The Evolution Of Phishing In Italy

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction

Cyber crimes are rampant in the modern world. The evolution of many cyber crimes in the world is attributed to the rise and extensiveness of technology and its application in the human daily activities. It is with the trend that many happenings concerning cyber crime and insecurity are exposed day in day out. The mass of human population in use of the modern applications and technologies in the world is susceptible to attacks through different perspectives and from different directions. From the concept of physical action and reaction forces, the existence of any technological undertaking has both sides in relevance to its influence on the human life. Therefore, the evolution of the Internet and other computerized applications is a breakthrough and yet a nuisance to the existence of the ancient peace and confidentiality in daily chores (Latta 56).

Fraud is a common endeavour in the human society. Fraud takes various perspectives and reasons to happen in the world. At least every government or financial system has been subjected to fraud once or twice in a lifetime. Existence of fraud is a crucial step towards evolution of security in many cyber stations and machines. For instance, crime and fraud have been reported in banks, associations, institutions, and governments. It is not a new thing in the world when Phishing and any other related act come to news.

In Italy alone, uncountable phishing and crime cases have been reported throughout the world. The existing technological applications are becoming a good and a source of good nuisance to the existing businesses, organizations, financial systems, and human security in the entire world. Intensified crimes can be conducted within a second with all the details lost in the bank: people executing the fraud people may remain anonymous forever. It is spectacular to learn of the different approaches these people use to attack, steal, affect, and disappear without being known. Online applications and use are a tremendous activity that is taking the world by a great surprise. Nonetheless, as far as people will count the loss of insecurity with cyber crime and use of online technologies, its use has transformed the world security and effectiveness in business and human interaction through communication.

Statement of objective/ thesis statement

In Italy, the trend of cyber crimes and cyber attacks has been on the rise since the evolution of technology in the world. This study endeavours to reiterate and examine the evolution of Phishing in Italy whilst identifying the techniques of online fraud used to steal money and stay anonymous on the Internet.

Methodology

Phishing is an online activity that refers to an attempt of using online applications and other approaches to acquire sensitive information from relevant authorities. Acquisition of sensitive information from cyber and other organizations is a trend of activity that drives many people who engage in phishing globally. It is not a new happening to ear banks being robbed of money through online applications. Almost every system in the world is vulnerable to phishing from anonymous people.

Phishing takes place through different methods and approaches. Many criminals involve many varied ways that they know they are safe to accomplish the plan while keeping their presence anonymous to the recipients of the information (Baldoni and Gregory 257). For instance, it has been a common deal to hear about emails sent from anonymous people requesting details. Massive amounts of details are sent often throughout the Internet system. The content of the emails and other texts is to retrieve information from the recipient and use them to access their dockets of confidentiality.

These people are cheats using masquerading ways and skilful means of making the recipients of messages reveal their details without their equitable consent. These people often target personal information. For instance, they would request for information or entries into sites that will let them access confidential information without having the recipient know their innate intention. For instance, the messages and emails sent contain links and other procedures that show the direction through which a person can access tricky sites while they reveal the identity and other sensitive information.

Latta (56) confirms that criminals have often defined fraud programs that are used to access and retrieve information from credible sources. These programs are sophisticated and complicated to be retrieved and scanned. In most cases, accessing someone’s information is painless and easy with the use of these swindle programs. These people use the Internet, and their online users to access some sites and links through which they will be able to access some information. In the mean time, while the recipients of the emails and messages are busy viewing the sites, the scammers are wrapping up on their intentions. By the time the recipient logs out of the site, they will have lost most of their pertinent information without their knowledge. The identity of the scammers is always confidential since they are well aware of what they are doing (Lance 29).

In some situations, fraudsters are able to access people’s systems through accessing their computers and other equipment that bears these details. It would be easy to let someone access all the details and confidential information. This should be done when he or she is accessible to the system or computer used normally. When a criminal wants to access a number of details, he can access the hard disk information restructuring. While accessing these materials, information regarding the source, capitulation, and workability of the system is checked and known. Such incidences have resulted in a big loss of information and subsequent hacking of accounts belonging to these people. It is hard to access and stop these people when they have already accessed and used your databases and sites. As far as cyber crime will keep increasing in the world, avenues to curb future occurrences are on the increase similarly to other new methods through which crime is being escalated.

