SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Fraud Alert:
New Phishing Tactics—
and How They Impact
Your Business
Contents
Introduction 	
Phishing Knows No Limits 	

3

Phishing in China: The Rise of APT1	

4

Shared Virtual Servers Remain a Prime Target	

4

Spammers Continue to Take Advantage of Holidays and Global Events	

4

Phishing that Plays on Economic Fears 	

5

Blended Phishing/Malware Threats 	

5

Texting and Mobile Phone Phishing Scams 	

5

How Phishing Could Impact Your Business 	

5

Protecting Your Business	

5

Consumer and Employee Education 	

6

Glossary 	

6

More Information	

7

About Thawte	

2

3

7

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
Fraud Alert:
New Phishing Tactics—and How
They Impact Your Business
Introduction

Phishing Knows No Limits

P

hishing remains a major security threat to businesses and

Phishing—the act of luring unsuspecting people to provide sensi-

their customers around the world—and the threat keeps ris-

tive information such as usernames, passwords, and credit card

ing. Compared to the last six months of 2011, the first six months

data via seemingly trustworthy electronic communications—is an

of 2012 saw a 19 percent increase in global phishing attacks, with

ongoing global threat of massive scale and nearly unlimited reach.

businesses suffering an estimated $2.1 billion in phishing-related
The Anti-Phishing Working Group (APWG) reported at least

losses between January 2011 and June 2012.1

93,462 unique phishing attacks globally in the first half of 2012
Two factors are driving this increase: (1) phishing attacks are

in 200 top-level domains. That represents a significant increase

relatively easy to execute, and (2) they generally work. You don’t

over the first half of 2011, when APWG reported 83,083 phishing

need to be a sophisticated hacker to go phishing on the Internet.

scams—an increase attributed to the prevalence of attacks on

All it takes is a little motivation, malice, and greed, thanks to off-

shared virtual servers. Some 64,204 unique domain names were

the-shelf phishing kits provided by a thriving cybercrime ecosys-

affected in 1H2012, targeting 486 institutions in all (see Figure 1).4

tem. Cybercriminals are even using a business model known as
malware-as-a-service (MaaS), where authors of exploit kits offer

BASIC STATISTICS

extra services to customers in addition to the exploit kit itself.2
Approximately 156 million phishing emails are sent every day, with
some 16 million successfully passing through filters. Roughly 50
percent of the remaining emails—about eight million—are opened,
with 800,000 users lured into clicking on a malicious link. Again,

1H2012

2H2011

1H2011

2H2010

1H2010

Phishing
domain
names

64,204

50,298

79,753

42,624

28,646

Attacks

93,462

83,083

115,472

67,677

48,244

that’s not 800,000 per year. It’s 800,000 per day. To combat such
3

120,000

a massive volume of malicious email, it’s more important than
ever to stay current on the latest methods employed by cyber-

100,000

criminals. Only then can you take proactive steps to protect your
business from fraud.

80,000

In this fraud alert paper, we’ll highlight the current trends in today’s

60,000

phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for
applying technology to protect both yourself and your customers.

1. “Phishing and the Social World,” RSA, October 2012.
2. “Verisign iDefense 2012 Cyber Threats and Trends White Paper,”

Verisign, January 2012.
3. “Phishing: How Many Take the Bait?,” Get Cyber Safe, February 2013.

3

40,000

Figure 1.
Phishing attacks
keep trending up.

20,000
1H2010

2H2010

Attacks

1H2011

2H2011

1H2012

Phishing Domain Names

4. “Global Phishing Survey 1H2012: Trends and Domain Name Use,” Anti
Phishing Working Group, October 2012.	

