CSCD 303 Essential Computer Security Winter 2014 Lecture 3 - Social Engineering1 Phishing Reading: See links at end of lecture.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Teaching Johnny Not to Fall for Phish.
Phishing – Read Behind The Lines Veljko Pejović
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Safe Internet Use Mark Wheatley CSI Onsite
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
To:Employee From: impersonated official company Message: Give us personal information here.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What Does It Mean To You? Internet Security. 1.Use you to spread their worms and viruses. 2.Install spyware programs on your computer so they can monitor.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Usable Privacy and Security and Mobile Social Services Jason Hong
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Dr. Harold Cothern, Educause/SonicWall, Hendra Harianto Tuty, Microsoft.
Managing Money Workshop The National Autistic Society AGM
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Scams & Schemes Common Sense Media.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Digital Citizenship Middle School
Don’t get phished!, recognize the bait
ISYM 540 Current Topics in Information System Management
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
CSCD 303 Essential Computer Security Fall 2017
Teaching you NOT to fall for Phish
What is Phishing? Pronounced “Fishing”
Presentation transcript:

CSCD 303 Essential Computer Security Winter 2014 Lecture 3 - Social Engineering1 Phishing Reading: See links at end of lecture

Overview Social Engineering – Defined Humans as vulnerabilities Phishing – What is it? – What does it accomplish – How to recognize it? – Solutions to Phishing

Social Engineering Social Engineering Manipulating or tricking people into divulging private information as opposed to using technical hacking techniques Or, getting them to use unauthorized devices to compromise themselves

Test Case of Human Vulnerabilities June 2011, Bloomberg published the results of a test conducted by the U.S. Depart. of Homeland Security To assess the government’s vulnerability to unauthorized system access, DHS dropped disks and USB drives in parking lots of government agencies and private contractors

Test Case of Human Vulnerabilities Results 60 % of workers who found devices plugged them into their office computers When device was imprinted with an official number of installations on office machines skyrocketed to 90 % voices/ /how-to-manage-the-weak-link-in- cybersecurity-humans.htm

The Individual User Users… Represent the largest install base Completely lack standards Cannot be controlled centrally (or otherwise) Are only predictable in their unpredictability Cannot be redesigned Are all of us !!!

What Exactly is Phishing? Define Phishing

Phishing Scams Defined Phishing is type of deception designed to steal your personal data, such as credit card numbers, passwords, account data, or other information Con artists might send millions of fraudulent messages that appear to come from Web sites you trust Like your bank or credit card company, and request that you provide personal information.

More Phishing Definitions Spear Phishing – a phishing scam that targets a specific audience Example with Kansas Statue Univ. but mentions Kansas State University and is sent to K-State addresses Scareware - Tries to trick you into responding by using shock, anxiety or threats “reply with your password now or we’ll shut down your account tomorrow”

Socially aware attacks Mine social relationships from public data Phishing appears to arrive from someone known to victim Use spoofed identity of trusted organization to gain trust Urge victims to update or validate their account Threaten to terminate the account if the victims not reply Use gift or bonus as a bait Security promises Context-aware attacks “Your bid on eBay has won!” “The books on your Amazon wish list are on sale!” Spear-Phishing: Improved Target Selection

General Patton is retiring next week, click here to say whether you can attend his retirement party Phishing Increasing in Sophistication Targeting Your Organization Spear-phishing targets specific groups or individuals Type 1 – Uses info about your organization

Phishing Increasing in Sophistication Targeting Your Organization Around 40% of people in experiments at CMU would fall for s like this (control condition)

Phishing Increasing in Sophistication Targeting You Specifically Type 2 – Uses info specifically about you Social Phishing Might use information from social networking sites, corporate directories, or publicly available data Ex. Fake from friends or co-workers Ex. Fake videos of you and your friends

Phishing Increasing in Sophistication Targeting You Specifically Here’s a video I took of your poster presentation.

Another Example:

But wait… WHOIS : Location: Korea, Republic Of Even bigger problem: I don’t have an account with US Bank! Images from Anti-Phishing Working Group’s Phishing Archive

17 Spear Phishing Example KSU.edu

18 Spear Phishing Example KSU.edu

19 Scareware Example

20 Scareware Example

21 Another Scareware Example

22 Another Scareware Example

23 Spear phishing scam received by K-Staters, January 2010 If you clicked on the link…

24 Malicious link in scam took you to an exact replica of K-State’s single sign-on web page, hosted on a server in the Netherlands, that steals ID and password if they enter it and click “Sign in” Clicking on “Sign in” then took user to K-State’s home page Note the URL – flushandfloose.nl, which is obviously not k-state.edu

25 Real SSO web page Fake SSO web page

26 Real SSO web page – note “https” Fake SSO web page – site not secure (http, not https) and hosted in the Netherlands (.nl)

27 Real SSO web page – Use the eID verification badge to validate Fake SSO web page

28 Result of clicking on eID verification badge on the fake SSO web site, or any site that is not authorized to use the eID and password

29 Result of clicking on eID verification badge on a legitimate K-State web site that is authorized to use the eID and password for authentication

30 Real K-State Federal Credit Unionweb site Fake K-State Federal Credit Union web site used in spear phishing scam

Phreaking + Fishing = Phishing -Phreaking = making phone calls for free back in 70’s -Fishing = Use bait to lure the target Phishing in 1995 Target: AOL users Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( for ), social engineering Phishing in 2001 Target: Ebayers and major banks Purpose: getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, keylogger Phishing in 2007 Target: Paypal, banks, ebay Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation History of Phishing

2,000,000 s are sent 5% get to the end user – 100,000 (APWG) 5% click on the phishing link – 5,000 (APWG) 2% enter data into the phishing site –100 (Gartner) $1,200 from each person who enters data (FTC) Potential reward: $120,000 A bad day phishin’, beats a good day workin’ In 2005 David Levi made over $360,000 from 160 people using an eBay Phishing scam Anti-phishing Working Group ng.org/

How Bad Is Phishing? Consumer Perspective Estimated ~0.5% of Internet users per year fall for phishing attacks Conservative $1B+ direct losses a year to consumers Bank accounts, credit card fraud Doesn’t include time wasted on recovery of funds, restoring computers, emotional uncertainty Growth rate of phishing 30k+ reported unique s / month 45k+ reported unique sites / month Social networking sites now major targets

How Bad Is Phishing? Perspective of Corporations Direct damage Loss of sensitive customer data

How Bad Is Phishing? Perspective of Corporations Direct damage Loss of sensitive customer data Loss of intellectual property

Why Do People Fall for Phishing? Phishing has been around for years How come people still fall for it?

Research on Phishing Carnegie Mellon University Interviewed 40 Internet users including 35 non-experts Conducted Mental models interviews Mental models included role play and open ended questions Reference: J Downs, M. Holbrook, and L. Cranor Decision Strategies and Susceptibility to Phishing. In Proc. of the 2006 Symposium On Usable Privacy and Security

Research on Phishing Carnegie Mellon University Only 50% knew the meaning of the term Phishing 85% were aware of the lock icon Only 40% knew it was supposed to be there Only 35% had noticed the https and knew what it means Only 55% noticed an unexpected or strange URL Only 55% reported being cautious when asked for sensitive financial info Few reported being suspicious of being asked for passwords … was in 2006 Do you think there would be the same stats today?

Research on Phishing Carnegie Mellon University Naïve Evaluation Strategies Most strategies didn't help people in identifying phishing “ This appears to be for me” “ It's normal to hear from companies you do business with” “ Reputable companies will send s” Knowledge of some scams didn't help identify other scams

Determining Fraud and Protection Measures

Today's Solutions Not so Successful Anti-phishing filters that rely on blacklists and whitelists Usually not up to date and there are many false positives Training Websites and posters help some Spam Filters Don't tend to catch phishing, s look legitimate

More Successful Solutions Two Research Based Filters, CMU Pilfer Cantina Pilfer – Looks at other features than text Number of domains linked to Links in to other than the main domain Cantina – Use Content based approach Creates a fingerprint of a web page Sends fingerprint to search engine Sees if web page is in search results If yes, then legitimate

Detecting Phishing Web Sites Industry uses blacklists to label phishing sites But blacklists slow to new attacks Idea: Use search engines Scammers often directly copy web pages But fake pages should have low PageRank on search engines Generate text-based “fingerprint” of web page keywords and send to a search engine Y. Zhang, S. Egelman, L. Cranor, and J. Hong Phinding Phish: Evaluating Anti-Phishing Tools. In NDSS Y. Zhang, J. Hong, and L. Cranor. CANTINA: A content-based approach to detecting phishing web sites. In WWW G. Xiang and J. Hong. A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In WWW 2009.

Human Training Following slides provide common advice for identifying phishing or fraudulent s...

Look at few phrases to look for if you think an message is phishing scam "Verify your account" Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through – If you receive an from anyone asking you to update your credit card information, do not respond: – This is a phishing scam "If you don't respond within 48 hours, your account will be closed." These messages convey a sense of urgency so that you'll respond immediately without thinking Human Training How To Tell If An Message is Fraudulent

Human Training How To Tell If An Message is Fraudulent "Dear Valued Customer." Phishing messages are usually sent out in bulk and often do not contain your first or last name "Click the link below to gain access to your account." HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a Web site The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site. Resting mouse pointer on link reveals the real Web address String of cryptic numbers looks nothing like the company's Web address, which is a suspicious sign.

Con artists also use Uniform Resource Locators (URLs) that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters. For example, the URL " could appear instead as: Human Training How To Tell If An Message is Fraudulent

Never respond to an asking for personal information Always check the site to see if it is secure. Call the phone number if necessary Never click on the link on the . Retype the address in a new window Keep your browser updated Keep antivirus definitions updated Use a firewall P.S: Always shred your home documents before discarding them. Human Training How To Tell If An Message is Fraudulent

Human Training Anti-Phishing Games Ok, traditional training doesn't work but.. People like to play games Teach using a game Results have shown that More people willing to play game than read People are better at identifying phishing after playing the game Best known is Anti-phishing Phil from CMU

Anti-Phishing Phil A micro-game to teach people not to fall for phish PhishGuru about , this game about web browser Also based on learning science principles You will get to Try the game! S. Sheng et al. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In SOUPS 2007, Pittsburgh, PA, 2007.

Anti-Phishing Phil

Evaluation of PhishGuru Is embedded training effective? Study 1: Lab study, 30 participants Study 2: Lab study, 42 participants Study 3: Field trial at company, ~300 participants Study 4: Field trial at CMU, ~500 participants Studies showed significant decrease in falling for phish and ability to retain what they learned P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training System. CHI P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer. eCrime 2007.

Anti-Phishing Phil: Study Novices showed most improvement in false negatives (calling phish legitimate)

Anti-Phishing Phil: Study 2 Improvement all around for false positives

Summary Wikipedia has a nice page on phishing Phishing is already a plague on the Internet Seriously affects consumers, businesses, governments Criminals getting more sophisticated End-users can be trained, but only if done right PhishGuru embedded training uses simulated phishing Anti-Phishing Phil and Anti-Phishing Phyllis micro-games Phishing at HoaxSlayer Nice set of fishing examples with explanations articles.shtml Can try PhishGuru, Phil, and Phyllis at:

The End Next Time: Attackers – Lab this week is Phishing !!! – Book – No real reference in our book – See references on previous slide