02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DID: 4046925<br />

UNCLASSIFIEO....FOR OFFIGIAL I:JSE m4LY<br />

<strong>web</strong>page and paste it into <strong>the</strong> query box, hit return, and <strong>the</strong> hidden address will be<br />

revealed.<br />

Sites to De-obfuscate URLs<br />

URL Decrypter<br />

Un-Obfuscating URLs<br />

http://www.cyber-junkie.com/tools/urldecrypter.shtml<br />

http://www.wilsonmar.com/1tcpaddr.htm<br />

You must be very careful to avoid becoming "phish food" because <strong>the</strong> scams are<br />

increasingly sophisticated and hard to detect. Banks, lending institutions, insurance<br />

companies, and legitimate account holders of any kind (eBay, PayPal, Amazon,<br />

etc.) never send requests for account information via email. If you are in doubt<br />

about any request for information via email, do not click on <strong>the</strong> link in <strong>the</strong> email.<br />

Instead, open your browser, type <strong>the</strong> uri of <strong>the</strong> company's home page into <strong>the</strong><br />

browser's address bar and go to <strong>the</strong> site that way. Then you can log into your<br />

account and see if <strong>the</strong>re is really a need for you to do anything. You can also use an<br />

online tool to de-obfuscate uris to determine <strong>the</strong> real address of any urI. Phishing is<br />

a form of <strong>the</strong> con game discussed later.<br />

Ano<strong>the</strong>r potentially dangerous type of phishing scam involves fraudulent e­<br />

commerce <strong>web</strong>sites that lure searchers to <strong>the</strong>ir sites, which present malware<br />

disguised as legitimate-looking images of a product supposedly for sale. The<br />

"image" is in fact a self-extracting zip (compressed) file that installs a Trojan horse<br />

on <strong>the</strong> user's computer, usually in order to steal personal and financial data. Be wary<br />

of any site that asks you to "click here to download images." This is an especially<br />

difficult scam to detect because many legitimate sites offer users <strong>the</strong> option to<br />

download image files (though usually not zipped files). The phishing sites<br />

purportedly are offering very inexpensive products, so if an offer looks too good to<br />

be true or if it looks in any way "phishy," it's best to avoid it.<br />

A new type of attack gained prominence in 2006: "voice phishing" or vishing.<br />

Vishing is a type of phishing scam that uses VolP (voice over Internet Protocol)<br />

phone numbers to trick users into providing <strong>the</strong>ir private information. Unlike<br />

traditional telephone numbers, it is relatively easy to get a VolP number<br />

anonymously. "That makes it easier for scammers to carry out <strong>the</strong>se vishing scams.<br />

In some ways, vishing may be even more dangerous than phishing scams, because<br />

consumers are used to entering private information into automated phone<br />

systems."193<br />

Vishing indicates that as consumers wise up to scams such as phishing, bad people<br />

come up with creative new ways to separate you from your money (and sometimes<br />

your identity). One reason it's so easy to use a vishing scam is that some<br />

193 Issue #189, Scambusters.org, 26 July 2006, (12<br />

December 2006).<br />

554 UNCLASSIFIEOhTOR OFFIGIAL I:JSE ONLY

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!