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
Phishing in China: The Rise of APT1
The majority of phishing attacks appear to originate in China.
This trend reached its peak in the first half of 2011, when Chinese
phishers were thought to be responsible for 70 percent of all malicious domain name registrations worldwide.5
In February 2013, Mandiant published a report on a particularly
destructive group of phishers allegedly operating out of China.
Dubbed “APT1,” this group—which has conducted Internetenabled espionage against a wide range of victims since at least
2006—is almost certainly a government-sponsored campaign
orchestrated by the Chinese People’s Liberation Army (PLA).
According to Mandiant’s research, APT1 has stolen hundreds of
terabytes of data from at least 141 organizations, and has the
ability to steal from dozens of organizations simultaneously. These
highly sophisticated phishers maintained access to each victim’s
networks for an average of 356 days, with one period of access to
a single organization lasting for more than four consecutive years.6

host-based investigative tool. We encourage you to make immediate use of this valuable resource.

Shared Virtual Servers Remain a
Prime Target
Last year, we reported a significant rise in phishing attacks on
shared virtual servers. In these attacks, a phisher breaks into a
web server that hosts large numbers of domains, then places the
phishing content on every domain. As a result, every website on
that server displays the phishing pages, thus infecting thousands
of websites simultaneously.
These attacks diminished during the second half of 2011, but
2012 brought them back with a vengeance: in June alone, APWG
reported a record 7,000 attacks on 44 different virtual servers.9

Spammers Continue to Take Advantage of
Holidays and Global Events
In the run-up to Christmas 2012, spammers once again spoofed

Mandiant’s findings reveal a great deal about the tactics, behav-

a number of legitimate retailers, offering Christmas “deals,” gift

iors, and location of this particular group. In more than 97 percent

cards, and other holiday bait. Some phishers took advantage of

of the instances in which APT1 intruders connected to their attack

Americans’ end-of-year tax anxiety by sending emails claiming to

infrastructure, they used IP addresses registered in Shanghai, with

be from the IRS (Internal Revenue Service).10 And as always, no-

all systems set to the Simplified Chinese language. In 767 sepa-

table global happenings served as a trigger for a rash of scams—

rate instances, APT1 intruders relied on the HUC Packet Transmit

especially the 2012 Summer Olympics in London.

Tool (HTRAN) to communicate between IP addresses and victims’
systems, with all distinct IP addresses registered in China.7

Anti-phishing experts expected to see a major increase in malicious emails leading up to the Olympics,11 and scammers didn’t

The scale and sophistication of the APT1 threat appears to be

disappoint. Over the course of the summer, Zscaler called attention

without precedent. These phishers are clearly part of a large

to a rise in fake Olympic ticketing sites,12 and Omniquad identified

organization with possibly hundreds of human operators manag-

a “lottery scam” masquerading as a British Airways promotion for

ing an attack infrastructure on more than 1,000 servers. Support

the London Games.13 Expect to see similarly malicious attempts to

staff would necessarily include linguists, malware authors, and top

exploit fans’ enthusiasm for upcoming global sporting events like

industry experts.8

the 2013 FIFA Confederations Cup, the 2014 Winter Olympics in
Sochi, Russia, and the 2014 FIFA World Cup in Brazil.

A threat of this magnitude calls for robust, proactive measures to
protect your business and your customers. To help bolster your
defenses against APT1, Mandiant has released more than 3,000
indicators—including domain names, IP addresses, and MD5
hashes—available for download on Redline, the company’s free

5. “Global Phishing Survey: Trends and Domain Name Use in 1H2011,”

APWG, November 2011.	
6. “APT1: Exposing One of China’s Cyber Espionage Units,” Mandiant,

February 2013.	
7. Ibid.	
8. Ibid.	

4

9.  Global Phishing Survey 1H2012: Trends and Domain Name Use,” Anti“
Phishing Working Group, October 2012.	
10. “Christmas and End of Year Tax Phishing Scams,” Northeastern

University Information Services, December 2012.	
11. “Symantec Intelligence Report,” Symantec, January 2012.	
12. “London Olympics: Stay Away from Scams, Data Theft, and Phishing,”

Zscaler, July 2012.	
13. “Omniquad Warns Not to Fall for the London ‘2012 Olympic’ Email

Scam Fraudulently Evoking Both the Games and Their Sponsors,”
Omniquad, August 2012.	

