The Phishing Process by Christopher Cranston
Department of Computer and Information Sciences, University of Strathclyde, Glasgow
Strathclyde University and Associates - Most phishing attacks take four distinct steps toward defrauding unwary
recipients: (1)...
More
The Phishing Process by Christopher Cranston
Department of Computer and Information Sciences, University of Strathclyde, Glasgow
Strathclyde University and Associates - Most phishing attacks take four distinct steps toward defrauding unwary
recipients: (1) the scam operators set up the phishing website.
This website usually imitates an established, legitimate
site; (2) using guessed or copied email addresses, the scammers send out emails purporting to come from the legitimate
site; (3) the recipient downloads their email and receives the phishing message.
The email asks the user to click on a
hyperlink and enter personal details on the resulting website.
If the user clicks on the hyperlink the phishing site will
be displayed.
If duped, the user may then enter the requested personal information; (4) the recipient s personal details
are now held by the scam operators.
The scammers may now assume the identity of the recipient and gain illicit access
to funds.
These steps are elabora
Less