Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/361541692

An Overview of Phishing and Its Indian Perspective

Conference Paper · June 2022

CITATIONS READS

0 73

1 author:

Reshmi Maulik
Meghnad Saha Institute of Technology
3 PUBLICATIONS 8 CITATIONS

SEE PROFILE

All content following this page was uploaded by Reshmi Maulik on 26 June 2022.

The user has requested enhancement of the downloaded file.


An Overview of Phishing
and Its Indian Perspective
Reshmi Maulik
Meghnad Saha Institute of Technology
Techno India Group
Kolkata, India
reshmimaulik@gmail.com

Abstract— Security is the main concern today all over the world. knowledge about security indicators, visual deception, lack of
As new measures are developed to overcome the existing threat, attention towards security indicators. The study shows that
even newer attacks are launched by the malicious users. 90% of internet users can be fooled by the phishers.
Therefore it seems that discovering new security measures is an Sometimes people, for convenience, use same login name and
ongoing issue. Phishing is one such major threat to the cyber
password to access their different bank accounts. The phishers
world which can bring even the websites of big banks to a halt.
Phishing websites may cause huge financial and confidential can then use this vital information to transfer money from
information loss to major companies. In this paper we have several bank accounts of the user. Therefore, the users are
discussed the different types of phishing attacks, measures taken advised not to divulge their vital information by responding to
to prevent phishing and its impact in India. any fraudulent e-mails that may appear to come from the bank.
Phishing are so widespread nowadays that its name is also
I. INTRODUCTION twisted on the basis of its impact. 'Puddle phishing' targets the
“Phishing” is a word derived from the concept of “fishing customers of regional banks or credit unions [8]. 'Spear
for information”. Phishing means diverting the legitimate phishing' targets customers of individual companies or small
users to a false website, which looks very much like the groups [8].
original website, and make them reveal private credentials Data stolen through phishing has a good demand in the
such as login name and password to the attackers. Later, these underground market of the cyberspace. The underground
attackers use this information to access the user’s account and economy report prepared by Symantec Corporation is a survey
may use it to transfer money from the user’s bank to their own of cyber crime activities [22]. It has categorised the goods and
account or may send spam to the account holder’s friends, etc. services available for sale in the underground economy and
The person who designs the phishing site is called the found that the credit card information category which includes
credit card numbers, credit cards with CVV2 numbers and credit card
phisher. Phishers are very intelligent persons as they try to
dumps is ranked highest and is almost 31% of the total sale of
reproduce the design of the original site by copying the
goods and services. Credit card information is the highest
original website including the logos, images, etc [5]. They
priced item in underground economy. The third ranked
send spam to the customer by impersonating as the sending
category is sale of spam and phishing information which
authority of the original site. These spams are generally
includes email addresses, email account passwords, scams and
official looking and sounding emails and contain links that
mailers and is 19% of total sale. The highest priced item in
require the user to validate their credit card or their online
this category was hosting of phishing scams. Spam software
banking account login details. Therefore, the only intention of
consists of bulk mailers and email address extractors.
these spams is to gain the confidence of the user and make
According to Symantec, phishing and spamming are more
them to click on the embedded link. Upon clicking, the user is
popular activities in the underground economy because of its
directed to the phishing site and is asked to enter security
low restrictions to entry, requirement of few technical skills
information such as login name, password, account number,
and high return on investment on phishing-related goods and
phone number, credit card details etc. Human beings are in
services.
habit of making mistakes. It may also happen that the user, in
hurry, makes a mistake while typing the name of the website The Anti-Phishing Working Group (APWG) is the global
and thus reaches the phishing website, which has a name pan-industrial and law enforcement association focused on
