Phishing
The term ‘phishing‘ is a hacker term that comes from ‘fishing’, implying that there is a bait and that someone is waiting for a bite from a victim. This is because phishing attacks often involve sending a potential victim some sort of request or message, often forged or made to look like it is from some other individual or company. The ‘bait’ is a message that is a call to action on the victims part, enticing them to give up some private information.
For example: they might send an email claiming to be your bank informing you that your account has been suspended temporarily. However, rather than just telling you to log into your bank’s web software (which is what a real notice from a bank would do), they instead provide a link for you to click on (something that banks will never do) that supposedly is to the bank’s website. Often unbeknownst to the user, this link doesn’t go to the bank’s website, but another website that is made to look exactly like the bank in question. When you enter your username and password to login, you end up giving them to the criminals instead of the bank. This usually isn’t traceable either, because the server hosting the forged bank website is also often a victim of attack or defacement via some sort of vulnerability in their website.
The best way to protect yourself from these sorts of attacks is twofold:
1. Never click on links in emails that go to sites that require a username and a password. Instead, always type out the URL yourself, or use a trusted bookmark that you have in your browser.
2. Never go to websites that require a username and password that don’t also use SSL. SSL protected sites are encrypted, which protects your credentials over the network (more on that below), but they also have a trust mechanism in them, so you can look at the URL to be sure that’s where you want to be. Any site that is at all valuable should use SSL, and your browser will let you know that it is a secure connection. If ever your browser complains about a ‘certificate error’, or something similar, you should immediately close the tab or window with that website.
If you do get a phishing type email, your best bet is to send it to your bank’s online fraud email address. Pretty much every bank has one these days, you can go to your bank’s website (by typing the URL into your browser’s location bar directly) and it should be relatively easy to find. Other than that, you should also delete the email in question.
Trojans
Trojans are often mistaken as ‘viruses’, however they’re very different things. In computer terms, a virus is something that gets ‘attached’ to a benevolent piece of software and somehow exploits a bug to propagate itself. A trojan on the other hand is malevolent software from the get-go — it’s designed and developed specifically to do something positive that the user wants while also doing something malicious that the end user probably didn’t want or intend at all. The name of course, comes from the mythical Greek story about a large wooden horse that allowed the Greeks to conquer the city of Troy. So, like the wooden horse, trojans look benevolent from the outside, but are actually harmful and designed as a means of attack.
The way trojans are used to get your credentials are often by installing key-stroke tracking software on your computer. Once this is done, everything you type is logged and sporadically sent off to a malicious server somewhere where the data is collected and analyzed for specific types of patterns, (credit card numbers, usernames and passwords) or used to gather private information (emails, chats or other typed documents).
Protecting yourself from trojans is getting more difficult these days, since trojan-modified versions of common shareware and freeware software available for download have been found on what were previously thought of as very reputable sites. The best way to protect yourself is to never download software from unknown websites, and treat any executables emailed to you with extreme caution. With very few exceptions, the best course of action is to delete the email and not click on anything inside it, in some cases is better to replace the computer even more if you’re an student and need it for work and you can even go online to sites as computersrusatlanta.com/best-laptops-for-engineering-students/ to find the best options for this.
Honeypots and Network Sniffing
Another common way that criminals get your credentials is via Honeypots. Honeypots are often used by white hat hackers as a tool to catch black hats and criminals in order to study their methods in a relatively safe environment — this is often in a highly secured and segregated segment of a network, so that if the service is attacked and taken over, the criminals won’t be able to do any further damage. The term ‘honeypot’ comes from the idea of using a pot of honey to catch flies — you just leave it out there, and eventually the flies are all stuck in the pot.
However, not all honeypots are run by good guys. Like a trojan, a honeypot is a tool, or service that seems beneficial, however it’s end goal is definitely not. A very common black hat honeypot is a ‘free’ wifi hot-spot. Since they are in control of the hotspot, all traffic is routed and controlled by them. This means that they can give bogus DNS responses and therefore easily route you to forged/malicious websites even if you use your own bookmarks or type URLs directly. Also, any traffic that isn’t encrypted (http instead of https) can be spyed on and collected and analyzed. So passwords or sessions for popular sites that don’t use SSL can be sniffed and hijacked, effectively giving the criminals control over your accounts.
The best way to protect yourself from this sort of attack is very similar to the phishing techniques above. You should never connect to a wifi hotspot that isn’t trusted, and even if it is trusted, while you are using that you should never connect to sites that don’t use SSL for all of their communications. While not available to many people, the best way of all would be to use VPN whenever you are on a public network, including all known/reputable wifi hotspots. Chances are, if you work for a company that has a decent security policy and expects you to connect to their networks from home or on the road, they do (or at least should) provide VPN connectivety.