Wednesday, May 31, 2017

What Are The More Common Phishing Malware Attacks

    Phishing means sending email messages that comes from supposed to be reliable sources but the end result is to get important information from the user’s data. This could mean getting hold of the user’s personal banking accounts and even your credit cards. The user can be fooled by clicking a link that leads them to go to a website and they are told to update personal information. This is a fraudulent website that will steal the user’s information.
   Here Are Some Common Phishing Malware Attacks

1. Deceptive Phishing  - it is a type of phishing scam  where  cybercriminals imitate and copy a legal website. It’s purpose is to steal a person’s confidential information. Mostly they will issue threats and emergency that will make you do what these cybercriminals want.

2. Pharming - This kind of attack emanates from the Domain Name System.  It will now use the DNS servers to convert alphabetical website names to numerical services in order to look for computer services and machines. This cybercriminal will set his sights on a DNS server and he will now alter the IP address related to the alphabetical website name. This is  a way which the cybercriminal can redirect users to a malicious website that they have chosen. This can happen even if they enter the right website name.

3.  Dropbox Phishing - Dropbox is a legitimate site where you can keep your files safe. Cyber criminals will try to trick computer users into entering their log in credentials on a fraudulent DropBox sign that is also hosted by Dropbox.

4. Session Hijacking – This kind of attack will track down the user’s actions until they will sign in into a fixed account and divulge their personal information. When this is done, the malicious malware will be in control and make unauthorized actions and the user will never know about it.  There can be money transfer made and this will surely hurt the user.
5, System Reconfiguration Attacks – It will deviate the user setting on your PC.  It will be used  for malicious purposes.  URL’s in your favorite’s file will be altered to deviate users  to a similar looking website.

6.  DNS Poisoning. -Batch files can modify the transfer zones by editing the host s.txt file that stays inside  ‘C;\windows\system32\drivers\etchosts.txt.’ It will lead you to malicious websites instead of going to a valid website. This can be used for phishing because this is a look alike of the original website and credentials can be stolen.

7. Search Engine Phishing – it happens when cybercriminals create websites that look extremely good  - looking. You can find them on search engines. They seem to be valid and you can find the when you are looking for products and services. Users are deceived into giving important credentials and information.

8 Man In The Middle Phishing – This is very difficult to unearth. Hackers are in the middle of the user and the valid website. They will note down and record all user transactions that have been entered. They will pass it on and the transactions are not put into peril. Eventually, they will sell all the information or they might even use it . this will happen when the user is inactive on the system.

No comments:

Post a Comment

What Is IoT and How Will It Enhance Businesses

    Everyone must have heard the word Internet of Things by now, but do you know what it really means. IoT stands for the connection of dev...