230 likes | 332 Views
Phishing Scams at K-State. What We Do What We Don’t Do What We Should Do. What We Do. Receive Sample with Full Headers Verify Links are Active and Malicious Block non-https URLs at the Border Ask Trend to Block URLs With WRS Put Reply-to Addresses on APER Notify Originating ISP
E N D
Phishing Scams at K-State What We Do What We Don’t Do What We Should Do
What We Do • Receive Sample with Full Headers • Verify Links are Active and Malicious • Block non-https URLs at the Border • Ask Trend to Block URLs With WRS • Put Reply-to Addresses on APER • Notify Originating ISP • Notify Destination ISP or Web Host • Post to Threats/Scams Blog • Create Service Now Incident
1. Important Parts of the Header URL http://onlinegamblingrealmoney.net/onlineupdate Received: from mail.fox.k12.mo.us [150.199.176.125] Return-Path: HayesC@fox.k12.mo.us
5. Put Reply-to Address on APERhttp://code.google.com/p/anti-phishing-email-reply/
7. Report GoogleDocshttp://www.google.com/safebrowsing/report_phish/
What We Don’t Do • Prevent All Phishing Scams From Being Delivered • Pull Scams From Inboxes • Prevent All Responses • Identify Responses Prior to Account Being Used by Scammers
What We Should Do • Process every scam in 1st hour • Educate every user on dangers of and how to recognize scams • Clearly differentiate official emails
URLs • http://www.k-state.edu/its/security/netsafety/email/blocked.html • http://code.google.com/p/anti-phishing-email-reply/ • http://www.google.com/safebrowsing/report_phish/ • http://threats.itsecurity.k-state.edu/ • https://blogs.k-state.edu/scams/