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
Phishing that Plays on Economic Fears
Today’s economic turmoil offers unprecedented opportunities for
criminals to exploit victims’ fears. For instance, popular scams
include emails that appear to be from a financial institution that
recently acquired the target victim’s bank, savings  loan, or
mortgage holder.14 In many cases, consumers are already unsure
about the nature and status of these mergers and acquisitions,
and phishers are eager to exploit that confusion.
The best defense against these scams is simple, clear, consistent
communication with your customers at all stages of any business
transition. The more they understand, the less likely they are to

The typical scam informs the mobile phone user that the person’s
bank account has been compromised or credit card/ATM card has
been deactivated. The potential victim is directed to call a number
or go to a spoofed website to reactivate the card. Once on the
site, or through an automated phone system, the potential victim
is asked for card and account numbers and PIN numbers.

How Phishing Could Impact Your Business
While the financial industry continues to be a primary target for
phishers, it’s certainly not the only sector vulnerable to attack.
Auction sites, payment services, retail, and social networking sites
are also frequent targets, as are cell phone providers and manu-

fall prey to the lures of a scammer.

facturers. In short, no business or brand is inherently safe.

Blended Phishing/Malware Threats

Phishing attacks that pose as your company’s official website

To increase success rates, some attacks combine phishing with
malware for a blended attack model.15 For instance, a potential
victim receives a phishing e-card via email that appears to be
legitimate. By clicking on the link inside the email to receive the
card, the person is taken to a spoofed website which downloads a
Trojan to the victim’s computer. Alternatively, the victim may see a
message that indicates a download of updated software is needed
before the victim can view the card. When the victim downloads
the software, it’s actually a keylogger.
Phishing-based keyloggers use tracking components which attempt to monitor specific actions (and specific organizations such
as financial institutions, online retailers, and e-commerce merchants) in order to obtain sensitive information such as account
numbers, user IDs, and passwords.

Texting and Mobile Phone Phishing Scams
Posing as a real financial institution, phishers are using SMS
(texting) as an alternative to email to gain access to confidential
account information. These so-called “SMiShing” scams grew by
400 percent in the first half of 2012,16 and in November researchers at North Carolina State University identified serious SMiShing vulnerabilities on multiple Android platforms.17 (Once alerted,
Google fixed the SMiShing bug within a matter of weeks.)

diminish your online brand and deter customers from using your
actual website out of fear of becoming fraud victims. In addition to
the direct costs of fraud losses, other risks to your business include:

•	 A drop in online revenues and/or usage due to decreased
customer trust

•	 Potential non-compliance fines if customer data is
compromised
Even phishing scams aimed at other brands can impact your business. The resulting fear caused by phishing can cause consumers
to stop making online transactions with anyone they can’t trust.

Protecting Your Business
While there is no silver bullet, a number of technologies can help
protect you and your customers. Many of the current phishing
techniques rely on driving customers to spoofed websites to
capture personal information. Technology such as Secure Sockets
Layer (SSL) and Extended Validation (EV) SSL are critical in fighting phishing and other forms of cybercrime by encrypting sensitive
information and authenticating your site.
Security best practices call for implementing the highest levels of encryption and authentication possible to protect against
cyber fraud and build customer trust in the brand. SSL, the world
standard for online security, is the technology used to encrypt and

14.  FTC Consumer Alert: Bank Failures, Mergers and Takeovers:
“
A Phish-erman’s Special,” www.ftc.gov	
15. “New Wave of Phishing Attacks Serves Malware to PCs and Macs,”

ZDNet, March 2012.
16. “How to Avoid Becoming a Victim of SMiShing (SMS Phishing),”

Network World, March 2013.
17. “Smishing Vulnerability in Multiple Android Platforms (Including

Gingerbread, Ice Cream Sandwich, and Jelly Bean),” NC State
University, November 2012.	

5

protect information transmitted over the Web with the ubiquitous
HTTPS protocol. SSL protects data in motion, which can be intercepted and tampered with if sent unencrypted. Support for SSL
is built into all major operating systems, Web browsers, Internet
applications, and server hardware.

