


Evolving Phishing Attacks Using Web Vulnerabilities? 179
miahrogers writes "The IRS Scam from a few weeks ago was not the the usual canned phishing attack; it
exploited a vulnerability in the IRS benefits website to make users
think they were at a government site. Also, according to Infoworld, eBay's own fraud team was tricked into thinking a phishing email was legitimate eBay correspondence. Mix the above IRS exploit with a phony
email and you have misplaced trust that foils even professional fraud
teams. Interestingly enough, the newest addition to my bookshelf predicted these attacks in full detail. From chapter 4: 'Combined with vulnerable Web servers allowing the "trusted" domain to launch
the attack, it will be harder to determine whether the email is or
isn't legitimate. When a person turns in the e-mail to question its
legitimacy, due to the known marketing campaign a tech support
representative may overlook the fraud report and tell the customer
that XYZ company did send out such a marketing e-mail and it is OK to
click the links.' Are phishers using this book as a tool, or is it a
legitimate prediction? As an IT professional, what efforts should our
corporate IT department be making to proactively to eliminate these
vulnerabilities?"
Never. Believe. Anything. From. Email. Ever. (Score:2, Insightful)
Re:Never. Believe. Anything. From. Email. Ever. (Score:2, Insightful)
Re:Never. Believe. Anything. From. Email. Ever. (Score:3, Funny)
BTW, I'm not kidding about the email, either. Definitely one of the better pieces of spam that's come my way...
All this will stop on the day... (Score:4, Funny)
Re:All this will stop on the day... (Score:2)
The IE7 phishnet?
Re:All this will stop on the day... (Score:4, Funny)
Re:All this will stop on the day... (Score:1)
Only because of your sig: Did you really mean "The phishing filter owned by IT (Information Technology, or perhaps the Stephen King demon)," or did you incorrectly form the possessive of 'it'?
Well isn't that ironic. Actually, I rephrased myself at the last minute and didn't catch that. Let's see if I can get modded up for the same joke twice. Here "it's" again:
All this will stop on the day...that IE7 comes out with its phishing filter. :P
Phishing filter eh? (Score:2, Funny)
Re:That day came some time ago (Score:2)
The Applied Cryto Group [stanford.edu] has had two anti phising extensions out for some time. One is for IE and Firefox, the other is for IE only.
From the site: " SpoofGuard [stanford.edu] is a browser plug in that is compatible with Microsoft Internet Explore. SpoofGuard places a traffic light in your browser toolbar that turns from green to yellow to red as you navigate to a spoof site. If you try to enter sensitive information into a form from a spoof site, SpoofGuard will sav
Re:All this will stop on the day... (Score:2)
Then in the sig...
Grammar Lesson: "you're" is a contraction of "you are"; "your" means you possess something; "yore" means days gone by.
That's too rich. Let me try:
Grammar Lesson: "it's" is a contraction of "it is"; "its" is the possesive form of "it"; "IT" was the last decent Stephen King novel.
Simple: Ensure that your "trusted" sites really ca (Score:5, Insightful)
If you can verify that your trusted sites really are trusted, then you should feel safer.
I think a lot of companies fall victim to using a security method X with out investigating security methods W, Y & Z. After minimal investigation, it might be clear that X has had problems in the past and there is a lot of buzz about possible future problems (like the book in the article might point out).
I don't know a ton about security but I would suggest you simply make yourself a subject matter expert and look out for possible problems with your particular security method.
Re:Simple: Ensure that your "trusted" sites really (Score:5, Insightful)
X is good, Z isn't necessary. (Score:2)
I think this is simply a case example of one security measure being sufficient up to this point and so there is no reason to go through all the trouble of implementing a possibly better method.
Another thing to add to your list of security DO's, always keep your eye open for a better (even if it's different) sol
Protecting site graphics (Score:2)
Why do that, when they won't even use their server software to rewrite requests for ebay.com graphics from unexpected referrers to ones that have "THIS IS A SCAM" overlaying them? When a phisher can build a near-perfect replica of a message from EBAY, PAYPAL, CHASE BANK, or wherever, just by linking to the official website graphics, cryptographic signing of messages is virtual fluff.