Italy is one of the nations in which criminal activities have been escalating through phishing activities. The origin of phishing is located in Italy. The evolution of online applications and other systems has led to many Italian government systems being protected against attacks from scrupulous people. One funny thing with cyber crime is the fact that the anonymity of the sender of hacker is kept intact without any possible information about their location and intention. The access of banks and other organizational systems has been on the increase in Italy, China, the United States of America, and even in African countries. Therefore, the online possible way of dealing with cyber crimes and other related cases is to have an agreement that will ensure no one has intentions of robbing a bank or accessing confidential information from a bank (Lance 18).

Discussion

Humble beginnings of phishing

(Baldoni and Gregory (89) show that there are numerous conflicting information concerning the origin of phishing in Italy. Nonetheless, it is believed that the term phishing was first used in 1996 by a group of hackers who had varying intentions upon the many systems used in the government and business organizations. The first case or reported information as regards phishing happened when the American Online Accounts were attacked with information stolen. The happening took place when the hackers managed to coax accounts, usernames and passwords to the existing accounts of the organization.

The term originated from this happening as the people who were involved pronounced it. As far as they could manage, criminals would try to monetize data belonging to a system until the system had to retrieve the information they wanted. Compromise of information is detrimental to the safety and strength of a system: access to protected sites is made easy leading to the compromise of the system. In most cases, phishing was reported to have accessed accounts, send emails, received information and data belonging to confidential authorities, and even attacked people who possessed critical information as regards systems.

The phishers went as far as trying to use swindle and other methodologies that rendered the system vulnerable to access by unauthorised people. Monetizing of the system is the main feature that brought about access and use of confidential data from protected sites. Spam was a normalized methodology of accessing and using information from trusted sites. In order to improve and remain unknown in their sites and intentions, these people added a criminal layer in their systems. The thought that they would compromise data and details from more valuable people and organizations. The inherent ideal behind everything in this case was that the swindlers were targeting frustration of the capability of the systems to remain uncompromised. When the systems gave in, they were able to access them and retrieve confidential information. Hackers would leave the system compromised so that the original owners will not access them anymore after accessing and retrieving the information.

The emergence of fraud and hacking became a gold rush immediately it took control in Italy. Many fraudsters were targeting organizations and government agencies. This is because they believed to have credible information that would let them access materials and financial detains from banks. The emergence of the Internet and the capacity to apply and use them has been a critical booster in the world hacking processes. As done in Italy, phishing started as a simple activity that rendered confidential information monetized and easy to be accessed by unauthorized people. The tactics and tricks used by these people were similar to those used to foster immediate security to cyber and other online applications. In order to remain anonymous, these people made sure that they have their confidence laid on the vulnerability of their targets.

Since its evolution, phishing has used numerous tactics in order to remain anonymous and beneficial in the market. Within a small period, phishing has used numerous approaches within a single step. This nature of masquerading from one-step to another has forced many people to find difficulties in taming them from accessing their sites and systems. It remains as one of the largest Internet threat that has even been reported in the world. The operation by the system renders the availability and stability of the systems as far as they are online.

Change of ploys

All phishing plans and undertakings start with a natural process called ploy. This technique renders necessity for one to access and go through the site as the hackers retrieve the information. For instance, they tamper with the security and entry details of an account, and thus force the user to accept to go through the site before accessing his or her system. The delivery of the URL and any other email that contains the HTML page is made possible, and a must to be used by the person bearing the system. The user of the system or the web page will have to be convinced that he has to go through the system in order to access credible information. Such information will then be a leeway into using the URL. As the web user is busy going through the URL, the hackers will be able to access basic information like financial information and other forms of personal data contained by the HTML of the web user or the company represented.

In the initial phases of phishing process, the ploys were used to deliver the hyperlink within an email or any other channel through which the link could be transferred to the user of the website. The user of the website is urged to take immediate action in order to have his or her account safe and protected from outside accesses. Such a method is used to convince the users of the website and thus give in to the instructions contained in the link sent. Recently, ploys have defined a new approach of delivering the link to users of the targeted website. Nonetheless, they have masqueraded from the old protocol and adopted a similar approach that convinces the users to surrender part of their information on order to safe on their security details.

For instance, the message send from the email may tell the user of the account that he has credible information from the bank, and thus he or she is expected to surrender some of the details in order to correct or upgrade on the existing status of the personal information. In other cases, the users of the accounts are urged to update on their systems in order to accept the new protocols of service offered from their banks or places of work. Moreover, the hackers advance their messages by trying to block or suspend the user of the account in case he or she does not take an immediate action.