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
To help prevent phishing attacks from being successful and to
build customer trust, you also need to show customers that you
are a legitimate business. Extended Validation (EV) SSL Certificates are the answer, offering the highest level of authentication
available with an SSL Certificate and tangible proof that the site is

•	 Account status threats
•	 Requests for personal information
•	 Fake domain names/links

indeed legitimate.
Also educate your customers and employees on how to recognize
EV SSL gives website visitors an easy and reliable way to estab-

a valid, secure website before they provide any personal or sensi-

lish trust online by triggering high-security browsers to display a

tive information by:

green address bar with the name of the organization that owns
the SSL Certificate and the name of the Certificate Authority that
issued it.

•	 Looking for the green address bar
•	 Making sure the URL is HTTPS

The green bar demonstrates to site visitors that the transaction is
encrypted and that your business has been authenticated according to the most rigorous industry standards. Cybercriminals cannot
display their own name on the address bar, because the information shown there is outside of their control, and they cannot obtain
a legitimate EV SSL Certificate due to the stringent authentication
process. Extended Validation is simply beyond the power of phishers to exploit.

Get the green address bar

•	 Clicking on the padlock to match the certificate information
with the website they intend to visit
Education plays a key role in building trust. By helping customers
validate their level of safety on your website, you can increase
revenue, stand out from the competition, and even cut operational
costs by moving more transactions online.
But always remember: phishers are tough, shape-shifting adversaries. Their scams will continue to evolve into new forms, while
attempting to take advantage of human behaviors such as compassion, trust, or curiosity. Protecting your brand and your business
from their malicious efforts will always require constant diligence.

Security status bar toggles between your
organization name and the CA that performed
your Extended Validation authentication.

By embracing the latest SSL technologies, keeping up to date on
the newest scams, and choosing a Certificate Authority with the
highest possible standards for online security, you can stay one
step ahead of phishers—and keep your business moving forward.

Figure 2. The green address bar triggered by an EV SSL
Certificate, as it appears in Internet Explorer.

Glossary
Certificate Authority (CA) — A Certificate Authority is a trusted

Consumer and Employee Education
In addition to implementing EV SSL technology, you should con-

third-party organization that issues digital certificates such as Secure Sockets Layer (SSL) Certificates after verifying the information included in the Certificates.

tinue to educate your customers and employees on safe Internet
practices and how to avoid cyber fraud. Teach them how to recog-

Encryption — Encryption is the process of scrambling a message

nize the signs of a phishing attempt, including:

so that only the intended audience has access to the information. Secure Sockets Layer (SSL) technology establishes a private communi-

•	 Misspellings (less common as phishers become
more sophisticated)

cation channel where data can be encrypted during online transmission, protecting sensitive information from electronic eavesdropping.

•	 Generic greetings instead of personalized, urgent calls
to action

6

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
Extended Validation (EV) SSL Certificate — Requires a high

Secure Sockets Layer (SSL) Technology — SSL and its suc-

standard for verification of Secure Sockets (SSL) Certificates

cessor, transport layer security (TLS), use cryptography to provide

dictated by a third party, the CA/Browser Forum. In Microsoft®

security for online transactions. SSL uses two keys to encrypt and

Internet Explorer and other popular high-security browsers, web-

decrypt data — a public key known to everyone and a private or

sites secured with Extended Validation SSL Certificates cause the

secret key known only to the recipient of the message.

URL address bar to turn green.
SSL Certificate — A Secure Sockets Layer (SSL) Certificate inHTTPS — Web pages beginning with “https” instead of “http” en-

corporates a digital signature to bind together a public key with an

able secure information transmission via the protocol for secure

identity. SSL Certificates enable encryption of sensitive informa-

http. “Https” is one measure of security to look for when sending

tion during online transactions, and in the case of organizationally

or sharing confidential information such as credit card numbers,

validated Certificates, also serve as an attestation of the Certifi-

private data records, or business partner data.

cate owner’s identity.

More Information
• Via phone
–– US toll-free: +1 888 484 2983
–– UK: +44 203 450 5486
–– South Africa: +27 21 819 2800
–– Germany: +49 69 3807 89081
–– France: +33 1 57 32 42 68

7

• Email sales@thawte.com
• Visit our website at
https://www.thawte.com/ssl

Protect your business and translate
trust to your customers with highassurance digital certificates from
Thawte, the world’s first international
specialist in online security. Backed by
a 17-year track record of stability and
reliability, a proven infrastructure, and
world-class customer support, Thawte
is the international partner of choice
for businesses worldwide.

