BYU logo Computer Science
CS 465 Introduction to Security and Privacy

Phishing

Ungraded Quiz

  • What is the difference between phishing and spear phishing?
  • Why is phishing still prevalent after so many years of trying to stop it?

Types of Phishing Attacks

  • phishing: tricks a person into visiting a fraudulent version of a legitimate website, with the goal of obtaining sensitive information — passwords, banking information, credit card details

  • spear phishing: targeted to a particular individual or organization

    • can be more convincing since it is targeting an individual
    • attacker will research the target in advance
    • can purport to come from a known contact or include reference to known information
  • whaling: targeted to higher-level management

  • see Crowdstrike explanation and examples

Phishing enablers

  • mental model: a person’s understanding of how a system works and what it does

    • influences a person’s security-related decisions / threat model
    • phishing may exploit flaws in a person’s mental model
    • software developers (especially working in security) should try to align their software with mental models
  • URLs by design hide the actual link

  • typosquatting

  • redirects

  • web design that looks like the authentic website or “looks trustworthy”

  • copycate domains, like paypal-security.com or pay.pal.com

  • misunderstanding that the lock icon means a site is “safe”

Phishing defenses

  • spam filtering

  • domain filtering

  • user education

  • notes of interest

    • transient phishing sites are a problem
    • once users are on a fraudulent site, even experts have a hard time detecting this

Security indicators

Usable security

Extra reading on phishing