31.07.2015 Views

Download

Download

Download

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

need that many.These calculations assumed five seconds for each SMTP transaction and thateach e-mail would go to only one recipient.You can group your e-mail distribution andsend one e-mail to an e-mail server that goes to 100 names on a distribution list.You can seethat even the estimate of 1 billion spam e-mails a day is conservative.Phishing attacks have been analyzed by the Financial Services Technology Consortium(FSTC). Figure 2.8 illustrates a Phishing Operation Taxonomy. It is used with the permissionof the Financial Services Technology Consortium (FSTC) and taken from Understanding andCountering the Phishing Threat, published by the FSTC on 01/31/2005.Figure 2.8 FSTC Phishing Attack TaxonomyBotnets Overview • Chapter 2 47Each heading in Figure 2.8 represents a phase in the life cycle of a phishing attack.Theentries under each life cycle phase represent actions that may take place during that phase.This phase-based approach allows us to examine activities taken by the botherder/phisherfor opportunities to intervene. Starting from the left, a botherder participating in phishingattacks would plan the attack by selecting the targets (the financial institution, the victim,and which credentials to go after), selecting the ruse or scam to try, deciding how to carryout the scam by choosing a method from the list in the attack phase, and determining whatthe goal of this fraud will be. In the setup phase, the phisher creates materials (phishing e-mails and Web sites), and obtains e-mail addresses of potential victims and sets up the attackmachinery (botnets, Web pages, template servers, socks proxies). Note that a socks proxy is a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!