Download presentation
Presentation is loading. Please wait.
Published byRichard Watson Modified over 9 years ago
1
Phishing for Phish in the Phispond A lab on understanding Phishing attacks and defenses … Group 21-B Sagar Mehta
2
Phishing attacks – State of the Art … (simple ) Do-it-yourself phishing kits found on the internet, reveals Sophos Do-it-yourself phishing kits found on the internet, reveals Sophos Use spamming software/ hire a botnet Use spamming software/ hire a botnet Url obfuscation Url obfuscation Source - A Framework for Detection and Measurement of Phishing Attacks - Doshi et al
3
What you need to be aware of ? - Subtle aspects … Unicode attacks – paypal.com/ cyrillic ‘a’ Unicode attacks – paypal.com/ cyrillic ‘a’ False security indicators – pad-lock icon, certificates False security indicators – pad-lock icon, certificates Address bar hijacking Address bar hijacking Discrepancy between anchor text/link Discrepancy between anchor text/link Redirects Redirects Dynamic nature – site up for 4.8 days on average/rotating ips Dynamic nature – site up for 4.8 days on average/rotating ips Negligence – Why Phishing works ? Negligence – Why Phishing works ? Legitimate sites usually won’t ask you to update information online, out of band methods – similar to symmetric key exchange … Legitimate sites usually won’t ask you to update information online, out of band methods – similar to symmetric key exchange …
4
Statistics … Source - Phishing Activity Trends Report July, 2006, Anti-Phishing workgroup
5
Defenses – State of the Art … Why phishing works ? – Dhamija et al Why phishing works ? – Dhamija et al The Battle Against Phishing:Dynamic Security Skins - Dhamija et al The Battle Against Phishing:Dynamic Security Skins - Dhamija et al Detection of Phishing pages based on visual similarity - Liu et al Detection of Phishing pages based on visual similarity - Liu et al Modeling and Preventing Phishing Attacks – Jakobsson et al Modeling and Preventing Phishing Attacks – Jakobsson et al PHONEY: Mimicking User Response to Detect Phishing Attacks - Chandrasekaran et al PHONEY: Mimicking User Response to Detect Phishing Attacks - Chandrasekaran et al Cont …
6
Defenses – State of the Art Anomaly Based Web Phishing Page Detection - Pan et al Anomaly Based Web Phishing Page Detection - Pan et al Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks - McRae et al Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks - McRae et al A Framework for Detection and Measurement of Phishing Attacks - Doshi et al A Framework for Detection and Measurement of Phishing Attacks - Doshi et al Anti-Spam Techniques – spam, a vehicle for Phishing attacks Anti-Spam Techniques – spam, a vehicle for Phishing attacks
7
What to do if you suspect an url/ip is Phishing ? Look if already present in any blacklist – phishtank, anti-Phishing workgroup Look if already present in any blacklist – phishtank, anti-Phishing workgroup DIG.multi.surbl.org DIG.multi.surbl.org entry will resolve into an address (DNS A record) whose last octet indicates which lists it belongs to entry will resolve into an address (DNS A record) whose last octet indicates which lists it belongs to The bit positions in that octet for the different lists are: 2 = comes from sc.surbl.org 4 = comes from ws.surbl.org 8 = comes from phishing data source (labelled as [ph] in multi) 16 = comes from ob.surbl.org 32 = comes from ab.surbl.org 64 = comes from jp data source (labelled as [jp] in multi)
8
Anti-Phishing tools … Source - A Framework for Detection and Measurement of Phishing Attacks - Doshi et al
9
Enough of the application layer yada yada … Can we do better ? Can we do better ? Analysis of Phishing at network level – the current set up … Analysis of Phishing at network level – the current set up … Why it is challenging ? Why it is challenging ? Lessons learned … Lessons learned …
10
Interaction with Phishing Sites
13
Source address frequency …
14
Dest addr frequency …
16
CDF – Bank Of America, Phishing site – bytes
17
CDF – Bank Of America, Phishing site – duration
18
CDF – Bank Of America, Phishing site – packets
19
Src addr frequency to yahoo hosted Phishing site …
20
CDF bytes - yahoo
21
CDF duration – yahoo …
22
CDF packets yahoo …
23
Recent statistics … A number of phishing websites are in fact legitimate servers that were compromised through software vulnerabilities, exploited by hackers and covertly turned into illegal phishing sites - making the hackers more difficult to track. A number of phishing websites are in fact legitimate servers that were compromised through software vulnerabilities, exploited by hackers and covertly turned into illegal phishing sites - making the hackers more difficult to track. Source: SecurityFocus.com
24
What we learned ? Challenges of Network Level Phishing Challenges of Network Level Phishing Data Sources Data Sources Real-Time Mapping Real-Time Mapping Multiple Domain Hosting Multiple Domain Hosting Redirection Techniques Redirection Techniques Grad Students Grad Students
25
What we are exploring now ? Combined Data Sources Combined Data Sources Application Level Sources Application Level Sources DNS Traces DNS Traces Multiple Vantage Points Multiple Vantage Points Different Universities with Spam Traps Different Universities with Spam Traps Is Phishing Targeted? Is Phishing Targeted? Percentage Phishing Mails per Spam Trap Percentage Phishing Mails per Spam Trap
26
What does the lab look like ? Phishing basics Phishing basics Attacks – state of the art Attacks – state of the art Defenses – state of the art Defenses – state of the art What you need to be aware of so as no to fall prey to Phishing ? What you need to be aware of so as no to fall prey to Phishing ? Phishing IQ test - Phishing IQ test - 100% - Hurray !!! I’m the Phishmaster 100% - Hurray !!! I’m the Phishmaster < 70% - Don’t do online transactions …
27
References … Why phishing works ? – Dhamija et al Why phishing works ? – Dhamija et al The Battle Against Phishing:Dynamic Security Skins - Dhamija et al The Battle Against Phishing:Dynamic Security Skins - Dhamija et al Detection of Phishing pages based on visual similarity - Liu et al. Detection of Phishing pages based on visual similarity - Liu et al. Modeling and Preventing Phishing Attacks – Jakobsson et al Modeling and Preventing Phishing Attacks – Jakobsson et al PHONEY: Mimicking User Response to Detect Phishing Attacks - Chandrasekaran et al PHONEY: Mimicking User Response to Detect Phishing Attacks - Chandrasekaran et al Anomaly Based Web Phishing Page Detection - Pan et al Anomaly Based Web Phishing Page Detection - Pan et al Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks - McRae et al Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks - McRae et al A Framework for Detection and Measurement of Phishing Attacks - Doshi et al A Framework for Detection and Measurement of Phishing Attacks - Doshi et al
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.