Phishing Seminar Report
Phishing Seminar Report
1. INTRODUCTION.........................................................7
2. PHISHING TECHNIQUES
3. PHISHING EXAMPLES
4. REASONS OF PHISHING
5. DAMAGES CAUSED BY PHISHING
6. ANTI-PHISHING
6.1 SOCIAL RESPONSES
6.2 TECHNICAL RESPONSES
6.3 LEGAL RESPONSES
7. DEFEND AGAINST PHISHING ATTACKS
7.1 PREVENTING A PHISHING ATTACK BEFORE IT BEGINS
7.2 DETECTING A PHISHING ATTACK
7.3 PREVENTING THE DELIVERY OF PHISHING MESSAGES
7.3.1 FILTERING
7.3.2 AUTHENTICATION
7.4 PREVENTING DECEPTION IN PHISHING MESSAGES AND SITES
7.4.1 SIGNING
7.4.2 PERSONALLY IDENTIFIABLE INFORMATION
7.5 COUNTERMEASURES
7.5.1 INTERFERING WITH THE CALL TO ACTION
7.5.2 INTERFERING WITH TRANSMISSION OF
CONFIDENTIAL INFORMATION
7.5.3 INTERFERING WITH THE USE OF COMPROMISED
2
INFORMATION
8. SOLUTION TO CROSS-SITE SCRIPTING PROBLEM
9. ANTI-PHISHING SOFTWARE
10. CONCLUSION
11. REFERENCES
1. INTRODUCTION
3
This also includes detecting Phishing attacks, how to prevent and avoid being
scammed, how to react when you suspect or reveal a Phishing attack and what you can do
to help stop Phishers.
4
Figure 1.1
2. PHISHING TECHNIQUES
Phishers use a wide variety of techniques, with one common thread.
5
browser to a page on members.tripod.com, using a username of www.google.com: the
page opens normally, regardless of the username supplied.
2.2. FILTER EVASION
Phishers have used images instead of text to make it harder for anti-
Phishing filters to detect text commonly used in Phishing e-mails.
Once a victim visits the Phishing website the deception is not over. Some Phishing
scams use JavaScript commands in order to alter the address bar. This is done either by
placing a picture of a legitimate URL over the address bar, or by closing the original
address bar and opening a new one with the legitimate URL.
Messages that claimed to be from a bank told users to dial a phone number regarding
problems with their bank accounts. Once the phone number (owned by the Phishers) was
dialed, prompts told users to enter their account numbers and PIN. Vishing (voice
Phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a
trusted organization.
6
3. PHISHING EXAMPLES
In an example PayPal phish, spelling mistakes in the email and the presence of an
IP address in the link are both clues that this is a Phishing attempt. Another giveaway is
the lack of a personal greeting, although the presence of personal details would not be a
guarantee of legitimacy. A legitimate Paypal communication will always greet the user
with his or her real name, not just with a generic greeting like, "Dear Accountholder."
Other signs that the message is a fraud are misspellings of simple words, bad grammar
and the threat of consequences such as account suspension if the recipient fails to comply
with the message's requests.
7
Note that many Phishing emails will include, as a real email from PayPal would,
large warnings about never giving out your password in case of a Phishing attack.
Warning users of the possibility of Phishing attacks, as well as providing links to sites
explaining how to avoid or spot such attacks are part of what makes the Phishing email so
deceptive. In this example, the Phishing email warns the user that emails from PayPal
will never ask for sensitive information. True to its word, it instead invites the user to
follow a link to "Verify" their account; this will take them to a further Phishing website,
engineered to look like PayPal's website, and will there ask for their sensitive
information.
3.2. RAPID SHARE PHISHING
On the RapidShare web host, Phishing is common in order to get a premium account,
which removes speed caps on downloads, autoremoval of uploads, waits on downloads,
and cool down times between downloads.
Phishers will obtain premium accounts for RapidShare by posting at warez sites with
links to files on RapidShare. However, using link aliases like TinyURL, they can disguise
the real page's URL, which is hosted somewhere else, and is a lookalike of Rapid
Share’s "free user or premium user" page. If the victim selects free user, the Phishers just
passes them along to the real RapidShare site. But if they select premium, then the
Phishing site records their login before passing them to the download. Thus, the Phishers
has lifted the premium account information from the victim.