©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte,
Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.

Mais conteúdo relacionado

Mais de - Mark - Fullbright

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 

Último

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Último (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Fraud Alert: New Phishing Tactics - and How They Impact Your Business

  • 1. Fraud Alert: New Phishing Tactics— and How They Impact Your Business
  • 2. Contents Introduction Phishing Knows No Limits 3 Phishing in China: The Rise of APT1 4 Shared Virtual Servers Remain a Prime Target 4 Spammers Continue to Take Advantage of Holidays and Global Events 4 Phishing that Plays on Economic Fears 5 Blended Phishing/Malware Threats 5 Texting and Mobile Phone Phishing Scams 5 How Phishing Could Impact Your Business 5 Protecting Your Business 5 Consumer and Employee Education 6 Glossary 6 More Information 7 About Thawte 2 3 7 ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
  • 3. Fraud Alert: New Phishing Tactics—and How They Impact Your Business Introduction Phishing Knows No Limits P hishing remains a major security threat to businesses and Phishing—the act of luring unsuspecting people to provide sensi- their customers around the world—and the threat keeps ris- tive information such as usernames, passwords, and credit card ing. Compared to the last six months of 2011, the first six months data via seemingly trustworthy electronic communications—is an of 2012 saw a 19 percent increase in global phishing attacks, with ongoing global threat of massive scale and nearly unlimited reach. businesses suffering an estimated $2.1 billion in phishing-related The Anti-Phishing Working Group (APWG) reported at least losses between January 2011 and June 2012.1 93,462 unique phishing attacks globally in the first half of 2012 Two factors are driving this increase: (1) phishing attacks are in 200 top-level domains. That represents a significant increase relatively easy to execute, and (2) they generally work. You don’t over the first half of 2011, when APWG reported 83,083 phishing need to be a sophisticated hacker to go phishing on the Internet. scams—an increase attributed to the prevalence of attacks on All it takes is a little motivation, malice, and greed, thanks to off- shared virtual servers. Some 64,204 unique domain names were the-shelf phishing kits provided by a thriving cybercrime ecosys- affected in 1H2012, targeting 486 institutions in all (see Figure 1).4 tem. Cybercriminals are even using a business model known as malware-as-a-service (MaaS), where authors of exploit kits offer BASIC STATISTICS extra services to customers in addition to the exploit kit itself.2 Approximately 156 million phishing emails are sent every day, with some 16 million successfully passing through filters. Roughly 50 percent of the remaining emails—about eight million—are opened, with 800,000 users lured into clicking on a malicious link. Again, 1H2012 2H2011 1H2011 2H2010 1H2010 Phishing domain names 64,204 50,298 79,753 42,624 28,646 Attacks 93,462 83,083 115,472 67,677 48,244 that’s not 800,000 per year. It’s 800,000 per day. To combat such 3 120,000 a massive volume of malicious email, it’s more important than ever to stay current on the latest methods employed by cyber- 100,000 criminals. Only then can you take proactive steps to protect your business from fraud. 80,000 In this fraud alert paper, we’ll highlight the current trends in today’s 60,000 phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers. 1. “Phishing and the Social World,” RSA, October 2012. 2. “Verisign iDefense 2012 Cyber Threats and Trends White Paper,” Verisign, January 2012. 3. “Phishing: How Many Take the Bait?,” Get Cyber Safe, February 2013. 3 40,000 Figure 1. Phishing attacks keep trending up. 20,000 1H2010 2H2010 Attacks 1H2011 2H2011 1H2012 Phishing Domain Names 4. “Global Phishing Survey 1H2012: Trends and Domain Name Use,” Anti Phishing Working Group, October 2012. ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
  • 4. Phishing in China: The Rise of APT1 The majority of phishing attacks appear to originate in China. This trend reached its peak in the first half of 2011, when Chinese phishers were thought to be responsible for 70 percent of all malicious domain name registrations worldwide.5 In February 2013, Mandiant published a report on a particularly destructive group of phishers allegedly operating out of China. Dubbed “APT1,” this group—which has conducted Internetenabled espionage against a wide range of victims since at least 2006—is almost certainly a government-sponsored campaign orchestrated by the Chinese People’s Liberation Army (PLA). According to Mandiant’s research, APT1 has stolen hundreds of terabytes of data from at least 141 