Phishing Attacks in Mobile Platforms

Phishing Attacks in Mobile Platforms

Thangavel M., Yaamine A. M., Nandhini J. T.
DOI: 10.4018/978-1-7998-3473-1.ch084
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

On facing this fast-moving world every bit of the world is leading by technology. Mobile phones are the major part of our day to day life. Mobile platforms are said to be the hardware and software environment for laptops, tablets, smartphones and also for other portable devices. Mobile operating systems and browsers lack secure application identity indicators, so the user cannot always identify whether a link takes to the expected application. Phishing is a most popular attack and it gets targeted mostly at financial organizations. It is a type of online theft where the sensitive information is obtained by redirecting the victim to malicious websites. This chapter discusses about Phishing attacks in Mobile Platforms.
Chapter Preview
Top

Introduction

Mobile phones are mainly targeted by malware and they can also be used in botnets. Mobile devices are equipped with high – end, power-intensive resources with more memory, and variety of sensors. These are mainly used to provide a majestic, rich and for a sophisticated purpose. As far as Windows and Mac dominate the laptop world, where Apple and Android rule the smartphone and the tablet universe. Mobile apps were offered for the general productivity and for information retrieval which includes email, calendar, contacts, messages, and weather information. Now a day’s mobile phones are also targeted by phishing attacks. So we can’t say that mobile phones are not only used to make calls. We can say that mobile phones are a small computer. Smartphones are mainly used for social media which usually means to affect the bottom line security.

In mobile devices, user interfaces are constrained in a very small screen. In mobile operating systems, there is a lack of secure application identity indicators. The end user definitely can’t tell what the website he/she is interacting with most of the end users i.e. 60% of mobile users will enter a password at least twice a day. By launching an application stored through app store phishing application can be done. Most of the phishing applications are launched with the help of the Android app store. By reliving the sensitive information, the attacker can easily hack the details of the users. Trojan Activity should in a suitable way. This will direct the end user to make a mistake in the malicious application of a trusted one.

The goal behind phishing is data, money and personal information glomming through the fictitiously unauthentic website. The best strategy for eschewing the contact with the phishing web site is to detect authentic time malignant URL. Phishing websites can be tenacious on the substructure of their domains. They customarily are cognate to URL which needs to be registered (low-level domain and upper-level domain, path, query). Recently acquired status of intra-URL relationship is utilized to evaluate it utilizing distinctive properties extracted from words that compose a URL predicated on query data from sundry search engines such as Google and Yahoo.

Now a day the threat of phishing attacks on mobile computing platforms is getting incremented as many of the users use mobile phones to access the net banking, Gmail, Face book and some other application. MobiFish is automated bulwark scheme, where users no desideratum to make the final decision, but it is the users who conclusively abstract the phishing app. Authentically, they do not require to explicitly make the decision at all, since the only explication for the authenticate failure is a phishing attack. Here there is no desideratum of developer to design the browser UIs, MobiFish is compatible with all subsisting websites and apps. In this paper, we propose specialized form of phishing attacks which target at the sedulous account registry function of mobile OSs. We employ the optical character apperception (OCR) technique to extract text from the screenshot of a authenticate interface, which achieves better performance on mobile phones than on PCs.

Due to the lack of secure identity indicators which means that an inter-application link could be subverted. Next, the user will be directed to the wrong target. In a direct phishing attack, the sender will have some malicious application which links the user to the spoofed screen instead of the real target application. We are in need to address the problem of phishing by implementing the Trojan which commits phishing via preinstalled mobile applications. In a man-in-the-middle attack, the sender will be benign, but some other malicious party intercepts the link and he/she will load a spoofed target application in the place of the target application.

Figure 1.

Vulnerable areas in mobile business environment

978-1-7998-3473-1.ch084.f01

Key Terms in this Chapter

MWL: A whitelist is a list of e-mail addresses or domain names from which an electronic-mail blocking program will sanction messages to be received.

OCR: The fundamental process of OCR involves examining the text of a document and translating the characters into code that can be utilized for data processing.

SLD: A second-level domain is a categorical part of a website, page domain name or URL address that complements a top-level domain.

URL: A uniform resource locator (URL) is the address of a resource on the Internet. A URL denotes the location of a resource as well as the protocol used to access it.

SMS: It is the most rudimental communications technology for mobile data transfer and is characterized by the exchange of short alphanumeric text messages between digital line and mobile contrivances.

Complete Chapter List

Search this Book:
Reset