The main thing Phishing e-mail messages have in common is that they ask for personal
data, or direct you to Web sites or phone numbers to call where they ask you to provide
8
personal data. The following is an example of what a Phishing scam in an e-mail message
might look like.
Figure 3.2.1
Example of a Phishing email message, which includes a deceptive Web address that
links to a scam Web site.
To make these Phishing e-mail messages look even more legitimate, the scam artists
may place a link in them that appears to go to the legitimate Web site (1), but actually
takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like
the official site.
Phishing links that you are urged to click in email messages, on Web sites, or even
in instant messages may contain all or part of a real company’s name and are usually
masked, meaning that the link you see does not take you to that address but somewhere
different, usually an illegitimate Web site.
9
Notice in the following example that resting (but not clicking) the mouse pointer on the
link reveals the real Web address, as shown in the box with the yellow background. The
string of cryptic numbers looks nothing like the company's Web address, which is a
suspicious sign.
Figure 3.2.2
Example of a masked Web address
4. REASONS OF PHISHING
Let's consider some of the reasons people fall victim to Phishing scams.
1
0
most powerful country in the world. If you receive a personal email purported to come
from BOA questioning the validity of your account data, you will have a strong
compulsion to respond, and respond quickly.
Most people feel that they can tell an honest man by looking him in the eye. You
can spot a “professional” panhandler before he gets to the fourth word in his spiel.
Without clues from the verbal and physical realms, our ability to determine the validity of
business transactions is diminished. This is a cornerstone of the direct mail advertising
business. If a piece of mail resembles some type of official correspondence, you are much
more likely to open it. Car dealers send sales flyers in manila envelopes stamped
“Official Business” that look like the envelopes tax refund checks are mailed in. Banks
send
credit card offers in large cardboard envelopes that are almost indistinguishable from
FedEx overnight packages. Political advertisements are adorned with all manner of
patriotic symbols to help us link the candidate with our nationalistic feelings.
4.3. EMAIL AND WEB PAGES CAN LOOK REAL
The use of symbols laden with familiarity and repute lends legitimacy (or the
illusion of legitimacy) to information—whether accurate or fraudulent—that is placed on
the imitating page. Deception is possible because the symbols that represent a trusted
company are no more 'real' than the symbols that are reproduced for a fictitious company.
Certain elements of dynamic web content can be difficult to copy directly but are often
easy enough to fake, especially when 100% accuracy is not required. Email messages are
1
1
usually easier to replicate than web pages since their elements are predominately text or
static HTML and associated images. Hyperlinks are easily subverted since the visible tag
does not have to match the URL that your click will actually redirect your browser to.
The link can look like
http://bankofamerica.com/login but the URL could actually link to
http://bankofcrime.com/got_your_login
1
2
of the readiness with which unsuspecting people often divulge personal information to
Phishers, including credit card numbers, social security numbers, and mothers' maiden
names. There are also fears that identity thieves can add such information to the
knowledge they gain simply by accessing public records. Once this information is
acquired, the Phishers may use a person's details to create fake accounts in a victim's
name. They can then ruin the victims' credit, or even deny the victims access to their own
accounts.
It is estimated that between May 2004 and May 2005, approximately 1.2 million
computer users in the United States suffered losses caused by Phishing, totaling
approximately US$929 million
6. ANTI-PHISHING
1
3
6.1. SOCIAL RESPONSES
One strategy for combating Phishing is to train people to recognize Phishing
attempts, and to deal with them. Education can be effective, especially where training
provides direct feedback. One newer Phishing tactic, which uses Phishing e-mails
targeted at a specific company, known as Spear Phishing, has been harnessed to train
individuals at various locations.
People can take steps to avoid Phishing attempts by slightly modifying their
browsing habits. When contacted about an account needing to be "verified" (or any other
topic used by Phishers), it is a sensible precaution to contact the company from which the
e-mail apparently originates to check that the e-mail is legitimate. Alternatively, the
address that the individual knows is the company's genuine website can be typed into the
address bar of the browser, rather than trusting any hyperlinks in the suspected Phishing
message.