organizations, and has the ability to steal from dozens of organizations simultaneously. These highly sophisticated phishers maintained access to each victim’s networks for an average of 356 days, with one period of access to a single organization lasting for more than four consecutive years.6 host-based investigative tool. We encourage you to make immediate use of this valuable resource. Shared Virtual Servers Remain a Prime Target Last year, we reported a significant rise in phishing attacks on shared virtual servers. In these attacks, a phisher breaks into a web server that hosts large numbers of domains, then places the phishing content on every domain. As a result, every website on that server displays the phishing pages, thus infecting thousands of websites simultaneously. These attacks diminished during the second half of 2011, but 2012 brought them back with a vengeance: in June alone, APWG reported a record 7,000 attacks on 44 different virtual servers.9 Spammers Continue to Take Advantage of Holidays and Global Events In the run-up to Christmas 2012, spammers once again spoofed Mandiant’s findings reveal a great deal about the tactics, behav- a number of legitimate retailers, offering Christmas “deals,” gift iors, and location of this particular group. In more than 97 percent cards, and other holiday bait. Some phishers took advantage of of the instances in which APT1 intruders connected to their attack Americans’ end-of-year tax anxiety by sending emails claiming to infrastructure, they used IP addresses registered in Shanghai, with be from the IRS (Internal Revenue Service).10 And as always, no- all systems set to the Simplified Chinese language. In 767 sepa- table global happenings served as a trigger for a rash of scams— rate instances, APT1 intruders relied on the HUC Packet Transmit especially the 2012 Summer Olympics in London. Tool (HTRAN) to communicate between IP addresses and victims’ systems, with all distinct IP addresses registered in China.7 Anti-phishing experts expected to see a major increase in malicious emails leading up to the Olympics,11 and scammers didn’t The scale and sophistication of the APT1 threat appears to be disappoint. Over the course of the summer, Zscaler called attention without precedent. These phishers are clearly part of a large to a rise in fake Olympic ticketing sites,12 and Omniquad identified organization with possibly hundreds of human operators manag- a “lottery scam” masquerading as a British Airways promotion for ing an attack infrastructure on more than 1,000 servers. Support the London Games.13 Expect to see similarly malicious attempts to staff would necessarily include linguists, malware authors, and top exploit fans’ enthusiasm for upcoming global sporting events like industry experts.8 the 2013 FIFA Confederations Cup, the 2014 Winter Olympics in Sochi, Russia, and the 2014 FIFA World Cup in Brazil. A threat of this magnitude calls for robust, proactive measures to protect your business and your customers. To help bolster your defenses against APT1, Mandiant has released more than 3,000 indicators—including domain names, IP addresses, and MD5 hashes—available for download on Redline, the company’s free 5. “Global Phishing Survey: Trends and Domain Name Use in 1H2011,” APWG, November 2011. 6. “APT1: Exposing One of China’s Cyber Espionage Units,” Mandiant, February 2013. 7. Ibid. 8. Ibid. 4 9. Global Phishing Survey 1H2012: Trends and Domain Name Use,” Anti“ Phishing Working Group, October 2012. 10. “Christmas and End of Year Tax Phishing Scams,” Northeastern University Information Services, December 2012. 11. “Symantec Intelligence Report,” Symantec, January 2012. 12. “London Olympics: Stay Away from Scams, Data Theft, and Phishing,” Zscaler, July 2012. 13. “Omniquad Warns Not to Fall for the London ‘2012 Olympic’ Email Scam Fraudulently Evoking Both the Games and Their Sponsors,” Omniquad, August 2012. ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
  • 5. Phishing that Plays on Economic Fears Today’s economic turmoil offers unprecedented opportunities for criminals to exploit victims’ fears. For instance, popular scams include emails that appear to be from a financial institution that recently acquired the target victim’s bank, savings loan, or mortgage holder.14 In many cases, consumers are already unsure about the nature and status of these mergers and acquisitions, and phishers are eager to exploit that confusion. The best defense against these scams is simple, clear, consistent communication with your customers at all stages of any business transition. The more they understand, the less likely they are to The typical scam informs the mobile phone user that the person’s bank account has been compromised or credit card/ATM card has been deactivated. The potential victim is directed to call