In the past, the hackers made sure that they remained anonymous by describing the places of work or relevant information that was certain to the user of the website being targeted. If the users of the websites were not keen enough to take immediate action, the alleged consequences, which included closing down on the system or the account, will result in some penalty. The penalty claim is another chance that the hackers would use to access and get monetary gains. In most cases, the hackers would even close down the account once they have retrieved the information they were targeting (Lytras 18).

Newer ploys have devised a new method of inserting human motivating consequences. These consequences are intended to convince the user to access and surrender part of their confidential details to the link. For instance, the users request for rewards through tax refunds, lottery winnings, and many other sumptuous accessories that were to be accessed by the user of the website in the case that he or she accepts the instructions contained in the link. The swindlers would also place obligations. For instance, they would threaten the user of the website to get obligated in fraudulent tax reporting. Such threats would force the user of the website under target to surrender part of their details (Milhorn 23-56).

Curiosity is another factor that would make users accept the terms and conditions of the swindlers within an immediate effect. In some other cases, phishing will progress when the hackers fake order confirmation to users of the websites being targeted. Through such degree of activities, the users of the websites will surrender company or personal passwords, usernames, and other details that would enable the hackers to retrieve and steal money and other confidential information (Moore 113).

In the past, it was easy to recognise and know phishing pages in the Internet. They present patched and blurry logos together with hyperlinks and erroneous data copied from genuine websites. The pages were exceedingly common in Italy and many other nations. Nonetheless, phishing took another form when it emerged to have taken different avenues. For instance, the in the past, it was easy to notice phishing techniques from the way they looked like. They lacked basic finesse details. Nonetheless, the present modes of phishing have made masquerading endeavours that seek to information similar to the targeted people. In such cases, it would be hard to notice them earlier (Tokoro 267).

In the past, phishing emails contained many mistakes like syntax errors and spelling mistakes. Nonetheless, ordinary people will not be able to access and notice such differences and mistakes. With equitable knowledge of their activities, they have taken a new look a strategy in the country. For instance, they have created sophisticated phishing pages that incorporate genuine websites and HTMLs from the companies or organizations containing the targeted people. They have devised replica details that match to those of the host organization. Such steps will let the users of the websites be vulnerable to the urgencies of the phish victims (Siegel 68-78).

Phishing campaigns expands every year

The stakes and strengths of phishing have been rising in Italy and the rest of the world. The occurrences of cybercrimes are rampant. The advancement in phishing activities is attributed to the pace at which technology is being appreciated and improved in the world. In Italy, phishers took to new phases and strengths when they realized that they were being tracked. The mechanisms of tracking were less vulnerable to the actions of these people. Nonetheless, with their identities anonymous, they could still be reported to tamper with organizational and government security details. In the United States of America, attacks due to cyber crimes targets many organizations within and outside the government. For instance, numerous cases have been reported from the Federal security system that is concerned with offering security details to the people of the United States of America and the world as a whole (Lytras 39).

Phishers is advancing every time they engage in new avenues of hacking and system compromise. Today, professional phishers have developed new mechanisms of doing their work while they remain anonymous. They have opted to modern-day evasion techniques that are prone to the realization from the public. They send spam and links as the first protocol of having their activities proceed within the public. Within a local avenue, these people send clients to phishing pages together with DNS poisoning that resolves the victim’s interests within a single catch. They tame clients to register and be part of the spam world before they access their details and lock them out of the system. In most cases, people who are dragged into the system remain singled out as opponents to the system. The existence of the capacity within the URL to lock out pertinent members or any other person not liable to the system is made possible.

The stages at which phishers do their activities are varied in accordance to their capabilities and intentions at hand. Some of them have gone as a far as retaining or making use of the search engine optimization, SEO. This proactive element drags victims to register as part of the membership of the phishing organization without their knowledge. The clients will be dragged into the phishing pages. Here, they will be able to carry out their daily activities without knowledge that they are operating in different HTMLs other than those genuine within an organization. While carrying out their activities, the phishers will be able to retrieve all the information they are in need of and later let the client log out of the system into the initial protocol. In the end, a third party without the knowledge of the first and the second parties will have accessed all the details (Townsend 78).

Phishing campaigns have also transformed the way in which people relate and view them within an online system. They present themselves as brands or online organizations. When they find people who are searching for help from an online protocol, they often take after them and later demand or sensitize release of crucial data from them. In the mean time, they have programs that target large organizations and brands in the world.

