{"id":10250,"date":"2018-05-31T11:01:57","date_gmt":"2018-05-31T11:01:57","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10250"},"modified":"2021-06-25T12:17:46","modified_gmt":"2021-06-25T12:17:46","slug":"phishing-esds-vtmscan","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/phishing-esds-vtmscan\/","title":{"rendered":"Phishing &#8211; ESDS VTMScan"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><strong>Introduction<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Phishing is a method used by attackers to trick you into disclosing personal information such as username, password, credit card and banking information. The goal for the attacker is to steal your information and\/or your money. The information gathered can be used to open fraudulent accounts in your name or make purchases using your financial information. Phishing attacks commonly use email, phone calls or social media to trick you into revealing your personal information.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/phishing-esds-vtmscan\/#Introduction\" >Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/phishing-esds-vtmscan\/#Punycode_Phishing_Attacks\" >Punycode Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/phishing-esds-vtmscan\/#ESDS_VTMScan_Detection_Techniques\" >ESDS VTMScan Detection Techniques<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Punycode_Phishing_Attacks\"><\/span><strong>Punycode Phishing Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">The curiously-named system known as Punycode is a way of converting words that can\u2019t be written in ASCII, such as the Ancient Greek phrase&nbsp;<strong>????????????<\/strong>&nbsp;(know yourself), into an ASCII encoding, like this:&nbsp;<strong>xn--mxadglfwep7amk6b<\/strong>. This makes it possible to encode so-called International Domain Names (IDNs)<\/p>\n\n\n\n<p style=\"text-align: justify;\">If your web browser is displaying \u201c<strong>apple.com<\/strong>\u201d in the address bar secured with SSL, but the content on the page is coming from another server (as shown in the above picture), then your browser is vulnerable to the homograph attack (Punycode).<\/p>\n\n\n\n<p style=\"text-align: justify;\">Attacker can register a domain name&nbsp;<strong>xn--80ak6aa92e.com<\/strong>&nbsp;and bypass protection, which appears as \u201c<strong>apple.com<\/strong>\u201d by all vulnerable web browsers, including Chrome, Firefox and Opera.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>PhishTank:<\/strong>&nbsp;PhishTank is a collaborative clearing house for data and information about phishing on the Internet.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>Typosquatting:<\/strong>&nbsp;Typosquatting, also called&nbsp;<strong>URL hijacking<\/strong>, a&nbsp;<strong>sting site<\/strong>, or a&nbsp;<strong>fake URL<\/strong>, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Should a user accidentally enter an incorrect website address, they may be led to any URL (including an alternative website owned by a cybersquatter)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"ESDS_VTMScan_Detection_Techniques\"><\/span>ESDS <strong>VTMScan Detection Techniques<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/esds.co.in\/security\/vtmscan\">ESDS VTMScan<\/a><\/strong> detects possible Suspicious Punycode Phishing URLs.<\/p>\n\n\n\n<p>It find similar-looking domains an attacker can use to attack you.<\/p>\n\n\n\n<p>It detects Typosquatting Urls.<\/p>\n\n\n\n<p>It tests if MX host (mail server) can be used to intercept misdirected e-mails.<\/p>\n\n\n\n<p>It provides PhishTank data to give you PhishTank reported phishing urls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Phishing is a method used by attackers to trick you into disclosing personal information such as username, password, credit card and banking information. The goal for the attacker is to steal your information and\/or your money. The information gathered can be used to open fraudulent accounts in your name or make purchases using your&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/phishing-esds-vtmscan\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10344,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[2009,2010,1945,2011,2012,2013,2014],"class_list":["post-10250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-fake-url","tag-phishing","tag-phishing-attacks","tag-phishtank","tag-punycode","tag-sting-site","tag-url-hijacking"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10250"}],"version-history":[{"count":6,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10250\/revisions"}],"predecessor-version":[{"id":12082,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10250\/revisions\/12082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10344"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}