{"id":294055,"date":"2024-05-02T17:43:23","date_gmt":"2024-05-02T12:13:23","guid":{"rendered":"https:\/\/forumias.com\/blog\/?p=294055"},"modified":"2024-05-02T17:43:48","modified_gmt":"2024-05-02T12:13:48","slug":"phishing-attacks-in-india","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/phishing-attacks-in-india\/","title":{"rendered":"Phishing Attacks in India"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Source-<\/strong> This post on <strong> phishing<\/strong>\u00a0is based on the article<a href=\"https:\/\/www.thehindu.com\/business\/india-one-of-the-key-geographies-affected-by-phishing-attacks-verizon\/article68129432.ece\" target=\"_blank\" rel=\"noopener\"><strong> &#8220;India one of the key geographies affected by phishing attacks: Verizon&#8221; <\/strong><\/a>published in \u201cThe Hindu\u201d on 1st May 2024.<\/p>\n<h2 style=\"text-align: justify;\">Why in the News?<\/h2>\n<p style=\"text-align: justify;\">A report from Verizon Business has emphasized the rising incidence of phishing in India. Cybercriminals are resorting to <span style=\"color: #ff0000;\">new and sophisticated methods<\/span> to deceive unsuspecting users into opening malicious emails or clicking on harmful links.<\/p>\n<p style=\"text-align: justify;\">As a result, there is an <span style=\"color: #ff0000;\">increased risk of users experiencing financial losses and the compromise of their personal data.<\/span><\/p>\n<h2 style=\"text-align: justify;\">Highlights of the study:<\/h2>\n<p style=\"text-align: justify;\">a) The report highlighted that <span style=\"color: #ff0000;\">there has been improvement in reporting practices of such incidents of phishing in India. <\/span>However only 20% of users now identify and report phishing during simulation tests.<\/p>\n<p style=\"text-align: justify;\">b) Another Report of the company reveals that <span style=\"color: #ff0000;\">espionage attacks dominate the cyber security landscape in the Asia-Pacific region,<\/span> including India.<\/p>\n<p style=\"text-align: justify;\">c) In the <span style=\"color: #ff0000;\">Asia-Pacific region,<\/span> 25% of cyberattacks stem from espionage, a stark contrast to the 6% and % in Europe and North America, respectively. <span style=\"color: #ff0000;\">The Asia-Pacific region\u00a0saw\u00a0a 180% growth in vulnerability exploitation.<\/span><\/p>\n<p style=\"text-align: justify;\">d) <span style=\"color: #ff0000;\">System intrusion, social engineering,<\/span> and<span style=\"color: #ff0000;\"> basic web application attacks<\/span> represent <span style=\"color: #ff0000;\">95% of breaches<\/span> in Asian Pacific region.<\/p>\n<p style=\"text-align: justify;\">e) The study also found that the most common types of data compromised are<span style=\"color: #ff0000;\"> credentials (69%), internal (37%), and secrets (24%).<\/span><\/p>\n<h2 style=\"text-align: justify;\">About Phishing<\/h2>\n<figure style=\"width: 487px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/i0.wp.com\/www.cloudflare.com\/img\/learning\/security\/threats\/phishing-attack\/diagram-phishing-attack.png?resize=487%2C254&#038;ssl=1\" alt=\"A Phishing Attack\" width=\"487\" height=\"254\" \/><figcaption class=\"wp-caption-text\">Source: Cloudfare<\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><strong>1. About Phishing:<\/strong> It refers to an attempt<span style=\"color: #ff0000;\"> to steal sensitive information<\/span> in the form of usernames, passwords, credit card numbers, bank account information or other important data to utilize or sell the stolen information.<\/p>\n<p style=\"text-align: justify;\"><strong>2. How Phishing is done: <\/strong><\/p>\n<p style=\"text-align: justify;\">a) In a phishing attack, the<span style=\"color: #ff0000;\"> sender pretends to someone trustworthy to the recipient,<\/span> such as a family member, the CEO of their company, or a well-known figure offering giveaways.<\/p>\n<p style=\"text-align: justify;\">b) The <span style=\"color: #ff0000;\">message prompts immediate action,<\/span> often with a sense of urgency and directing the recipient to a fake website resembling a legitimate one.<\/p>\n<p style=\"text-align: justify;\">c) They are asked to input their login credentials which are then stolen by the attacker for identity theft, financial fraud, or selling personal information.<span style=\"color: #ff0000;\"> The phishing email&#8217;s destination URL closely resembles the legitimate one.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>UPSC Syllabus: Science and technology\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source- This post on phishing\u00a0is based on the article &#8220;India one of the key geographies affected by phishing attacks: Verizon&#8221; published in \u201cThe Hindu\u201d on 1st May 2024. Why in the News? A report from Verizon Business has emphasized the rising incidence of phishing in India. Cybercriminals are resorting to new and sophisticated methods to&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/phishing-attacks-in-india\/\">Continue reading <span class=\"screen-reader-text\">Phishing Attacks in India<\/span><\/a><\/p>\n","protected":false},"author":10366,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1566,1738],"tags":[11872,10498],"class_list":["post-294055","post","type-post","status-publish","format-standard","hentry","category-daily-factly-articles","category-science-and-technology-daily-factly-articles","tag-9pm-daily-factly","tag-the-hindu","entry"],"jetpack_featured_media_url":"","views":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/294055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10366"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=294055"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/294055\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=294055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=294055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=294055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}