Re:Protecting site graphics (Score:1)
Re:Protecting site graphics (Score:2)
Re:Protecting site graphics (Score:2)
Who's the referrer when it's your email package that's requesting the image?
(And yes, I know you should allow your email package to display HTML with remote images, but people do and this is the main technique phishers use to make their messages look legitimate.)
Re:Protecting site graphics (Score:3, Insightful)
Exactly.
And that is exactly why people like eBay, banks, etc should never send mail which embeds remote images, and, ideally, should never send HTML formatted mail at all (or, probably, any other format more complex than plain text).
Re:Simple: Ensure that your "trusted" sites really (Score:2)
The "right" way to do it would be for everyone to send eBay their key once and then for eBay to send out encrypted mail using that key - but that'd increase eBay's proc
digital signature (Score:2, Informative)
You find the senders public key, use it to decrypt the hash, then compare it to a hash of the message that you've made yourself.
If the two match, you know the message has not been tampered.
(all this is typically done more or less transparently by software)
Re:Simple: Ensure that your "trusted" sites really (Score:2)
Alternatively, It'd just take a fake, self-signed key with some nonsense @ebay.com address to fake out people who would just click "OK" wen the program warned them of an
Re:Simple: Ensure that your "trusted" sites really (Score:2)
This would be awesome, if only because we could add "chumming" to the list of scam words.
Because... (Score:2)
Re:Because... (Score:2)
The options out there (Score:2)
You'd be surprised ... (Score:2)
This is also very dangerous when security implementations are very simple to implement because it may provide a false sense of security without ever having to know the nitty gritty details of what's going on.
Don't click the links. (Score:3, Informative)
RTFA. (Score:2)
Re:Don't click the links. (Score:3, Funny)
Re:Don't click the links. (Score:2, Interesting)
Re:Don't click the links. (Score:2)
Re:Don't click the links. (Score:2)
I don't understand why anyone with a clue would click on anything in email.
Don't even cut and paste, just type. Companies could make it easier by using shorter and easier to type urls as well. Banks and other sites with sensitive info, should make it policy to not include links at all.
Then they should send an email (or letter) to customers informing them of the policy.
Re:Don't click the links. (Score:2)
"Click here to track your Amazon.com purchase", "Click here to read more of this Onion article", "Click here to complete the registration process for your forum account", "Click here to pay your latest Cellphone/Electricity/Cable TV bill".
Of course there's secure ways to do each of these (navigate to the home page and log in, then enter tracking/aut
This reeks (Score:5, Insightful)
Re:This reeks (Score:2)
Re:This reeks (Score:2, Insightful)
As long as their are uneducated people who are willing to sign up to this month's publisher's clearing house lottery or free chance to win an ipod, there will be people willing to take advantage of that.
Educate as many people as you can. And when they laugh at your paranoia, be content in knowing that your tin foil hate keeps the government from listening in on your thoughts.
Re: (Score:2)
Re:This reeks (Score:5, Insightful)
Re:This reeks (Score:2, Interesting)
A browser plugin could do it easily without exposing your private key. Start writing!
Re:This reeks (Score:2)
Re:This reeks (Score:2)
Re:This reeks (Score:2)
1) As you said, the PGP integration with popular e-mail clients, and web clients in particular, is either non-existent or cumbersome.
2) The level of sophistication required to deploy and use public key cryptography is above the competence level of the average e-mail
Re:This reeks (Score:2)
Re:This reeks (Score:2)
Re:This reeks (Score:3, Insightful)
Unfortunately, the tech savvy among the users would be the least likely to need such a feature to determine if the email was legitimately from ebay, paypal, their bank, etc. We know the rules about suspicious email. It is the so-called "unwashed masses" that don't.
spf? (Score:1)
Re:spf? (Score:2)
Re:spf? (Score:2)
Re:spf? (Score:2)
How would I set up SPF for this?
