Gone Phishing: Living With Technology
Gone Phishing: Living With Technology
Gone Phishing: Living With Technology
Gone Phishing
n an effort to increase customer satisfaction and compete in a global marketplace, more and more financial institutions and businesses alike are increasing online services. Banks offer online account access, credit card companies offer online bill payment methods, and brokerage account transactions can be executed online from the home
personal computer. To companies like Amazon, a brick and mortar business is a thing of the past. Books and DVDs can be ordered online through an Amazon account and paid for using credit card information provided by the user. The important common thread among these services is the exchange of personal information over the Internet.
G. Larcom is a graduate student in the Department of Electrical and Computer Engineering at the University of Massachusetts, Lowell, Lowell, MA; e-mail: guy.larcom@gmail.com. A.J. Elbirt is an Assistant Professor in the Department of Computer Science at the University of Massachusetts Lowell, Lowell, MA, and the Associate Director of the Center for Network and Information Security. E-mail: Adam_Elbirt@uml.edu or aelbirt@cs.uml.edu.
52
FALL 2006
GETTY/PHOTODISC
The growth of the Internet has allowed users to manage their personal finances and expenditures from the comforts of their own home with a personal computer. Account balances can be checked, bills paid, and holiday shopping completed all by simply entering account information and clicking a button. E-commerce and online personal banking has made life easier for the average user, but it has also made life easier for thieves. Phishing is the act of convincing users to provide personal identification information such as credit card numbers, social security numbers, and bank account information for explicit illegal use. Phishing techniques and schemes will be analyzed in terms of their effectiveness on the average user as well as their social and economical impacts. Recent countermeasures on both the corporate and U.S. federal government fronts will also be discussed in this article.
small success rate may be enough to make the attack monetarily worthwhile [2]. With today's technology it is easy to carry out a deception based attack, increasing a phisher's success rate. When a user follows a link in a deceptive email it can be very difficult to detect that they are visiting a fraudulent web site. For the average user a
Phishing is the act of convincing users to provide personal identification information, such as social security numbers or bank information, for explicit illegal use.
simple check of the institutions URL in the browser address bar is enough proof that they are visiting a legitimate site. What the user does not realize is that they may be verifying a spoofed address bar. A phisher can write a web browser script to open a new browser window with no address bar at all [4]. The phisher then uses simple, HTML form elements, stylesheets, and Java Script to create very real, functional imitations of the browsers address bar [4]. In an even less complicated scheme than a spoofed address bar, a phisher registers a cousin domain name for a fraudulent web site. A cousin domain name looks exactly like the domain name of a legitimate institution but with a slight modification. For example a phisher could register www.eastern-bank.com to impersonate www.easternbank.com. These are just a few examples of the many tricks that phishers employ to deceive users. More advanced technical attacks move away from social engineering tactics and into the realm of malicious software [3]. Malware attacks comprise the installation and execution of malicious software on a victim's personal computer. In a hybrid approach a phisher will use social engineering tactics to lure a user into opening or downloading a file that contains a malicious software installation. Security vulnerabilities are also exploited to install malicious software on an unsuspecting user's computer. In either attack the malware installation masquerades as an application plug-in or as a device driver [3]. Keyloggers are malicious software designed to record user input events and activities. Executing as a device driver, a keylogger monitors keyboard and mouse input. In conjunction with a malicious browser plug-in it is possible for a keylogger to, monitor the user's location and only transmit credentials for |
53
FALL 2006
particular sites [3]. The credentials are transmitted to phishing servers and used to commit fraud. Malicious web browser plug-ins have even evolved into processes that can take complete control of a user's session. A malware attack known as session hijacking involves monitoring a user's online activities through a web browser plug-in. In a typical scenario an unsuspecting user simply browses to their bank homepage and logs in, at which point, the malicious software 'hijacks' the session to perform malicious actions once the user has legitimately established his or her credentials [3]. The targeted institution suspects no illegitimate behavior and executes requested transactions.
cies will prevent attacks and save time and money in the long run. Servers are the front door to an online service and log files document activities by all its visitors. Log files need to be analyzed for any fingerprints left by a phisher or any abnormal behavior [5]. Awareness of cousin domains and the potential for fraud will help a company protect itself and its customers [3]. Education and prevention are only the first steps in the fight against phishing. A retaliatory approach is a counterattack on phishers. The retaliation consists of sending a phishing server as much traffic as they can handle and dilute their database with largely false information [6]. This form of retaliation is known as poisoning. In a retaliation scheme similar to a denial of service attack, an anti-phishing company will send a phishing server so much information that the server is unable to accept incoming packets from targeted consumers [6]. In the United States, a denial of service attack against a legitimate Web site is a federal crime that can carry a penalty of up to 10 years in prison. Companies that provide poisoning services claim they do not condone denial of service attacks, rather their goal is to send dummy information to phishing sites. The dummy information is then used by financial institutions to monitor for fraudulent activity [9]. Companies cannot rely on retaliatory attacks alone to protect themselves from phishers; rather time and money should be focused on innovations in security measures and authentication. Companies need to stay one step ahead of the constant evolution of phishing attacks. Advancements in authentication, such as Two-Way Authentication, can protect consumers from phishing attacks. Two-Way Authentication, developed by PassMark Security, adds an additional security feature for verifying a legitimate institution [5]. When a user registers with an online service they securely receive a unique image. This image is presented to the user in subsequent web site transactions. If a user enters their personal identification number at a web site and is presented with the correct secret image, they know they are dealing with the legitimate institution and can continue to enter their password. The secret image can also be utilized in emails to allow the user to verify the message is legitimate. However, authentication technology and counterattacks are not the complete solution to phishing prevention [5]. Institutions also need to take a stronger stance against fraudulent transactions. Currently, the incentive lies not in cracking down on fraudulent transactions, but in issuing new credit cards, offering cash
IEEE TECHNOLOGY AND SOCIETY MAGAZINE
FALL 2006
advancements, and completing purchase transactions. The more transactions a credit card company can complete, the more money they make. Conversely, fighting fraud costs money for a company and is viewed as simply not worth it. It is cheaper for an institution to pay back losses from fraudulent transactions than it is to redesign its infrastructure. To force institutions like credit card companies to confront fraud the government needs to start enacting consumer rights legislation [7].
Legislation Needed
The growth of the Internet and web services has made life easier for many people. Some people enjoy trading stocks online, some people like purchasing music from their favorite artist at Amazon, and some people like trying to commit fraud.
The U.S. Anti-Phishing Act of 2005 is a baby step in the right direction.
Phishing attacks are on the rise and becoming increasingly complex. On the home front, consumers can protect themselves through education, awareness, and up-to-date security software. Consumers are not the only party that needs to be up to speed on phishing education. Institutions need to be aware of the tell-tale signs and fingerprints left behind by a phishing scam. They too need to employ the latest authentication and security software. But for every new software version or band-aid that gets installed, the phishing community pulls a new lure out of the tackle box. The real solution lies in federal legislation. Senator Patrick Leahy's Anti-Phishing Act of 2005 is not going to stop phishing attacks. The Act has made the U.S. government aware of what phishing is. The Anti-Phishing Act is a baby step in the right direction. The federal government must move toward forcing institutions to prevent fraud from ever happening versus cracking down on phishing emails and websites to eliminate the cause of the problem instead of treating the symptoms.
References
[1] E. Kirda and C. Kruegel, Protecting users against phishing attacks with antiphish, in Proc. 29th Ann. Int. Computer Software and Applications Conf. - COMPSAC 2005 (Edinburgh, Scotland), July 26-28 2005, vol. 1, pp. 517-524. [2] B. Schneier, A real remedy for Phishers, Wired News, Oct. 6, 2005; http://www.schneier.com/essay-090.html. [3] A. Emigh, Online identity theft: Phishing technology, chokepoints and countermeasures, ITTC Report on Online Identity Theft Technology and Countermeasures, Oct. 2005; http://www.antiphishing.org/ Phishing-dhs-report.pdf. [4] E. Levy, Interface illusions, IEEE Security & Privacy, vol. 02, no. 6, pp. 66-69, Nov.-Dec. 2004. [5] Anti-fraud alliance, Dec. 3, 2005; http://www.securitypronews .com/news/securitynews/spn-45-20041117TheAntiFraudAlliance.html. [6] D. Geer, Security technologies go Phishing, Computer, vol. 38, no. 6, pp. 18-21, June 2005. [7] B. Schneier, Mitigating identity theft, Schneier on Security: A weblog covering security and security technology, Dec. 12, 2005; http://www.schneier.com/blog/archives/2005/04/mitigating_iden.html. [8] Sen. P. Leahy, Introduction Of The Anti-Phishing Act Of 2005, press release, Feb. 28, 2005; http://leahy.senate.gov/press/ 200503/ 030105.html. [9] B. Krebs, New industry helping banks fight back, Washington Post.com, Jan. 4, 2006; http://washingtonpost.com/wp-dyn/articles/ A63672005Mar4.html
FALL 2006
55