a number or go to a spoofed website to reactivate the card. Once on the site, or through an automated phone system, the potential victim is asked for card and account numbers and PIN numbers. How Phishing Could Impact Your Business While the financial industry continues to be a primary target for phishers, it’s certainly not the only sector vulnerable to attack. Auction sites, payment services, retail, and social networking sites are also frequent targets, as are cell phone providers and manu- fall prey to the lures of a scammer. facturers. In short, no business or brand is inherently safe. Blended Phishing/Malware Threats Phishing attacks that pose as your company’s official website To increase success rates, some attacks combine phishing with malware for a blended attack model.15 For instance, a potential victim receives a phishing e-card via email that appears to be legitimate. By clicking on the link inside the email to receive the card, the person is taken to a spoofed website which downloads a Trojan to the victim’s computer. Alternatively, the victim may see a message that indicates a download of updated software is needed before the victim can view the card. When the victim downloads the software, it’s actually a keylogger. Phishing-based keyloggers use tracking components which attempt to monitor specific actions (and specific organizations such as financial institutions, online retailers, and e-commerce merchants) in order to obtain sensitive information such as account numbers, user IDs, and passwords. Texting and Mobile Phone Phishing Scams Posing as a real financial institution, phishers are using SMS (texting) as an alternative to email to gain access to confidential account information. These so-called “SMiShing” scams grew by 400 percent in the first half of 2012,16 and in November researchers at North Carolina State University identified serious SMiShing vulnerabilities on multiple Android platforms.17 (Once alerted, Google fixed the SMiShing bug within a matter of weeks.) diminish your online brand and deter customers from using your actual website out of fear of becoming fraud victims. In addition to the direct costs of fraud losses, other risks to your business include: • A drop in online revenues and/or usage due to decreased customer trust • Potential non-compliance fines if customer data is compromised Even phishing scams aimed at other brands can impact your business. The resulting fear caused by phishing can cause consumers to stop making online transactions with anyone they can’t trust. Protecting Your Business While there is no silver bullet, a number of technologies can help protect you and your customers. Many of the current phishing techniques rely on driving customers to spoofed websites to capture personal information. Technology such as Secure Sockets Layer (SSL) and Extended Validation (EV) SSL are critical in fighting phishing and other forms of cybercrime by encrypting sensitive information and authenticating your site. Security best practices call for implementing the highest levels of encryption and authentication possible to protect against cyber fraud and build customer trust in the brand. SSL, the world standard for online security, is the technology used to encrypt and 14. FTC Consumer Alert: Bank Failures, Mergers and Takeovers: “ A Phish-erman’s Special,” www.ftc.gov 15. “New Wave of Phishing Attacks Serves Malware to PCs and Macs,” ZDNet, March 2012. 16. “How to Avoid Becoming a Victim of SMiShing (SMS Phishing),” Network World, March 2013. 17. “Smishing Vulnerability in Multiple Android Platforms (Including Gingerbread, Ice Cream Sandwich, and Jelly Bean),” NC State University, November 2012. 5 protect information transmitted over the Web with the ubiquitous HTTPS protocol. SSL protects data in motion, which can be intercepted and tampered with if sent unencrypted. Support for SSL is built into all major operating systems, Web browsers, Internet applications, and server hardware. ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
  • 6. To help prevent phishing attacks from being successful and to build customer trust, you also need to show customers that you are a legitimate business. Extended Validation (EV) SSL Certificates are the answer, offering the highest level of authentication available with an SSL Certificate and tangible proof that the site is • Account status threats • Requests for personal information • Fake domain names/links indeed legitimate. Also educate your customers and employees on how to recognize EV SSL gives website visitors an easy and reliable way to estab- a valid, secure website before they provide any personal or sensi- lish trust online by triggering high-security browsers to display a tive information by: green address bar with the name of the organization that owns the SSL