Nearly all legitimate e-mail messages from companies to their customers contain
an item of information that is not readily available to Phishers. Some companies, for
example PayPal, always address their customers by their username in e-mails, so if an e-
mail addresses the recipient in a generic fashion ("Dear PayPal customer") it is likely to
be an attempt at Phishing. E-mails from banks and credit card companies often include
partial account numbers. However, recent research has shown that the public do not
typically distinguish between the first few digits and the last few digits of an account
number—a significant problem since the first few digits are often the same for all clients
of a financial institution. People can be trained to have their suspicion aroused if the
message does not contain any specific personal information. Phishing attempts in early
2006, however, used personalized information, which makes it unsafe to assume that the
presence of personal information alone guarantees that a message is legitimate.
Furthermore, another recent study concluded in part that the presence of personal
1
4
information does not significantly affect the success rate of Phishing attacks, which
suggests that most people do not pay attention to such details.
The Anti-Phishing Working Group, an industry and law enforcement association has
suggested that conventional Phishing techniques could become obsolete in the future as
people are increasingly aware of the social engineering techniques used by Phishers.
They predict that Pharming and other uses of malware will become more common tools
for stealing information.
Most Phishing websites are secure websites, meaning that SSL with strong
cryptography is used for server authentication, where the website's URL is used as
identifier. The problem is that users often do not know or recognize the URL of the
legitimate sites they intend to connect to, so that the authentication becomes meaningless.
A condition for meaningful server authentication is to have a server identifier that is
meaningful to the user. Simply displaying the domain name for the visited website as
some some anti-Phishing toolbars do is not sufficient. A better approach is the pet name
extension for Firefox which lets users type in their own labels for websites, so they can
later recognize when they have returned to the site. If the site is not recognized, then the
software may either warn the user or block the site outright. This represents user-centric
identity management of server identities.
Some suggest that a graphical image selected by the user is better than a pet name
1
5
6.2.2 Browsers alerting users to fraudulent websites
The Bank of America's website is one of several that ask users to select a personal
image, and display this user-selected image with any forms that request a password.
Users of the bank's online services are instructed to enter a password only when they see
the image they selected. However, a recent study suggests few users refrain from entering
their password when images are absent. In addition, this feature (like other forms of two-
factor authentication) is susceptible to other attacks.
Security skins are a related technique that involves overlaying a user-selected
image onto the login form as a visual cue that the form is legitimate. Unlike the website-
based image schemes, however, the image itself is shared only between the user and the
browser, and not between the user and the website. The scheme also relies on a mutual
authentication protocol, which makes it less vulnerable to attacks that affect user-only
authentication schemes.
1
6
6.2.4 Eliminating Phishing mail
Specialized spam filters can reduce the number of Phishing e-mails that reach
their addressees' inboxes. These approaches rely on machine learning and natural
language processing approaches to classify Phishing e-mails.
Several companies offer banks and other organizations likely to suffer from
Phishing scams round-the-clock services to monitor, analyze and assist in shutting down
Phishing websites. Individuals can contribute by reporting Phishing to both volunteer and
industry groups, such as PhishTank.
On January 26, 2004, the U.S. Federal Trade Commission filed the first
lawsuit against a suspected Phisher. The defendant, a Californian teenager, allegedly
created a webpage designed to look like the America Online website, and used it to steal
credit card information. In the United States, Senator Patrick Leahy introduced the Anti-
Phishing Act of 2005. Companies have also joined the effort to crack down on Phishing.
1
7
7. DEFEND AGAINST PHISHING ATTACKS
7.1. PREVENTING
A PHISHING ATTACK BEFORE IT BEGINS
A Phisher must set up a domain to receive phishing data. Pre-emptive domain
registration may reduce the availability of deceptively named domains. Additionally,
proposal have been made to institute a “holding period” for new domain registration
during which trademark holders could object to a new registration before it was granted.
This might help with the problem of deceptively named domains, but would not address
the ability of phishers to impersonate sites. As email authentication technologies become
more widespread, email authentication could become a valuable preventive measure by
preventing forged or misleading email return addresses. Some services attempt to search
the web and identify new phishing sites before they go “live,” but phishing sites may not
be accessible to search spiders, and do not need to be up for long, as most of the revenues
are gained in the earliest
1
8
There are contractors that will perform many of these services. Knowing
when an attack is underway can be valuable, in that it may permit a targeted institution to
institute procedural countermeasures, initiate an investigation with law enforcement, and
staff up for the attack in a timely manner.
7.3. PREVENTING THE DELIVERY OF PHISHING MESSAGES
Once a phishing attack is underway, the first opportunity to
prevent a phishing attack is to prevent a phishing message from ever
reaching a user.
