Security: Phishing Attacks
Lecture Notes for CS 142
Fall 2010
John Ousterhout
- Readings for this topic:
Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures, by Aaron Emigh.
- Basic idea:
- Get unsuspecting users to visit an evil Web site
- Convince them that the evil Web site is actually a legitimate
site (such as a bank or PayPal)
- Trick the user into disclosing personal information
(password, credit card number, etc.)
- Use the personal information for evil purposes such as
identity theft.
- How to attract users?
- Spam email
- Sponsored advertisements on other sites
- Ads relatively cheap
- Ad networks, publishers incentivized to show ads,
minimize background checks
- Network attacks: redirect legitimate traffic
- Infected machine:
- First, compromise user's machine through other mechanisms
- Then, modify "hosts" file that maps from host names to
network addresses
- Legitimate traffic then gets redirected to the attack
site
- How to spoof the legitimate site?
- Copy HTML
- Include images from legitimate Web site
- Many links refer back to the legitimate Web site
- After collecting login info, log user in to legitimate
site, redirect to legitimate site
- User has no idea that password has been stolen
- Won't user recognize a bogus address in the URL bar?
http:rusprory.mass.hc.ru/old_site/update/index.php
Many people won't notice the difference.
- Attacker can pick names that look similar to legitimate names:
- "vv" instead of "w"
- bankofthewest.login.com
- Companies often use multiple names themselves (e.g., partners)
so it's hard to tell what is legitimate.
- Use Chinese characters that look like "/", "?", and "=" to
create legitimate-looking URLS:
- www.bank.com/accounts/login.php?q=me.badguy.cn
- Picture in picture: use image to generate fake browser look-alike
inside the main window
- Counter-measure: visual indicators to help users identify
legitimate sites:
- Lock symbols to indicate HTTPS
- Color change to indicate HTTPS
- Problems:
- Lock symbols not very obvious (especially Firefox in lower
right corner)
- In Firefox, site can spoof lock symbol with icon
- Problem: too easy to obtain certificates that look like
legitimate sites
- Example: bankofamerica-secure.com
- Pressure on certificate authorities to issue certificates
quickly
- E.g. "domain validation only" certificates: certificate
authority only verifies
that applicant has right to a particular Internet domain name;
no verification of legal status of organization.
- Counter-measure: extended validation certificates
- Goal: prevent attackers from obtaining certificates that
look like legitimate sites
- Certificate authority must thoroughly vet the organization
obtaining the certificate; prevent look-alike names.
- Certificate authority must undergo audits to ensure it is
doing the vets carefully.
- Browser provides special indicator for extended validation sites
- Problems:
- Small organizations don't like delays and cost of
extended validation
- Extended validation indicators not very visible in browsers
- Other counter-measures:
- Browsers starting to include anti-phishing measures (warn users
about known phishing sites)
- Legitimate Web sites can monitor traffic; changes may indicate
attacks under way:
- Spike in download rates for official images
- Unusual rate of password changes, funds transfers
- Legitimate sites can incorporate personal information in emails
to authenticate them: phishers won't have such information. Of
course, must avoid private information such as passwords.
- Remaining problems:
- Legitimate Web sites often use deceptive techniques to get
users to click through ("your last chance for ..."), which
reduces distinction between honest and dishonest sites.
- Education ineffective against phishing: response rates
to phishing e-mails comparable to those for "legitimate"
commercial e-mail.
- Warnings about shady certificates are ineffective: people
just click through.
- Status bar can be spoofed; not a reliable indicator
of URL under mouse:
window.status = "You can trust this URL, honest";
- Mashups:
- Collect contents from many different organizations on
a single page.
- Any element of the mashup can easily make itself look like
any other element.