Definition
A phishing web is a website designed to commit a form of fraud by attempting to obtain sensitive information, such as credit card numbers, passwords, or other credentials. Web phishing is usually shaped like the original website both in terms of appearance and domain name with the aim of minimizing the suspicion of potential victims.
From this definition, in general we can draw the conclusion that a phishing web is an ordinary website that is intentionally created to commit a crime.
The main goal of phishing web makers in Indonesia is usually to take over other people’s social media accounts. While abroad, the case can be even worse because it involves credentials information such as credit cards and personal online bank accounts.
Ways of working
After knowing what web phishing is, then we will learn how web phishing works so that in the future we don’t become one of the victims.
The way web phishing works is actually quite simple, namely, perpetrators usually target websites that are bona fide and popular among users. For example, such as facebook.com, twitter.com, instagram.com, gmail.com, or payment sites such as paypal, gopay, to LinkAja which is currently on the rise.
After finding the target they want to target, phishing web makers usually immediately design a fake website, aka make a phishing website with the appearance and domain name as similar as possible to the original website. Some examples of web phishing that we have encountered include fatebook.com (duplicate of facebook.com), kikbca.com (duplicate of klikbca.com), and twlitter.com (duplicate of Twitter.com, pay attention to the letter “i” is replaced with the letter “i”. “L”). That’s roughly how to create a phishing link.
Armed with a domain name and a similar appearance, web phishing will work to collect users to login using real information. Then the data entered will automatically be stored in the database to be used to login to the original website by the perpetrators of the phishing web spreaders.
Social media accounts that are affected by phishing usually have signs that they often post links containing strange things, unusual statuses, or can also be used to carry out a planned fraud mode.
The need for digital IT is needed in daily activities, Bead IT Consultant is the right choice as your partner, visit our website by clicking this link: www.beadgroup.com