How an impersonation attack is constructed

In the software industry, the most popular methods of impersonation are the following:

  • Registering domains in bulk and the ones that are lookalikes for a legitimate domain. Let's assume that abclegit.com is a legitimate site. An impersonator will register clones like these:           
abcleg1t.com abdlegit.com abcl3git.com abclegil.com
  • Mimicking the display name: Another way to perform impersonation fraud is to change the display name of the victim. Here again, the changed name lies in very close proximity to the actual name. If an email is sent using the victim's display name with minor changes, users can be lured into believing that its a legitimate email ID. Taking the previous example, [email protected] is morphed to [email protected].
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset