“Phishing in the middle of the stream” Today’s threats to online banking Candid Wüest Security Response Engineer November 2005 Agenda Introduction Local attacks Protection methods used today Anti-Phishing tools SMS authentication Image verification PKI based solutions Attacks against the weak points Questions? & Answers! 2 / 19 © 2005 Symantec Corporation. Introduction Online banking is popular But many people fear that it is insecure Wherever money is involved, bad guys appear trying to steal it! Several known cases of online thefts: 3 / 19 June 2005 in Korea Damage: ~ US$ 50’000 February 2005 in USA Damage: ~ US$ 90’000 © 2005 Symantec Corporation. Evolution Not only phishing emails with obscured links anymore Targeted malware attacks are increasing Trojans targeting financial services: Increased in numbers: 20 variants in May 2003 >2000 variants in November 2005 PWSteal.Bancos.T (April 2005) Monitors 2764 different URLs On 59 different top-level domains 4 / 19 © 2005 Symantec Corporation. Local attacks – SSL “But my session was SSL encrypted, I’m safe, right?” Information is intercepted before it gets encrypted: Browser Helper Objects (BHO) Process injection DLL modules Layered service providers (LSP) Rootkits Screenshots (for virtual keyboards) Fake Pop-ups 5 / 19 © 2005 Symantec Corporation. General attack scenario Assumptions: Malicious code running on the system. Install rogue certification authority (CA) No SSL certification warnings Redirect specific/all traffic to the attacker: Can be done with Hosts file, LSP, rootkits,… Attacker can send fake traffic to user 6 / 19 © 2005 Symantec Corporation. SMS challenge code 2-factor authentication using the mobile phone The same applies to RSA tokens, iTANs, scratch lists Logon to the web site: Send username Send OneTimePass to registered mobile Complete logon: Send OneTimePass 8 / 19 © 2005 Symantec Corporation. Attacks on SMS challenge code Logon to the fake web site of attacker: Send username Send fake web answer Logon to the real web site using gathered data: Send username Send OneTimePass to registered mobile Complete the logon on the fake web site: Send OneTimePass Send fake error answer Complete the logon: Send OneTimePass ACCESS GRANTED Countermeasure: Send transaction details in SMS for checking Downside: Sends sensitive information in clear text message 9 / 19 © 2005 Symantec Corporation. Image verification Personalize logon with custom image and personal text Configuration saved on bank server Only send your password if you see your image & text John Doe PassMark system 10 / 19 © 2005 Symantec Corporation. Image verification Logon to the web site: Send username Send registered image & text Verify image & text Send password 11 / 19 © 2005 Symantec Corporation. Attacks on image verification Logon to the faked web site of attacker: Send username send a fake web site with image & text Verifies image & text Send password Send fake error answer Logon to the real web site using gathered data: Send username Send registered image & text Complete logon: Send password ACCESS GRANTED Other attacks: Replay attack Countermeasure: Not without serious changes 12 / 19 © 2005 Symantec Corporation. PKI based software solutions Use cryptography to authenticate and protect the session Example: WiKID open source solution Initial setup: registering public key PIN code for service (not saved on client) Verification through different channel (phone) Logon: send encrypted SVR{UserID,PIN} Generate ticket: send encrypted USR{OneTimePass} Complete logon: send OneTimePass ACCESS GRANTED 13 / 19 © 2005 Symantec Corporation. Attacks on PKI based software solutions Initial setup: registering public key PIN code for service (not saved on client) Verification through different channel (phone) 1.Logon: send encrypted SVR{UserID,PIN} Generate ticket: send encrypted USR{OneTimePass1} Send intercepted PIN and private & public keys 2.Logon: send SVR{UserID,PIN} send USR{OneTimePass2} Countermeasure: Block hooking or boot clean OS (Knoppix) Downside: Who protects anti-hooking tool? Ring0 Trojans? Additional token (CD-ROM) 14 / 19 © 2005 Symantec Corporation. PKI based hardware token Use external hardware tokens with PKI Smartcards with PKI application External reader with keypad and display (class 3) Connected to PC on USB or serial cable HBCI; already in use for years in Germany 15 / 19 © 2005 Symantec Corporation. PKI based hardware token Unlock smartcard with PIN Verify Java Applet signature request logon web page Send signed Java Applet Initiate mutual SSL Send username Enter challenge CH1 Display response RS1 Send challenge CH1 Enter response RS1 Enter transaction Display & sign (T1) 16 / 19 send transaction & (T1) © 2005 Symantec Corporation. Attacks on PKI based hardware token? Transaction can not be manipulated, as the transaction is signed on external hardware Signing is only accessible from the external reader and can not be triggered by a Trojan Downside: - Not easy portable (Internet café) - More expensive then other solution - Not so convenient for end user 17 / 19 © 2005 Symantec Corporation. Summary Malware targeting financial services exists and increases in number. Why? There is money involved! Software running on compromised systems can be targeted and must protect itself wisely or it will be rendered useless. Most solutions today can solve the phishing problem but not man-in-the-middle attacks with Trojan horses. There are possibilities to protect, so don’t give up the fight! 18 / 19 © 2005 Symantec Corporation. Questions? 19 / 19 © 2005 Symantec Corporation. Thank you for your attention ! Candid Wüest candid_wueest@symantec.com