Re:spf? Why can't big ISPs do the right thing? (Score:2)
yahoo.com, peoplepc.com, sbc.com, fbi.gov, irs.gov, irs.com, whitehouse.gov - no SPF records at all
gmail.com, google.com, aol.com, verizon.com - includes ?all in their SPF record which basically says "these are my authorized senders but other hosts are probably ok too.
hotmail.com, msn.com, charter.net, ebay.com, usba
Re:spf? Why can't big ISPs do the right thing? (Score:2)
Re:spf? Why can't big ISPs do the right thing? (Score:2)
Besides, It's not like mail servers just bring themselves online and start participating in sending mail without anyone knowing that it is going to happen. Plus they could just as easily provide all full netblocks that they control in their SPF record. Then the record
Wellll (Score:3, Funny)
Hard code your error messages, hard code everything you can, rely on user input as little as you can, and always treat it like nuclear waste.
Personal Responsibility (Score:4, Insightful)
Re:Personal Responsibility (Score:2)
Anyway, I've been saying that for years. I have a solution though, and have mentioned it before. Licensing. Want to own a computer? Fine, buy one. When you want to go online, you'll need a license. Like to send and receive email? That requires an endorsement. Same goes for running a server of any type. Messages cannot be sent without license identification and abusing users can cause their
Re:Personal Responsibility (Score:2)
Re:Personal Responsibility (Score:2)
Sounds just peachy, but who's going to be in charge of enforcement? What will the penalties
Re:Personal Responsibility (Score:2)
Its a felony to forge addresses when mailing which is why you dont see it commonplace. But its perfectly legal to do this on the net. Why?
If it becomes illegal here in the US then the phishers will just rent a server in India or Korea where its legal and continue. There is no way to track down forgers.
My father keeps getting email responses requesting to stop spamming them. It turns out its an old handle he didn't like. Verizon got hacked and refuses to acknowledge or even block o
Re:Personal Responsibility (Score:2)
Shopping on the Internet is like visiting a foreign country. People need to get real familiar with how transactions work, otherwise stay away.
Why create a whole new level of government just because people falls for emails where somebody asks for their ATM pin number?
Re:Personal Responsibility (Score:2)
Re:Personal Responsibility (Score:2)
Registrar Responsibility (Score:5, Informative)
EBay has also been trying to shut down the Web site by working with the Internet registrar that was used to acquire the ebaychristmas.net domain, Pires said. Despite these efforts, however, the site has remained operational.
That registrar, which does business under the name Joker.com, has the power to shut down the scam Web site, Jennings said. "If they were taking their responsibilities seriously, the site would have been shut down weeks ago," he said.
Last time I checked, the Registrar wasn't responsible if a server that happened to be pointed to by a record on a DNS server is registered as primary for one of the domains that they registered contained fraudulent or misleading content. In fact, checking Joker's TOS [joker.com], while Joker may have the "power" to shut him down, I don't immediately see that they have any legal right to do so.
Re:Registrar Responsibility (Score:2)
Re:Registrar Responsibility (Score:2)
Here phishy phishy phishy (Score:1)
Excuse me, I misplaced my tin foil hat
Re:Here phishy phishy phishy (Score:2)
This is a common folly of passenger seat admins. I've had very intelligent, educated users who normally wouldn't fall for phishing scams fall for the latest innovations in social engineering via email. It's inevitable that they'll fall victim to social engineering. People have always fallen for scams, going back thousands of years. No amount of training is going to prepare them, short of forcing them to read a book on social engineering and teaching them to think like a scammer 100%
Absolutely not true (Score:2)
Re:Here phishy phishy phishy (Score:1)
I suppose while we're at it we should teach people to manually examine every IP packet they recieve? Silly idea, eh? Clearly you're thinking about this wrong.
We need to develop the technologies to help users manage their secure relationships. An authenticated connection to a web server (bank, ebay, etc) must be bidirectionally authenticated. And the web browser needs to help make this distinction clear. A couple of areas for improv
Re:Here phishy phishy phishy (Score:2)
Einstein said it best: "Two things are infinite: the universe and human stupidity; and I'm not sure about the the universe."
