phishtime: continuous longitudinal measurement of the ......phishtime: continuous longitudinal...

22
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti - phishing Blacklists Adam Oest , Yeganeh Safaei, Penghui Zhang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn Arizona State University Brad Wardman, Kevin Tyers PayPal

Upload: others

Post on 19-Apr-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

PhishTime: Continuous Longitudinal Measurement of the

Effectiveness of Anti-phishing Blacklists

Adam Oest, Yeganeh Safaei, Penghui Zhang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon AhnArizona State University

Brad Wardman, Kevin TyersPayPal

Page 2: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

2

• Phishing attacks deceive users through malicious websites/messages

• May seem trivial on the surface…

• But phishing occurs at scale and works

Motivation

Page 3: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

3

Page 4: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

• Key ecosystem defense

• Default in major desktop + mobile browsers

• App and e-mail integration

• Automated crawler backend

• Goals

• Timely, comprehensive detection

• Low false positive rate

• Vulnerable to evasion techniques (“cloaking”) [1]

4

Anti-phishing Blacklists

[1] PhishFarm: A Scalable Framework for Measuring Evasion Techniques Against Browser Phishing Blacklists Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, and Kevin Tyers. IEEE Symposium on Security & Privacy, May 2019.

Page 5: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Browser/Blacklist Selection

• Google Safe Browsing (GSB), MS SmartScreen, Opera

5

GSB86%

SmartScreen10%

Opera2%

None/Other2%

Desktop Blacklists

GSB83%

Opera3%

None/Other14%

Mobile Blacklists

Estimated market share as of December 2019

Page 6: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

6

• Coverage: does blacklisting always occur?

• Speed: delay between attack deployment and blacklisting

• Consistency across platforms

Security implications of gaps?

Blacklist Evaluation Criteria

Page 7: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

7

How vulnerable is the ecosystem, as a whole, to modern-day phishing?

• Continuous monitoring of blacklists• Long-term verification of baseline defenses• Identification of practical gaps

• Realistically evaluate blacklisting delays• Discover then test evasion used in the wild• Simulate ecosystem detection methods

Research Objectives

Page 8: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

PhishTime Framework: Discovering Evasive Phishing in the Wild

8

Monitor Blacklisting of

Live Phishing URLsReport non-backlisted

Discard if blacklisted

Analyze non-

blacklisted sites

Design & Deploy

Experiments

w/ Artificial Websites*

(183 - 4.2%)

(4,393)

*using an enhanced version of the empirical testbed proposed in [1]

Page 9: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Artificial Website Configurations

9

A. Allow all traffic (control group)

B. Basic cloaking

C. Combinations of cloaking (redirection + .htaccess)

D. Combinations w/ infrastructure re-use

F. Innovative evasion techniques

G. New reporting protocols

Ba

seli

ne

Ty

pic

al

Em

erg

ing

Page 10: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

10

Page 11: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

11

Simultaneously reported to anti-phishing entities:

2,862 sites / 4,158 URLs total (new, randomized .com domains)

6 deployments+ 1 preliminary

A B C D F G

Longitudinal Experiments

Monitor blacklisting status for 1 week

Page 12: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Baseline Blacklisting

12

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

May-19 Jul-19 Sep-19 Oct-19 Nov-19 Dec-19

Google Safe Browsing Microsoft SmartScreen

Page 13: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Baseline Blacklisting

13

Page 14: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Blacklist Speed & Coverage

14

Desktop Chrome Mobile Firefox Mobile Chrome

Speed(hh:mm)

Coverage Coverage Speed Coverage

Baseline (no evasion) 00:50 99% 99% 24:04 53%

Basic Evasion 00:59 94% 94% - 0%

Typical Evasion 02:48 88% 88% 21:05 2%

Infrastructure Re-use 02:10 96% 96% 23:27 4%

Emerging Evasion - 0% 0% - 0%

Page 15: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

15

Current Reporting Channels

Page 16: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

16

• (re)submission of the URL alone is no goodagainst advanced cloaking

Reporting Protocol Shortcomings

Page 17: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

17

URL Submission Metadata

Page 18: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

18

Evidence-based Reporting

Page 19: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

19

Enhanced Reporting vs. Evasive Phishing

Page 20: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Disclosures & Impact

20

Page 21: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

Conclusions

• Longitudinal measurements are key to understanding ecosystem protections• Proactive anti-phishing approach• Discovering sophisticated attack variants• Not currently being done at the ecosystem level

• Sophisticated evasion remains a threat• Closing blacklisting gaps on mobile devices• Improving data sharing, reporting, detection

• Understanding the impact of blacklisting delays on victims [2]

21

[2] Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn.USENIX Security Symposium, August 2020.

Page 22: PhishTime: Continuous Longitudinal Measurement of the ......PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists Adam Oest, Yeganeh Safaei,

22

Thank you!

Adam [email protected]