Phishing
We communicate by e-mail, we make our payments online, we resell our objects on the Internet. To use all these services, we must disclose certain personal data each time. A godsend for the crooks who will try to steal them from us by using 1001 tricks.
Definition
The term "phishing" is a contraction of the English words password (password), harvesting (harvest) and fishing (fishing). This is a scam technique, also called phishing, used to surreptitiously obtain the confidential data of Internet users.
The coveted information is that which allows, among other things, access to their e-mail, banking or post office accounts or auction sites. The criminals sometimes act in an organized gang, sometimes alone. The attack can occur via email, website, Internet phone service (VoIP) or SMS.
Phishing |
Using the extracted or stolen data, the scammers then commit asset offenses in the victim's name: bank transfers, online purchases and even placing fake bids on auction sites. In addition, the scammer becomes master of the e-mail account from which he extracted the access data. He can thus use it to send other fraudulent emails to the victim's contacts, but also to block him or change his password.
Characteristics of a phishing attack
The modalities of phishing attacks vary widely. But they have some characteristics in common:
- The scammer always starts by summoning the target to divulge their personal data. The pretext invoked may vary: need to renew the data for security reasons or to update the user's account, data required by an authority to reimburse electricity costs, etc.
- Usually, the summons is sent by email and the message contains a link to a counterfeit site.
- On the bogus site, the victim is asked to fill out a form. In most cases, he is asked to disclose confidential banking data and other personal data (name, surname, e-mail address, username and password for different accounts, etc.).
- The sender's address, but also the content of the e-mail and the design of the website to which it refers are intended to make the recipient believe that his interlocutor is a known financial institution, the Post Office, an online auction platform (e.g. Ricardo or eBay), an email service or an authority.
- It also happens that the phishing page is placed on the site of a serious company after hacking it. The use of this process is best known in the field of online banking.
Legal status
Phishing is not subject to a specific criminal standard in Switzerland. But it often falls under the following articles of the Penal Code:
- Art. 143 CP Data Subtraction
- Art. 143bisCP Undue access to a computer system
- Art. 144 PC Damage to property
- Art. 147 CP Fraudulent use of a computer
- Art. 251 CP False titles
- Art. 305bisPC Money laundering
Add Comments