Previously, emails play a critical role in the delivery of phished details. They could access personalized emails and send emails that contained links and other URLs used to process their information. With emails and other messages that required people to be part of the trending situations in their protocols, they reached many people and benefited from them. Many people could access the emails and begin to respond to the commands and/or convictions contained therein. In the mean time, they were able to compromise many accounts and systems without the knowledge of the host systems. Nonetheless, the situations of their operations have changed today (Szor 90).

According to recent publishing from Milan, phishing has transformed their systems into more sophisticated ones. They use a variety of delivery methods in order to reach many people and organizations in the world. They have left use of emails and adopted the use of instant message platforms. With instant message platforms, they are able to send URL settings from "friends" with messages that have links to be accessed (Siegel 76).

For instance, a client will be sent a message from the protocol or platform of his or her friend, over which he or she will be required to make responses. Once the receivers of the message respond by clicking on the link provided, they will not be able to get back to the initial phases, not unless he or she has to present some crucial details. In such cases, people will be tempted to surrender a number of details knowing that they are sending to their friends. Nonetheless, they are caught into the phishing system (Schell and Clemens 67).

Other targets are found within walls and other network sites that connect people globally. Within these social sites, spam is everywhere. Friends of friends are requested to engage in using certain websites and URLs send by their friends, yet they are from anonymous people. Such messages target friends who are known to be working with certain brands or organizations. When these people manage to access part of the credentials required by them, they lock out the system and cannot enable the participants to view them again. Phishers in this case target pertinent details like malware infection and credential phishing (McIntosh 89).

Brenner (26) shows malware infection as situations where these people access unauthorised sites belonging to people. They then destroy them after accessing and retrieving bits of information they are in need. Many organizations and individuals have lost their credential details through such activities. It is hard to determine the initial phases through which phishers used to lure people into accepting their request. However, the transformational approaches used by many organizations have assisted in reducing aspects of dangerous accessory into the protected systems.

In some other situations, phishers hijack emails then they send messages through them. This was the first protocol in which they were able to retrieve and lure people into accepting and using their URLs. In the modern era, phishers have transformed into using expanded and evolving codes that involve different languages. For instance, their programs and systems are able to translate language into the one of preference within a targeted community. For instance, it would be easy to respond to a message written in the old traditional language, and coming from a friend. As a way of adventuring and getting to know the new trends of language use, many people will be lured to let go of their credentials before they can access and use messages from their friends (Brenner 45).

In the past, phishing targeted institutions and other organizations, with a strong sense towards financial institutions. Any other target outside these institutions was regarded at bringing a possible way of accessing the final target, which is the financial database of any institution. Such institutions included banks. Now, phishing has diversified and included many other segments that incorporate use and transfer of financial details globally. The horizons of operation have been expanded to relate and include several parameters of service. Now, the main targets of phishing are stable and growing brands in the world. There are many growing brands in the world today. The competitive nature of the businesses in the world warrants escalation of growth among businesses and brands in the global market. With such movements, cybercrimes and other phishing activities are also taking shape in the society (Szor 27).

The diversification of brands in the market gives room for phishers to diversify their applications and trends of attacks. For instance, phishers target every newly established protocol while the brands assume several and diverse protocols of service to customers (Schneider 68). Within a short period, they will have understood everything that is taking place, and thus ready to lounge their bids to access details and other credentials within the brands. Some of the targeted brands are worldwide manufacturers who have to involve online applications and transfers, online auditions and auctions, airlines, and e-commercial activities and bodies in the world. Many other organizations are targeted for their employees and potential sources of details containing details. These details would be of assistance in accessing bigger institutions and brands in the world (Townsend 33).

The manifestations in the global market indicate that the changes in the global market have transformed cybercrime activities. For instance, cybercrime has become someone’s full time job. This is also the trend with phishing in Italy and the world as a whole. Initially, few people were participating in phishing with their partners. One could just sit somewhere and perpetrate attacks over the Internet. Nonetheless, the activity has become sophisticated and organized today. It is a full time job to many professionals in the cyber industry. The people who are known to involve in such activities have formed capitalistic societies. Here, they conduct businesses just as a Coca Cola Company would conduct its business in the global market. They have their own institutions, constitutions, and terms of service. Nonetheless, they remain anonymous in their detailed activities. It is not like in the past where not even one person could be identified as a phisher or fraudster. Moreover, fraud is a source of income to many people in Italy (Wall 47).