7.3.1. Filtering
Email filters intended to combat spam are often effective in combating
phishing as well. Signature-based anti-spam filters may be configured to identify specific
known phishing messages and prevent them from reaching a user. Statistical or heuristic
anti-spam filters may be partially effective against phishing, but to the extent that a
phishing message resembles a legitimate message, there is a
danger of erroneously blocking legitimate email if the filter is configured to be
sufficiently sensitive to identify phishing email. Phishers depend on being able to make
their messages visually appear to be
from a trusted sender. One possible countermeasure is to detect unauthorized imagery in
emails. There are many countermeasures that Phishers may employ against a simple
image comparison, including displaying many tiled smaller images as a single larger
image, and stacking up transparent images to create a composite image. This means that
imagery should be fully rendered before analysis. An area of future research is how to
recognize potentially modified trademarks or other registered imagery within a larger
image such as a fully rendered email. A similar approach may be fruitful when applied to
web sites, when a user has clicked on a link.
7.3.2. Authentication
1
9
Message authentication techniques such as Sender-ID have
considerable promise for anti-phishing applications. Sender-ID prevents
return address forgery by checking DNS records to determine whether
the IP address of a transmitting mail transfer agent is authorized to
send a message from the sender’s domain. Yahoo! Domain Keys
provides similar authentication, using a
domain-level cryptographic signature that can be verified through DNS
records. Some form of lightweight message authentication may be
very valuable in the future in combating phishing. For the potential
value to be realized, Sender-ID or a similar technology must become
sufficiently widespread that invalid messages can be summarily
deleted or otherwise treated prejudicially, and security issues
surrounding the use of mail forwarders need to be resolved.
7.4.1. Signing
Cryptographic signing of email is a positive incremental step in
the short run, and an effective measure if it becomes widely deployed
in the long run. Signing may be performed either at the client or at the
gateway. However, current email clients simply display an indication of
whether an email is signed. A typical user is unlikely to notice that an
email is unsigned and avoid a phishing attack. Signing could be more
effective if the functionality of unsigned emails were reduced, such as
by warning when a user attempts to follow a link in unsigned email.
However, this would place a burden on unsigned messages, which
2
0
today constitute the vast majority of email messages. If critical mass
builds up for signed emails, such measures may become feasible.
2
1
Figure 7.4.2.1 A subsequent email from Large Bank and Trust Company will
include this personalized information, e.g.
2
2
Figure 7.4.2.2
2
3
7.5. COUNTER MEASURES
2
4
7.5.1.2. Warning about unsafe actions
When a user clicks on a link that is suspicious, such as a
cloaked, obfuscated, mapped, or misleadingly named link, a warning
message can be presented advising the user of the potential hazards
of traversing the link. Information should be presented in a
straightforward way, but need not be simplistic. To help the user make
an informed decision, data from sources such as reverse DNS and
WHOIS lookups could be usefully included:
2
5
Figure 7.5.1.2.1
2
6
or altered to render the confidential information unavailable or useless
to the phisher, the attack can be thwarted.
2
7
is not important; the data has already been transmitted through the
DNS request itself. Blocking DNS lookups for unknown addresses is not
feasible, as DNS is a fundamental building block of the internet.
Similarly, a blacklist based on hostnames is also susceptible to
circumvention via DNS. Information can be transmitted via DNS even if
the Phishers does not control any DNS server whatsoever, by using the
time-to-live fields in DNS responses from innocent third-party DNS
servers.
2
8
screen real estate for password entry, password hashing would be
rendered less susceptible to attack.
2
9
7.6.2. Light-weight two-factor authentication
A less costly approach to two-factor authentication is to have a device
identifier, such as a checksum of all available machine information, which can
authenticate the device. Such a device identifier must be transmitted only to a secure
location, or employ other measures to prevent man-in-the-middle attacks. This has the
advantage of not requiring additional hardware, and the disadvantage that it does not
permit a user to use normal transaction authorization procedures when away from an
authorized machine.
3
0
There are many ways in which cross-site scripting may be
introduced. It is difficult, expensive and error-prone to write an
adequate filter, and often content that should be filtered is
inadvertently overlooked. A browser extension could provide
protection against cross-site scripting in the future. If a new tag was
introduced that could be included in HTML, such as <noscript>,
regions could be defined in which no scripting whatsoever could occur,
or in which particular functionality was prohibited. The browser could
guarantee this behavior, and employing sufficient filtering would be as
simple as enclosing areas of user-supplied text, such as search results
or auction listings, with appropriate <noscript> and </noscript> tags.
To prevent a cross-site script from including a valid </noscript> tag
and inserting cross-site scripting, a dynamically generated random key
should be used that must match in the <noscript> and </noscript>
tags. Since the user-supplied content would have no way to know what
random number was used for the key, it would lack the information
required to re-enable scripting privileges. For example:
3
1
9. HOW ANTI-PHISHING SOFTWARE WORKS
3
2
verified. Many banking and financial institutions become targets for
these types of scams, and they can be a considerable threat to millions
of account holders and users.
Many leading web browsers and software programs have
realized the impact of this trend, and have created programs that can
limit the frequency of these types of scams. Micirosoft Windows
Internet Explorer 7, Firefox 2.0, Google Safe Browsing, and Earthlink
ScamBlocker are just a few programs that have reduced the risks
involved.
In Firefox 2.0, Phishing Protection is always turned on and
checks the sites automatically for any potential risks or hazards. The
list is reviewed on a regular basis, and can be configured to Firefox
Security settings for maximum control. When Phishing Protection in
enabled, the sites are downloaded into a list and checked for any anti-
phishing services. A warning sign will appear if any suspicious activity
is detected. The Netcraft toolbar makes use of a risk rating system,
allowing you the option of entering a password (or not). TrustWatch
makes the Internet Explorer toolbar, and can help validate a Web site
and provide a site report when needed. This option also allows you to
review all suspected sites and find out which ones use SSL technology.
Earthlink Toolbar with ScamBlocker will verify any popup messages
that you may encounter as you visit a site, and can help you find out
all the details on current phishing scams.
Anti-phishing software is designed to track websites and
monitor activity; any suspicious behaviour can be automatically
reported, and even reviewed as a report after a period of time. Anti-
phishing toolbars can help protect your privacy and reduce the risk of
landing at a false or insecure URL. Although some people have
concerns over how valuabe anti-phishing software and toolbars may
be, security threats can be reduced considerably when they are
3
3
managed by the browser program. Other companies that are trained in
computer security are investigating other ways to report phishing
issues; programs are being designed that can analyze web addresses
for fraudulent behavior through new tactics, and cross-checking
domain names for validity.
10. CONCLUSION
3
4
improvements in security technology has the potential to drastically reduce the
prevalence of phishing and the losses suffered from it. In particular:
• .High-value targets should follow best practices and keep in touch with continuing
evolution of them.
• Phishing attacks can be detected rapidly through a combination of customer
reportage, bounce monitoring, image use monitoring, honeypots and other techniques.
• Email authentication technologies such as Sender-ID and cryptographic signing,
when widely deployed, have the potential to prevent phishing emails from reaching users.
• Analysis of imagery is a promising area of future research to identify phishing
emails.
• Personally identifiable information should be included in all email communications.
Systems allowing the user to enter or select customized text and/or imagery are
particularly promising.
• Browser security upgrades, such as distinctive display of potentially deceptive
content and providing a warning when a potentially unsafe link is selected, could
substantially reduce the efficacy of phishing attacks.
• Information sharing between the components involved in a phishing attack – spam
filters, email clients and browsers – could improve identification of phishing messages
and sites, and restrict risky behavior with suspicious content.
• Anti-phishing toolbars are promising tools for identifying phishing sites and
heightening security when a potential phishing site is detected.
• Detection of outgoing confidential information, including password hashing, is a
promising area of future work, with some technical challenges.
• An OS-level trusted path for secure data entry and transmission has the potential to
dramatically reduce leakage of confidential data to unauthorized parties.
• Two-factor authentication is highly effective against phishing, and is recommended
in situations in which a small number of users are involved with a high-value target.
Device identifier based two-factor authentication offers the potential for cost savings.
3
5
• Cross-site scripting is a major vulnerability. All user content should be filtered using
a let-in filter. Browser security enhancements could decrease the likelihood of cross-site
scripting attacks.
11. REFERENCES
3
6
http://en.wikipedia.org/
http://webopedia.com/
http://computerworld.com/
http://www.anti-phishing.info/
http://lorrie.cranor.org/
3
7
Phishing
3
8