Flood the Phishers (Score:2, Interesting)
Possible way to stop phishing is to simply flood them with too many responses to their emails.
When you get a phishing email simply go to the pointed site, enter false information and then click the submit button....
For every false set of data they receive they have to try to use that invalid credit card number, ebay password, etc... Thus, costing them extreme amounts of time.
Re:Flood the Phishers (Score:2)
Hmm. You take the time to fill out their form. They have an automated batch verification process that checks the ID/Pass and, separately, the credit card. I can't see that you're hurting anyone except yourself there, unless you actually start running script attacks against their website which are, well, also illegal...
Re:Flood the Phishers (Score:4, Insightful)
Re:Flood the Phishers (Score:2, Insightful)
The problem is that the credit card companies are not motivated to stop fraud. They mostly view fraud as an acceptable business loss. Fraud is a very small percentage bump in their profits. They are not the victims of fraud.
The victims are mostly small businesses and credit card holders. They can't afford to ignore the loss. They spend hours of time working through fraud related clean-up measures. But their time and efforts cost the credit c
Re:Flood the Phishers (Score:4, Informative)
Don't try to con the con, they've been at it longer than you have. That same web site is likely to try and exploit holes in your browser and start installing who knows what on your machine.
Re:Flood the Phishers (Score:2)
Sign your emails (Score:5, Insightful)
There's been a way of eliminating phishing since before phishing existed. Sign your emails with a digital certificate. Get your users to use a mail client that displays big warning signs when an email is unsigned or is signed with an untrusted key. Get your users to trust your key.
If your users don't follow this advice and get scammed, well then it's their own fault. But it's not their fault if you don't sign your emails, and I can think of only a handful of companies that do this right now. Being one of them is being more proactive than most.
You just need user vulnerabilities (Score:5, Interesting)
The bank has taken responsibility and promised to return the money of their customers, but a couple of days ago after this Finnish attack was still saying that the attacks are a scheme to undermine the trust of online banking, but maybe it was just a way to steal money from ignorant people?
Thoroughly educate your staff (Score:5, Informative)
Educate your staff on the vulnerabilities of phishing and email scams. Give them specific examples of how these attacks work and how people are usually duped into them. Use some sort of visual presentation or photocopied handouts of how these attacks look and work. Make the staff very aware of the vulnerabilities on the internet/via email and tell them to ask themselves if it is potentially harmful, and if unsure, to contact an IT professional who would know.
Hopefully, at least 3/4 of those briefed will remember this information and put it to good use.
You can also buy "Phishing Exposed: Uncover Secrets from the Dark Side" to help explain the attacks.
This is essential reading for those who want to learn the ways of the Farce.
Another useful book on Phishing (Score:2)
Phishing Attacks Do Not Evolve (Score:1, Funny)
Simple resolution (Score:3, Insightful)
There's a fairly simple way to avoid these attacks: never ever trust any link in any e-mail, period. If you think the e-mail is legitimate, ignore the links in it and use your own bookmarks to go to the relevant site and check your account or similar page there. If it really is legitimate, there'll be a way to find the information without depending on the e-mail links. It's not completely fool-proof, but for a phisher to fool you when you do this they'd have to vandalize the legitimate web-site to include their links on it's actual pages. That's harder than just faking an e-mail.
Why should I have to tell anyone this? It's received wisdom that if you receive a phone call from someone claiming to be your bank and asking to verify things like your PIN you should hang up, look up the bank's phone number in the phone book, call them yourself and ask Customer Service about the situation. First rule: never trust the identity of the other end unless you called them. Why should e-mail be any different?
Re:Simple resolution (Score:2)
Oops! Now, you tell me!
It's a matter of reson (Score:2)
Sometimes we tend not to use reason and this is what phishers try to exploit.
I receive a dozen of such emails every month. Almost all of them are pitiful attempts, clearly showing they are fake without any special check.
Nonetheless is seems that lots of people get trapped into them.
Maybe people needs more real education in "Internet etiquette" than anti-anything software.
Red flags abound.. (Score:1)
If a well known web site claims to link to an IP address to collect your sensitive information that's a pretty big red flag.
If a Who-Is lookup of the owner of that IP address reads: China that's another pretty big flag.
Of course if the email is from Prince Uba-bott-toomu-slam-botta and he needs your help in liberating the jewel of Thesia you're good to go.
Oh for FSM's sake! (Score:2)
1) Email arrives promising free money
2) User clicks or copy/pastes URL
3) User is redirected to a site which asks for very personal information.
The vulnerability is a PEBKAC problem.
Some are excusing the users because the link first went to a government website. BS. That carries the implied assertion that because the government is involved people should absolutely believe what is being said, shown, or asked for .
Reliable domains are part of the solution (Score:1)
No I don't have a solution, but to use a famous analogy, lack of trust on domain addressing is equivalent to unlocked doors. It's still against the law to open the unlocked door, but at some point you really do need to install the locks.
dave
PhishFighting.com (Score:3, Interesting)
http://www.phishfighting.com/ [phishfighting.com]
"Just enter the Phishing emails REAL url below and watch as realistic looking, fake, entries are continously sent to the Phishers fake site. The criminal will receive hundreds or thousands of fake entries and he won't be able to tell which are fake and which are real."
Nice stuff.
Messages on refrigerator magnets (Score:2)
The solution already exists ! (Score:2)
Two Different Threats, Both Problematic (Score:3, Informative)
The eBay issue was simply a case of a tech support staffer who failed to recognize a scam domain, rather than any technical wizardry or social engineering expertise on the part of the scammers. It's a good argument for adopting defense at the browser level (i.e. toolbars and in-browser blocking) rather than counting on banks, registrars or hosting companies to shut sites down.
What happened to phones? (Score:2, Insightful)
Security measures to take (Score:2)
Nope! (Score:1)
Web Vulnerability (Score:2)
Some malware/spyware that may be included in a linked to site... these things may need certain rights to modify certain elements of the registry.
I'm assuming you are the mod who modded -1 Overrated... if you really thought I was 'Offtopic', wouldn't that have been the better choice?
Regardless, it is on topic, with regards to the question... since you seem incapable of reading the actual Ask Slashdot question... here it is...
"""
As an IT professiona
Re:Web Vulnerability (Score:2)
They wouldn't post their question to Ask Slashdot if they weren't looking for more than just those simple regurgitations that they probably already figured out.
Might as well suggest an interoffice memo warning them.
Those suggestions aren't helpful at all because if you are in IT, you've already figured those ones out.
I made my suggestions because it was unlikely that someone wo
Re:Another good point for ASCII, HTML email? (Score:2)
Most of them say: "Get an HTML capable mail reader" and usually have a text/html type attachment.
Instantly trashed, regardless of who you are....
Try again...now that you just went public! (Score:2)
Well...at the very least, you may want to let them know that you just went *public* with their exploitable web-site on one of the most popular Internet sites in the world.
Oh...and now that you've done that...you should probably get *your* money out of *their* bank.
I'm just sayin'...
Re:Try again...now that you just went public! (Score:2)
Re:What a fraud (Score:2)
Dr. Neal Krawetz, your whining is laughable. First, Lance has no felonies. Second, I've never worked for Lance, at least I've never been paid. Although we have done research together in the past.
Perhaps next time you should slander under your own name? It must be upsetting to not have become as successful as one of your peers, but that's no reason to slander him.
Re:What a fraud (Score:3, Informative)
Lance hasn't paid you because you're a loser and can't produce productive work. Your DFP demo is shit and you almost cost us the STS contract.
You failed to hold up your end of the deal [e.g. be competent] and were FIRED because of it.
Fuck off and die,
Sincerely, Tom St Denis [I've since re-wrote STS from scratch and it's a dozen times better].