Many businesses in the world have study programs that work towards improving on the working constitutions of the performance and employee productivity. Phishing has reached such a stage in Italy and many other nations in the world. The movements of many phishers are noticeable in the market. For instance, within Milan alone, Phishers are known to be extremely active at weekdays and less active during the weekends. This study has enabled anti-virus managers to reduce the effects of their activity when they are not active in the market. Phishers like to take weekends as days to relax and enjoy what they have earned throughout the week. Moreover, they want to be seen as members working for organizations and not suspects of a certain crime in the society. Therefore, they will be found dining and wining with the rest of associates and work members in places of rest during the weekends.

As part of their activities, phishers are busy looking for ways and means of making their business prosper in the market. For instance, they seek to find new technical phishing kits in the market. For instance, the develop programs and websites that are likely to give them their dues within a short period. They participate in purchasing software and other materials that will assist them to make their activities profitable in the market. They pay successful spam campaigns that have benefitted them in the market (McIntosh 72).

They are carrying out day-to-day campaigns on how to better their services in the market. Moreover, they are busy paying for discounts and proper ROI materials that have benefited them in the past. Such trends of activities have been noticed in Italy and many other nations. Phishers have engaged in collaborative terms with members working in large financial institutions. As part of seeking methods and measures to ensure maximum profitability, phishers seek lessons and training on how to sustain their businesses in the market (Wall 58).

In the past, many people fell for phishers in the market. Some of them were gullible business dealers, unsuspecting and unaware consumers in the market, and new entrants into the system. They were taken easily by phishers. The trends were unusually high as members could only realize, or be told that they have lost their details to anonymous people. Many of them were terribly late to report their plans and activities. However, they could not manage to escape further charming measures put by phishers in the market. Currently, phishers have turned out to be terribly sophisticated in their activities. They involve perceptive and aware people, and they are able to steal from them even with their knowledge. They engaged well-grafted hoax emails that cannot let anyone escape unless under special circumstances. Some recent emails and texts send to business people have contained high-class links and looked real in the first place. Even some professional people cannot make any differences between them and those from genuine sources (Moore 56).

Through such schemes, phishers have managed to exist in the market non-matter what changes. For instance, a confidential message containing a full disclosure of the goods ordered and delivered to a person who had not made any order. In such a case, the responded will automatically respond through clicking the hyperlink and disputing the incident. In such a case, he or she has fallen victim of the hoax. Another example involves a message send to military personnel requesting to click the link in order to make confirmation over attending a retirement event scheduled by the defence minister of Italy. In such a case, the military personnel will not hesitate to click the link, and thus fall victim of the hoax (Hess 48).

Hosting methods evolved in Italy and the rest of the world

Phish hosting refers to a situation where the person responding to the message or email send is available and ready to respond to the requests placed by the message. New methods of hosting have been transformed to new platforms that ensure equitable plans are set and kept for people to stay acquainted. Fraudsters have transformed their hosting techniques by involving spoofing sites that enable them to exploit the content of the management managing the systems. Moreover, they have involved in direct practices like hijacking sites, using bulletproof infrastructure, using fast-flux proxies, standalone attacks, and using local HTML to attack peoples with personalized PCs. In the name of hosting phishing, people will open way into accepting these proxies as a way of reducing cyber crime and further attacks upon their systems and computers (Eleventh United Nations Congress on Crime Prevention and Criminal Justice 18-25).

Numerous measures have been taken by companies and online vendors in order to educate the public on the mechanisms and schemes laid by Fraudsters and phishers in the market. Part of the teachings are directed at letting the people refuse any change of information for their banks not unless they have visited the bank for confirmed change of details. Moreover, banks have directed owners of accounts to refrain from any call or messages through emails that request for details or suspected information before they are allowed to carry out their activities.

As part of recommendations to curb occurrences of phishing in Italy and fraud in the world, it is necessary to have confirmed activities among people who own and run organizations with confidential information. Personalized information should be protected for the interest of the person holding them. Moreover, it is necessary to access qualitative and genuine sites without responding to popping up requests through emails and other channels of communication. Protection of confidential details like credit cards, passwords, usernames, financial details, and such information, should be guarded with intense care and a clear conscience. Activities that are suspected should be reported to the organizations so that they will be blocked from getting to lethal information that its access could tamper with the stability of the organization (Lytras 35-67).



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now