different from, but very similar to, the original site. According eliminating the fraud and identity theft that result from
to Financial Express, it was discovered in February 2006 that phishing, pharming and email spoofing of all types. APWG
the HDFC bank’s website had been cloned and the users were provides the most comprehensive picture of the scale of email-
redirected to www.hadfcbank[sic].com. Dhamija et al. [9] based phishing attacks on the internet. According to Phishing
gives the factors which make phishing attacks successful. The Activity Trends Report Q1 2008 [2], 92.9% attacks are made
factors include lack of computer knowledge, lack of on financial services websites. About 4.77% of websites –
which were classified during Q1 2008 as hosting malicious The capabilities of botnet malwares to make phishing
code in the form of either a phishing-based keylogger or a attacks have also increased. When the infected systems are
Trojan downloader, which downloads keyloggers – are hosted browsing the Internet, keywords typed can trigger the botnets
from India. to redirect the user to some phishing site to steal their personal
data.
Phishing attacks are increasing with an increase of e-
commerce as it requires online transaction and transfer of D. Deceptive Phishing
money via debit card or credit card. Different reports show The victim receives some deceptive emails (spam) from
that phishing is on rise. A reason for this is the greater access trusted authorities or friends. These messages contain some
of the younger generation to the Internet anywhere and at any kind of threats and tell them to change the security settings for
time. They consider it as fun to send some misleading their online bank accounts by clicking on the link given in the
message, such as regarding some terrible attack that is likely message or require them to log on to a remote site. The victim,
to take place in a sensitive place, or to hack some important getting panicked, may step into the phisher's net and may
bank website to get the information of its customers and later reveal their personal security credentials.
use it to get some easy money. New generation is also
addicted very much to the social networking sites. These sites E. Gillnet Phishing
enable users to share personal information, images, videos, etc The phishers introduce malicious codes into the legitimate
with other members of their network. They sometime also use websites or the emails sent to the victim [8]. By browsing the
third party software to customize their page to make it look websites or upon clicking the links given in the emails, a
better than others. However, the popularity of these sites Trojan horse will be introduced in the victims’ system. This
makes them attractive to cyber criminals. The criminals may Trojan horse may also change the settings of the victims’
use the social engineering techniques to lure the users of these computer so that he/she may always be redirected to the
sites to download malwares or to disclose personal phishing websites whenever he/she may want to visit
information. The phishing attacks can also be made legitimate bank websites.
successful by spoofing the social networking pages trusted by
F. Vishing
users. According to AFP report of August 6, 2009, the
microblogging site Twitter, the social networking site Vishing is an emerging threat. The term ‘vishing’ is a
Facebook and search giant Google have recently undergone combination of voice and phishing. Because of social and
denial of service attack and while the latter fended off the technological reach of IP telephony, it is more susceptible to
attacks successfully, the services of the first two sites were phishing attack. The goal of a vishing attacker is first to trap
severely compromised. your confidential personal details and then to use these
illegally trapped information to steal the access right from
individual's bank accounts to corporate treasury. More
II. TYPES OF PHISHING ATTACKSS
avenues of attacks are opening up as many people are using
There are many types of phishing attacks. Some of them services like Skype to send voice messages. Also Interactive
are as follows: Voice Response System (IVRS) based banking services are
A. DNS-Based Phishing ("Pharming") prone to vishing attack. Instead of a website in the case of
phishing, an user can be misled to a wrong phone number to
The phishers tamper with the host site's file names or divulge tele-PINs for banking services.
URLs, so that when the user visits the site they are diverted to
some bogus site. Pharming means manipulating the name III. PHISHING – AN INDIAN PERSPECTIVE
