Use case Scenarios of Phishing attack (Data Breach due to Phishing Attack)

  • Use Case Scenarios #1

    One of the Biggest Data Breaches from Phishing:

    John Podesta’s Email There was a lot of controversy surrounding the November 2016 election on both sides of the political spectrum. One of the most notable was the hack of John Podesta’s Gmail account. Podesta, chairman of presidential candidate Hillary Clinton’s democratic election campaign, found himself as one of the country’s top phishing attack examples when his account was victimized by a Russian hacker group known as Fancy Bear. The phishers, pretending to be Google, sent an email saying that he needed to change his email after an attempted hack occurred. However, in true phishing attack fashion, the email linked to a malicious website. When someone with access to Podesta’s email used the compromised link, the hackers gained access to his account. This led to the eventual release of thousands of Podesta’s emails via WikiLeaks in the weeks leading up to the November election.

  • One of the Biggest Data Breaches from Phishing:

    BenefitMall Among the most recent phishing attacks reported by the media is one that affected BenefitMall, a human resource, employee benefits, and payroll administration solutions company. Between June 2018 and October 2018, the company’s website was accessed via employee email login credentials that were exposed during an email phishing attack, according to a press release. The types of consumer information left exposed in the affected mailboxes are thought to include:
    Names

    Email addresses

    Birth dates

    Bank account information

    Insurance premium payment information

    Although the full extent of the attack is not yet known, BenefitMall works with “a network of more than 20,000 Trusted Advisors” to serve more than “200,000 small and medium-sized businesses.” This leaves a potentially enormous group of employees and businesses at risk.

  • One of the Biggest Data Breaches from Phishing:

    Sony Pictures In retaliation for the creation of the movie “The Interview,” a film about the plot to kill North Korea’s head of state, a North Korean government-backed hacker group launched a devastating attack on the entertainment giant in November 2014. Using phishing and spear-phishing emails, which contained malware, the attackers gained access to Sony’s network and performed months of covert reconnaissance. Once inside, they also threatened company employees and executives, stole confidential data, and disabled thousands of the company’s computers. The attack is thought to have cost the company upwards of $100 million.

  • Methodist Hospitals – Gary, Indiana In August of 2019, investigators confirmed Methodist Hospitals’ worst fear. A phishing attack compromised more than 68,000 patients’ information. The hospital did not discover the breach until June when an employee reported suspicious activity in their email account. The investigation revealed that at least two email accounts had been compromised. The data obtained from each affected patient varied but included the following: names, addresses, health insurance information, Social Security numbers, passport numbers, bank account numbers, electronic signatures, login credentials, dates of birth, treatment information, and insurance information.

  • The University of Wisconsin-Parkside – Kenosha, Wisconsin In June of 2019, the University of Wisconsin-Parkside was notified of a new bank account. This new account was a result of a phishing attack where an employee was prompted to change the routing numbers of two UW system vendors. Before discovering the issues, the university lost $315,000 in fraudulent bank transfers.

About Phishbuster

Phishbuster is a project that came into existence from a final year project “Detection of Phishing Website Using Machine Learning” carried out at Bowen University. It aims to help reduce phishing attack by helping internet users authenticate URL link by testing if it is phishing or legitimate. The progress of validating a Website URL for phishing or legitimate has gone through several Machine learning models.

About Us

This Research is done by Final Year Students of Computer Science and Engineering at G Pulla Reddy Engineering College
K Asrith
B Hemanth
B Lingesh