Spaces:
Paused
Paused
Upload knowledge_base.txt
Browse files- knowledge_base.txt +23 -0
knowledge_base.txt
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Phishing Knowledge Base
|
| 2 |
+
|
| 3 |
+
## Common Phishing Indicators
|
| 4 |
+
1. **Urgency and Threats**: Phishing emails often use urgent language (e.g., "Account Suspended", "Immediate Action Required") to panic users into clicking without thinking.
|
| 5 |
+
2. **Mismatched URLs**: The visible link text (e.g., "paypal.com") does not match the actual destination URL (e.g., "paypal-secure-login.com").
|
| 6 |
+
3. **Generic Greetings**: Legitimate organizations usually use your name. Phishing emails often use "Dear Customer" or "Dear User".
|
| 7 |
+
4. **Request for Personal Information**: Legitimate companies rarely ask for sensitive info (passwords, SSN) via email.
|
| 8 |
+
5. **Suspicious Domains**: Look for misspellings (e.g., "goog1e.com", "paypaI.com") or unusual TLDs.
|
| 9 |
+
|
| 10 |
+
## URL Analysis Techniques
|
| 11 |
+
- **Typosquatting**: Attackers register domains that look similar to popular domains (e.g., "faceboook.com").
|
| 12 |
+
- **Subdomain Abuse**: Using long subdomains to hide the actual domain (e.g., "paypal.com.security-check.com" - the real domain is "security-check.com").
|
| 13 |
+
- **URL Shorteners**: Using bit.ly or tinyurl to hide the destination.
|
| 14 |
+
|
| 15 |
+
## Social Engineering Tactics
|
| 16 |
+
- **Authority**: Impersonating CEOs, IT support, or government agencies.
|
| 17 |
+
- **Scarcity**: "Only 24 hours left to claim your prize".
|
| 18 |
+
- **Curiosity**: "Look at these photos of you".
|
| 19 |
+
|
| 20 |
+
## Example Cases
|
| 21 |
+
- **PayPal Phishing**: Emails claiming unauthorized transactions, asking to click a link to "dispute" the charge.
|
| 22 |
+
- **Google Docs Phishing**: Fake login pages that look like Google Drive login screens.
|
| 23 |
+
- **Bank Fraud**: SMS messages (Smishing) claiming a bank account is locked.
|