{"id":262,"date":"2020-08-11T02:52:12","date_gmt":"2020-08-10T21:22:12","guid":{"rendered":"http:\/\/madhurendra.com\/?p=262"},"modified":"2021-02-26T08:44:53","modified_gmt":"2021-02-26T03:14:53","slug":"solving-the-problem-of-phishing","status":"publish","type":"post","link":"https:\/\/madhurendra.com\/solving-the-problem-of-phishing\/","title":{"rendered":"Solving the problem of phishing !"},"content":{"rendered":"\n

Phishing is a never ending war thug of war where one side is only trying to stop other side from winning, “Attackers are always trying to be innovative while defenders are trying to innovate on the innovation done by defenders.” <\/p>\n\n\n\n

Ironic as it may sound, but this is what it is. <\/p>\n\n\n\n

This article is not about blaming some organisation not doing enough to protect the customers here it is more about the vendors who are trying to defend, while current time doesn’t demand defence – instead it needs aggressive attack mechanism, even proactive attacks before damage could be done. <\/p>\n\n\n\n

Approach<\/h2>\n\n\n\n

To solve the problem I am proposing a N step approach to solve the problem of phishing. <\/p>\n\n\n\n

  1. Get ready with your defenses – Just as in war, first strengthen your defenses. It can be done by proactively doing following:
    1. Training your employees <\/li>
    2. Asking cybersecurity team to be vigilant <\/li>
    3. Performing vulnerability assessment and penetration testing. <\/li>
    4. DDOS prevention (you might need, DDOS is cheap these days)<\/li>
    5. DMARC<\/a>, Cousin domains monitoring<\/li>
    6. WAF, SIEM & other stuff. <\/li><\/ol><\/li>
    7. A small attack ( to know capabilities )
      1. To get an idea monitor what type of attacks are originating.<\/li>
      2. Measure similarity among phishing attacks – you might be able to figure out active APT groups.<\/li>
      3. Initiate takedown’s<\/a>, publish something about them in media (yes, you heard me – more aggressively, see how they react)<\/li><\/ol><\/li>
      4. Attack the psychology
        1. Setting up “honeypot” (honeypot is key, I cannot write the process in detail, but trust me – they are something you will need) to gather information.<\/li>
        2. Giving the attacker bogus information<\/li>
        3. You win ! <\/li><\/ol><\/li><\/ol>\n\n\n\n

          But how ?, the key part of approach is psychology – if you attack infrastructure it can be bought easily, success of a phishing attack depends on how good results the attacker gets. <\/p>\n\n\n\n

          Reasoning<\/h2>\n\n\n\n

          if you ever conducted an actual phishing attack or have observed programmatic logics – attackers have adopted methods to get 2FA from clients but once verified data is valuable. Let’s do some math. <\/p>\n\n\n\n

          Let’s say you are conducting a phishing attack & it costs you to 100$ to compromise a web site or host it, sending email might cost you 0.001$.
          Assuming 1\/1000 spam are clicked – you are technically going to spend 1$ per click, let’s say 10% of clickers turn to victim. To get useful data you will require 10$. <\/p>\n\n\n\n

          if captured data is being sold in market at 20$ for every good data – you are going to make profit of 10$ excluding hosting cost. <\/p>\n\n\n\n

          but what if you are getting bogus data, which feels just good but now it is useless since 2FA has failed, or may be the server’s are not responding. Overall if vendors can make cost of Phishing high, only those will survive who have willingness to catch a whale. <\/p>\n","protected":false},"excerpt":{"rendered":"

          Phishing is a never ending war thug of war where one side is only trying to stop other side from winning, “Attackers are always trying to be innovative while defenders are trying to innovate on the innovation done by defenders.” Ironic as it may sound, but this is what it is. This article is not … <\/p>\n

          Continue reading<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[38],"tags":[],"class_list":["post-262","post","type-post","status-publish","format-standard","hentry","category-security","item-wrap"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_shortlink":"https:\/\/wp.me\/pciGs2-4e","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/posts\/262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/comments?post=262"}],"version-history":[{"count":4,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/posts\/262\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/posts\/262\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/media?parent=262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/categories?post=262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/madhurendra.com\/wp-json\/wp\/v2\/tags?post=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}