resolution process of the DNS servers on the Internet. According to the CIOL Bureau report [4] on June 20,
Therefore, the victim unknowingly reveals their personal and
2008, India ranked 14th worldwide in hosting phishing
sensitive information to some illegitimate site. websites. Mumbai ranks the highest (38 per cent), followed by
B. Keyloggers and Screenloggers New Delhi (29 per cent) and then Bangalore and Chennai with
People sometime use the computers of cyber café to access 12 per cent each. Business Standard on December 2, 2008 has
their bank accounts. Some of the cyber cafés use software reported that India now ranks 10th in the global list of spam-
keyloggers to capture keyboard events and keystroke data and generating countries. This shows a rising trend in cyber crime.
use them to get credit card information, authentication The leading security software firm Sunbelt Software [21], on
credentials, personal information and the contents of email and August 30, 2007, discovered that Bank of India's hacked
instant messenger. These information may be used later to website was serving dangerous malware. It has also said the
access the customer’s bank account. The screenloggers can be infamous Russian Business Network – an ISP linked to child
used as well to phish information. They record any pornography and phishing – is behind the attack.
information displayed on the screen. Thus the screenloggers Although the above facts show that cybercrime is
can defeat the use of virtual keyboard used by some banks to increasing, the public and private sector banks are actively
prevent the theft of the passwords. improving their security measurements. They have realized
that if they do not improve their security measurements at a
C. Malware-Based Phishing rapid pace and adopt new technology, then they are going to
lose their customers. In a case of NASSCOM vs Ajay Sood must be amended to redefine the articles according to the
and others, the Delhi high court had declared Phishing as an International laws [19], “The rights of the individuals to be
illegal activity on Internet and had allowed the affected protected against interference into his personal life,
person/company to recover the cost of damages [8]. relationships and those of his family by straight physical
Government is now trying to amend the Information resources or by Publication of Information.”
Technology Act 2000, which defines the cyber terrorism, child
pornography, spam, phishing and other online frauds [11]. IV. CYBER SECURITY
Almost 78 cases on an average, related to phishing, are The awareness about cyber security is growing in India but
reported daily. In most of these phishing cases, websites are preventive measures have not been taken yet. India does not
hosted in one country but are registered in another, which have any expertise to tackle the cyber terrorism. Cyber
makes it difficult to disable them [11]. However, both IT Security of India should be an essential part of National ICT
managers and employees of IT industry/BPO in India are least policy and strategy of India. The enforcement of cyber
concerned about the security of the confidential information security can secure the e-governance base whereas cyber
provided by their customer [1]. Also, because of limited forensics deal with finding the loopholes and limitations of the
general awareness in India, even the victim takes time to existing measures to secure the base [14]. Cyber forensic has
realize that he/she has been attacked. Most of the Internet increased its area to incorporate the judicial system so that
users may not have heard about ‘phishing’. Moreover, though serious legal actions can be taken against those who are
the cyber law and IT law were enacted in 2000, the IT involved with cyber terrorism by considering the evidences
industries in India do not even care to register many cases of found against them. Despite some good suggestions from
security violation and thus many incidents go unreported. different levels, Government of India has not yet taken
Most of the cyber crimes took place from cyber cafes. Most sufficient actions in this regard.
cyber cafe owners are not even aware of the types of attacks There have been similar recommendations and demands in
that can be made using their computers. The person running several other countries and India can learn from them too.
the cyber cafes should be more conscious and computer savvy Recently, in a report [15] to the Chairman and Ranking
so that he/she can detect the person who is using his/her Member of the US Senate Committee on Homeland Security
computer to perform any unlawful act. Moreover, police in and Governmental Affairs, Dartmouth’s Institute for
India should be properly educated so that they can detect and Information Infrastructure Protection (I3P) mentioned the
keep a watch over the technical fraud. following four common themes as the core recommendations
India is undergoing a huge technological revolution which for improvement of cyber security:
is forcing it to adopt the Information and Communication 1) A coordinated and collaborative approach is needed.
Technology (ICT) and its benefits. Electronic Governance (e- 2) Metrics for security are a broad enabler and must be
Governance) refers to those governance processes which use developed.
ICT for providing governance related products and services 3) An effective legal and policy framework for security
[18]. Its increased use may lead to enhancement of must be created.
government’s efficiency and improve its relationship with the 4) The human dimension of security must be addressed.
public [13]. However, e-governance requires the existence of a However, the foremost step to defend against any cyber
secure and reliable infrastructure. Without a secure attacks is to update the security features of the application
infrastructure, e-governance can compromise the safety and softwares and operating system so as to protect not only the
privacy of government data, as well as personal data of information but also the infrastructure it resides on.
millions of citizens of the nation.
To build a proper and secure infrastructure, India must
have an appropriate legal system and the present cyber law V. DESIGN PRINCIPLES FOR ANTIPHISHING TOOLS
must be suitably enhanced. According to Praveen Dalal [12], Parno et al. [17] had identified a set of principles for anti-
the leading techno-legal specialist in India and managing phishing tools:
partner of Perry4Law, the major drawbacks of the present
cyber law of India include: (a) Outguess the phisher: Researchers and adversaries are at
a) Non-inclusion of contemporary cyber-crimes and a war. As soon as researchers develop any new technique to
contraventions like phishing, spamming, cyber extortions, overcome the phishing attacks, attackers find the new ways to
compromised e-mails, cyber terrorisms etc. evade those defenses. The security measure developed should
b) An obscure position of Freedom of speech and be so strong that only the most skilled one will be able to
expression under IT Act, 2000. attack it. This will reduce the number of potential attackers.
Before making any changes to the Information Technology (b) Mutual authentication: Both client and server should be
Act, 2000, the conflict between Right to Privacy and the Right able to mutually authenticate each other. In this way, clients
to Information must be resolved [13]. Article 19 (Protection will be confirmed that they are passing sensitive information
of rights regarding freedom of speech, etc) and the Article 21 to the intended receiver and server will be confirmed that the
(Protection of Life and Personal Liberty) of the constitution clients requesting for service are genuine one.
are giving protection to the attackers. The constitution of India
(c) Avoid dependence on the browser’s interface: The new short information like passwords. Also, even with ICICI bank
anti-phishing technique developed should not have much the use of such useful devices is left as an optional choice of
dependence upon the browser. This is because the security the customer. Further, it is deployed only at the topmost level,
related elements displayed on the browser can be easily copied while the later steps for typing passwords are left vulnerable.
for the phishing sites also. Moreover, browser is much This shows the lack of awareness among even the topmost
vulnerable to javascript attacks. banks. The virtual keyboard, while addressing the issue of
keylogging, is still vulnerable to screenlogging.
(d) Reduce reliance on users: The user should not be given
Many banks in Europe have a dual layer of security to
the responsibility of detection of the phishing sites. The
prevent phishing. The ATM card provided by the bank has a
involvement of users should be minimized as far as possible.
chip containing the customer information built into it. A
(e) Forgo network monitoring: This requires monitoring the customer is provided with a small machine, which can read the
transmission of the sensitive data sent by the user. However, information on the chip. When a customer logs on to the bank
attacker may make use of Java applet or other scripting to website and provides the account number, the website offers
encrypt the data sent by user and thereby prevent monitoring back a security number. The customer has to put the ATM
