals
will try to trick computer users into entering their log in credentials on a
fraudulent DropBox sign that is also hosted by Dropbox.
4. Session Hijacking – This kind of attack will track down
the user’s actions until they will sign in into a fixed account and divulge
their personal information. When this is done, the malicious malware will be in
control and make unauthorized actions and the user will never know about
it. There can be money transfer made and
this will surely hurt the user.
5, System Reconfiguration Attacks – It will deviate the user
setting on your PC. It will be used for malicious purposes. URL’s in your favorite’s file will be altered to
deviate users to a similar looking
website.
6. DNS Poisoning. -Batch
files can modify the transfer zones by editing the host s.txt file that stays
inside ‘C;\windows\system32\drivers\etchosts.txt.’
It will lead you to malicious websites instead of going to a valid website. This
can be used for phishing because this is a look alike of the original website
and credentials can be stolen.
7. Search Engine Phishing – it happens when cybercriminals
create websites that look extremely good - looking. You can find them on search engines.
They seem to be valid and you can find the when you are looking for products
and services. Users are deceived into giving important credentials and
information.
8 Man In The Middle Phishing – This is very difficult to unearth.
Hackers are in the middle of the user and the valid website. They will note
down and record all user transactions that have been entered. They will pass it
on and the transactions are not put into peril. Eventually, they will sell all
the information or they might even use it . this will happen when the user is
inactive on the system.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home