View on GitHub

AAU Network Security

A collection of relevant background information!

The basic idea

Most people have at some moment received the infamous phishing email in their mailbox. Perhaps it is an email from a Nigerian prince that asks you to transfer a small amount of money, promising a reward later. Or maybe it is an email from a ‘Dankse Bank employee’ asking you to provide your credit card on ‘http://dånsksebånk.dk’.

Whatever variant you have encountered before, the purpose of these so called phishing attacks is to obtain sensitive information through electronic communication. The sensitive information can be anything from passwords to credit card information, or from company secrets to social security numbers.

Perhaps the most well-known variant of a phishing attack is sending legitimately looking emails to a victim. In this email, the victim is asked to enter sensitive information on some website. This website in turn looks very similar to a legitimate website, but is in fact under the control of the attacker - or the phisher.

Phishing techniques

People are more inclined to disclose their social security numbers or creditcard number if they believe that they are actually interacting with a real, legitimate person or website. Phishers use different techniques to improve the realism, or trustworthiness of their phishing attacks, of which the following are just a few examples: