Phishing Attacks: What Is A Phishing Attack
Phishing Attacks: What Is A Phishing Attack
The email claims that the user’s password is about to expire. Instructions
are given to go to myuniversity.edu/renewal to renew their password within
24 hours.
Several things can occur by clicking the link. For example:
The user is sent to the actual password renewal page. However, while
being redirected, a malicious script activates in the background to hijack the
user’s session cookie. This results in a reflected XSS attack, giving the
perpetrator privileged access to the university network.
Phishing techniques
Email phishing scams
Email phishing is a numbers game. An attacker sending out thousands of
fraudulent messages can net significant information and sums of money,
even if only a small percentage of recipients fall for the scam. As seen
above, there are some techniques attackers use to increase their success
rates.
In addition, attackers will usually try to push users into action by creating a
sense of urgency. For example, as previously shown, an email could
threaten account expiration and place the recipient on a timer. Applying
such pressure causes the user to be less diligent and more prone to error.
Spear phishing
Spear phishing targets a specific person or enterprise, as opposed to
random application users. It’s a more in-depth version of phishing that
requires special knowledge about an organization, including its power
structure.
4. The PM is requested to log in to view the document. The attacker steals his
credentials, gaining full access to sensitive areas within the organization’s
network.
See how Imperva Web Application Firewall can help you with
phishing attacks.
Imperva Login Protect lets you deploy 2FA protection for URL addresses in
your website or web application. This includes addresses having URL
parameters or AJAX pages, where 2FA protection is normally harder to
implement. The solution can be deployed in seconds with just a few clicks
of a mouse. It doesn’t require any hardware or software installation and
enables easy management of user roles and privileges directly from your
Imperva dashboard.
Working within the cloud, Imperva Web Application Firewall (WAF) blocks
malicious requests at the edge of your network. This includes preventing
malware injection attempts by compromised insiders in addition to reflected
XSS attacks deriving from a phishing episode.