the data. card into the machine and key in the PIN and the security
number. The machine then calculates the answer to the
VI. MEASURES TAKEN TO PREVENT PHISHING security number based on the customer information stored on
the chip and PIN. This answer to the security number is
This is an area of research for past few years. One of the unique to the customer and the customer types it back on the
famous Turing test, CAPTCHA, can only help to protect the website. Since the server of the bank also has the access to the
websites from the bots and prevent them from denial of customer account information and PIN, it can recalculate the
service attacks, but do not provide any security to confidential answer and check for the authenticity. Since the bank website
information of its users from the phishers. Some of the offers a different security number each time, it does not help a
researchers have suggested enhancing the security by phisher to get access to a few answers. The main drawback of
installing browser plug-in on personal computers, see [6, 7] this system is that the customer must carry the machine all the
for details. Many of them have suggested using some kinds of time to access the bank site.
filters to distinguish a phishing site from the genuine site, see ICICI Bank provides a simpler solution to this problem.
[3] for details. Many email service providers have Each debit-cum-ATM card of the bank comes with a grid
implemented these filters which decide whether a particular numbered by alphabets. Each grid contains a two-digit number
email is spam or not. They also allow users to form their and the collection is unique to a customer. At the time of a
customized filters to distinguish emails on the basis of the transaction, the customer is asked to key in the numbers
contents, the subjects or the sender addresses. However, corresponding to three randomly chosen alphabets, other than
phishers are quite intelligent and they keep on changing the the password. Since there are several alphabets, it takes a large
contents of the emails. To protect itself from phishing attacks, number of attempts to know all the numbers even for a
an organization can employ web server log monitor [22]. This keylogger. While this method does not require the customer to
will enable them to track whenever the complete download of carry the machine, after a sufficiently large number of trials, a
their logos and images on the websites will occur. keylogger can identify all the numbers and launch an attack.
Yahoo! has launched a new concept called “sign-in-seal” A new powerful weapon, called DKIM, emerges against
to prevent phishing attacks by allowing users to upload a phishing. Domain Keys Identified Mail (DKIM) is a method
custom logo to the Yahoo login page. The principle is that if of email authentication [16]. DKIM allows an organization to
the user sees his or her custom photo then they will be sure embed a cryptographic signature to the outgoing mails and
that it must be the genuine Yahoo page. However, this also link that signature with its domain name. The signature
method has a big flaw. All the information for Yahoo's sign- travels along with the mail regardless of its path across the
in-seal is stored in the form of cookie. Therefore, if any person Internet. The receiver can use the signature to verify whether
uses public computer then he/she may be at the risk of data the message came from the genuine organization as mentioned
theft as some unauthorized person may use the vital personal in the domain name. Though this technique sounds similar to
information to access his/her account information. Also the pre-existing standards like S/MIME and OpenPGP, the earlier
use of cookie makes the solution local to a specific computer. standards had some problems. The recipient’s mail system
To prevent identity theft based on key logging, ICICI bank should be able to handle signed messages. There is no
has implemented a new feature called ‘virtual keyboard’ in its mechanism to communicate with unknown senders. EBay,
bank website to protect the illegitimate user from accessing PayPal and Yahoo have already started implementing DKIM.
the accounts of the genuine customers. A virtual keyboard is However, this method does not prevent receiver from replay
displayed on the website where the position of the key attack as DKIM neither hide the address of the recipients nor
changes with each login and the user has to enter the password the path through which it travels.
using the virtual keyboard. Use of virtual keyboard protects Clearly, there are several limitations to all the solutions
the legitimate user’s password from malicious “spyware” and provided. More research is required to come up with more