Certificate and the name of the Certificate Authority that issued it. • Looking for the green address bar • Making sure the URL is HTTPS The green bar demonstrates to site visitors that the transaction is encrypted and that your business has been authenticated according to the most rigorous industry standards. Cybercriminals cannot display their own name on the address bar, because the information shown there is outside of their control, and they cannot obtain a legitimate EV SSL Certificate due to the stringent authentication process. Extended Validation is simply beyond the power of phishers to exploit. Get the green address bar • Clicking on the padlock to match the certificate information with the website they intend to visit Education plays a key role in building trust. By helping customers validate their level of safety on your website, you can increase revenue, stand out from the competition, and even cut operational costs by moving more transactions online. But always remember: phishers are tough, shape-shifting adversaries. Their scams will continue to evolve into new forms, while attempting to take advantage of human behaviors such as compassion, trust, or curiosity. Protecting your brand and your business from their malicious efforts will always require constant diligence. Security status bar toggles between your organization name and the CA that performed your Extended Validation authentication. By embracing the latest SSL technologies, keeping up to date on the newest scams, and choosing a Certificate Authority with the highest possible standards for online security, you can stay one step ahead of phishers—and keep your business moving forward. Figure 2. The green address bar triggered by an EV SSL Certificate, as it appears in Internet Explorer. Glossary Certificate Authority (CA) — A Certificate Authority is a trusted Consumer and Employee Education In addition to implementing EV SSL technology, you should con- third-party organization that issues digital certificates such as Secure Sockets Layer (SSL) Certificates after verifying the information included in the Certificates. tinue to educate your customers and employees on safe Internet practices and how to avoid cyber fraud. Teach them how to recog- Encryption — Encryption is the process of scrambling a message nize the signs of a phishing attempt, including: so that only the intended audience has access to the information. Secure Sockets Layer (SSL) technology establishes a private communi- • Misspellings (less common as phishers become more sophisticated) cation channel where data can be encrypted during online transmission, protecting sensitive information from electronic eavesdropping. • Generic greetings instead of personalized, urgent calls to action 6 ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.
  • 7. Extended Validation (EV) SSL Certificate — Requires a high Secure Sockets Layer (SSL) Technology — SSL and its suc- standard for verification of Secure Sockets (SSL) Certificates cessor, transport layer security (TLS), use cryptography to provide dictated by a third party, the CA/Browser Forum. In Microsoft® security for online transactions. SSL uses two keys to encrypt and Internet Explorer and other popular high-security browsers, web- decrypt data — a public key known to everyone and a private or sites secured with Extended Validation SSL Certificates cause the secret key known only to the recipient of the message. URL address bar to turn green. SSL Certificate — A Secure Sockets Layer (SSL) Certificate inHTTPS — Web pages beginning with “https” instead of “http” en- corporates a digital signature to bind together a public key with an able secure information transmission via the protocol for secure identity. SSL Certificates enable encryption of sensitive informa- http. “Https” is one measure of security to look for when sending tion during online transactions, and in the case of organizationally or sharing confidential information such as credit card numbers, validated Certificates, also serve as an attestation of the Certifi- private data records, or business partner data. cate owner’s identity. More Information • Via phone –– US toll-free: +1 888 484 2983 –– UK: +44 203 450 5486 –– South Africa: +27 21 819 2800 –– Germany: +49 69 3807 89081 –– France: +33 1 57 32 42 68 7 • Email sales@thawte.com • Visit our website at https://www.thawte.com/ssl Protect your business and translate trust to your customers with highassurance digital certificates from Thawte, the world’s first international specialist in online security. Backed by a 17-year track record of stability and reliability, a proven infrastructure, and world-class customer support, Thawte is the international partner of choice for businesses worldwide. ©2013 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners.