phishing

advertisement
Phishing
markus.jakobsson@parc.com
Conventional Aspects of Security
• Computational assumptions
– E.g., existence of a one-way function, RSA assumption,
Decision Diffie-Hellman
• Adversarial model
– E.g., access to data/hardware, ability to corrupt,
communication assumptions, goals
• Verification methods
– Cryptographic reductions to assumptions, BAN logic
• Implementation aspects
– E.g., will the communication protocol leak information that
is considered secret in the application layer?
The human factor of security
Deceit
Neglect
Configuration
The human factor: configuration
Weak passwords
With Tsow, Yang, Wetzel: “Warkitting: the Drive-by Subversion
of Wireless Home Routers”
(Journal of Digital Forensic Practice, Volume 1,
Special Issue 3, November 2006)
wardriving
rootkitting
Shows that more than
50% of APs are vulnerable
The human factor: configuration
Weak passwords
With Stamm, Ramzan: “Drive-By Pharming”
(Symantec press release, Feb 15, 2007; top story on Google Tech news
on Feb 17; Cisco warns their 77 APs are vulnerable, Feb 21; we think
all APs but Apple’s are at risk. Firmware update tested on only a few.
Paper in submission)
“Use DNS server x.x.x.x”
And worse: geographic spread!
The human factor: neglect
The human factor: deceit
(Threaten/disguise - image credit to Ben Edelman)
The human factor: deceit
Self: “Modeling and Preventing Phishing Attacks”
(Panel, Financial Crypto, 2005 - notion of spear phishing)
With Jagatic, Johnson, Menczer: “Social Phishing”
(Communications of the ACM, Oct 2007)
With Finn, Johnson: “Why and How to Perform
Fraud Experiments”
(IEEE Security and Privacy,March/April 2008)
Experiment Design
Gender Effects
80%
70%
Success Rate
60%
50%
40%
30%
20%
10%
0%
To Any
From
Any
To Female
From
Female
To Male
From
Male
To Male
To Female
To Any
From Male
53%
78%
68%
From Female
68%
76%
73%
From Any
65%
77%
72%
Ethical and accurate assessments
With Ratkiewicz “Designing Ethical Phishing Experiments:
A study of (ROT13) rOnl auction query features” (WWW, 2006)
Reality:
2
1
B
A
4
eBay
3 credentials
Ethical and accurate assessments
With Ratkiewicz “Designing Ethical Phishing Experiments:
A study of (ROT13) rOnl auction query features” (WWW, 2006)
Attack:
1 (spoof)
A
2 credentials
B
Ethical and accurate assessments
With Ratkiewicz “Designing Ethical Phishing Experiments:
A study of (ROT13) rOnl auction query features” (WWW, 2006)
A
Experiment:
2
2
1
B
A
1
5 eBay
4 credentials
Yield (incl spam filtering loss): 11% +-3% …“eBay greeting” removed: same
Mutual
authentication
in the “real world”
With Tsow,Shah,Blevis,Lim,
“What Instills Trust? A
Qualitative Study of Phishing”
(Abstract at Usable Security,
2007)
starting with 4901
How does the typical Internet
user identify phishing?
Spear Phishing and Data Mining
Current attack style:
Approx 3% of adult Americans report to have been victimized.
Spear Phishing and Data Mining
More sophisticated attack style:
“context aware attack”
How can information be derived?
Jane Smith
Jose Garcia
Jane Garcia, Jose Garcia
… and little Jimmy Garcia
Let’s start from the end!
“Little” Jimmy
his parents
their marriage
license
and Jimmy’s mother’s maiden name: Smith
More reading: Griffith and Jakobsson, "Messin' with Texas:
Deriving Mother's Maiden Names Using Public Records."
www.browser-recon.info
Approximate price list:
PayPal user id + password
+ challenge questions
Why?
$1
$15
Password Reset:
Typical Questions
•
•
•
•
•
•
•
•
Make of your first car
Mother’s maiden name
City of your birth
Date of birth
High school you graduated from
First name of your / your sister’s best friend
Name of your pet
How much wood would a woodchuck …
Problem 1: Data Mining
• Make of your first car?
– Until 1998, Ford has >25% market share
• First name of your best friend?
– 10% of males named James (Jim), John, or
Robert (Bob or Rob) + Facebook does not help
• Name of your first / favorite pet?
– Top pet names are online
Problem 2: People Forget
• Name of the street you grew up on?
– There may have been more than one
• First name of your best friend / sisters best friend?
– Friends change, what if you have no sister?
• City in which you were born?
– NYC? New York? New York City? Manhattan? The Big
Apple?
• People lie to increase security … then forget!
Intuition
Preference-based authentication:
• preferences are more stable than longterm memory (confirmed by psychology
research)
• preferences are rarely documented (in
contrast to city of birth, brand of first car,
etc.) … especially dislikes!
Our Approach (1)
Demo at Blue-Moon-Authentication.com, info at I-forgot-my-password.com
Our Approach (2)
And next?
http://www. democratic-party.us/LiveEarth
http://www. democratic-party.us/LiveEarth
Countermeasures?
• Technical
– Better filters
– CardSpace
– OpenId
• Educational
– SecurityCartoon
– Suitable user interfaces
• Legal
Interesting?
Internships at PARC / meet over coffee / etc.
markus.jakobsson@parc.com
Download