“trojan programs” but also reduces the risk of password theft. user-friendly, yet effective solutions. Also the attackers get
However, such virtual keyboards are only useful for keying in
[9]
smarter with the day. The researchers must also sharpen their Rachna Dhamija, J. D. Tygar and Marti Hearst, “Why Phishing works”,
Proceedings of the SIGCHI conference on Human Factors in computing
tools accordingly to maintain an even fight against the designs systems , Montréal, Québec, Canada ,Pages: 581 – 590, 2006 .
of the phishers. [10]
K. Jaishankar, “Identity Related Crime in the Cyberspace: Examining
Phishing and Its Impact”, International Journal of Cyber Criminology
VII. CONCLUSION (IJCC) , January-June 2008, Vol 2 (1): 10–15.
[11]
Phishing websites are increasing day by day. Jaishankar Sanjay K.Bihani and Stuart Hamilton, “Third Meeting of the Internet
Governance Forum (IGF), in Hyderabad, India”, IFLA Journal, Vol. 35,
[10] quoted Gartner 2007 statistics to warn about an increase No. 1, 59-62 (2009).
in the victims of phishing by 40%. According to CERT-In [12]
Praveen Dalal, “Cyber Law in India Needs Rejuvenation”,
[20], out of 834 security incidents reported during July 2009, http://indianattorney.org/claw.html, 2007.
nearly 7% were phishing incidents and 8% were related to [13]
Sharique Rizvi, “Data Privacy and Right to Information: The
spamming and they comprised the second largest group after Phenomenon of Strategic Control and Conflicting Interests”, in Towards
incidents relating to website compromise and malware Next Generation E-government, Jaijit Bhattacharya, Ed., ICEG07,
Hyderabad, India, December 28-30.
propagation. As India is already at the high position in the hit [14]
Praveen Dalal, “Cybersecurity in India: An Ignored World”,
list of attacks by the phishers, much research is required to be http://www.crime-research.org/articles/Cybersecurity-India-Ignored-
done in this area including development of new measures to World, Computer Crime Research Center, 2007.
counterattack these phishers. [15]
Martin N. Wybourne, Martha F. Austin and Charles C. Palmer,
“National Cyber Security – Research and Development Challenges
REFERENCES Related to Economics, Physical Infrastructure and Human Behavior”,
[1] Institute for Information Infrastructure Protection, Dartmouth, 2009.
Bharat B. Bhagat, and Latika Kharb, “Phishing and Its Indian [16]
Perspective”, The Internet Journal of Medical Informatics, Vol. 3, 2008. Batty Leiba and Jim Fenton, “DomainKeys Identified Mail (DKIM):
[2] Using Digital Signatures for Domain Verification”, IBM Research
Peter Cassidy, “Mapping the Frontiers of Electronic Crime Threat from Report RC23995 (W0606-148) June 30, 2006.
Consumers’ Desktops to National Equities Markets”, Keynote address at [17]
CODEGATE 2008, Seoul, South Korea. Bryan Parno, Cynthia Kuo and Adrian Perrig, “Phoolproof Phishing
[3] Prevention”, in “Financial Cryptography and Data Security”, vol.
Debra L. Cook, Vijay K. Gurbani and Michael Daniluk, “Phishwish: A 4107/2006, LNCS, Springer, Berlin/ Heidelberg.
Simple and Stateless Phishing Filter”, Security and Communication [18]
Networks, Vol. 2, pp. 29-43, 2009. Somesh Kumar Mathur, “Indian IT industry: A Performance Analysis
[4] and A Model for Possible Adoption”, MPRA Paper no 2368, 2007,
CyberMedia India Online Ltd, “India Very Much Home to Phishing Munich, http://mpra.ub.uni-uenchen.de/2368/1/MPRA_paper_2368.pdf.
Websites”, http://www.ciol.com/Technology/Security/Interviews/India- [19]
very-much-home-to-phishing-websites/20608107295/0/, 2008. PUCL v Union of India, [(1997) 1 SSC 301].
[20]
[5]
FraudWatch International Pty Ltd., http://www.fraudwatchinternational. CERT-In, “CERT-In Monthly Security Bulletin”, http://www.cert-
com/phishing-fraud/phishing-web-site-methods/, 2008. in.org.in/knowledgebase/SecurityBulletin/cisb-Jul09.htm, July 2009.
[21]
[6]
Yogesh Joshi, Samir Saklikar, Debabrata Das, and Subir Saha, SunbeltBLOG, “Bank of India Seriously Compromised”,
“PhishGuard: A Browser Plug-in for Protection from Phishing”, IMSAA http://sunbeltblog.blogspot.com/2007/08/breaking-bank-of-india-
2008, Bangalore, India, December 10-12. seriously.html, August 2007.
[22]
[7]
Engin Kirda, and Christopher Kruegel, “Protecting Users against Symantec Corporation, “Symantec Report on the Underground
Phishing Attacks”, The Computer Journal, Vol. 49, No.5, pp. 554-561, Economy”,
2006. http://www.symantec.com/content/en/us/about/media/pdfs/Underground
[8] _Econ_Report.pdf”, November 2008.
N.P Singh, “Online Frauds in Banks with Phishing", Journal of Internet
Banking and Commerce, vol. 12, no.2, August 2007.

View publication stats

You might also like