Download presentation
Presentation is loading. Please wait.
Published byCory Harvey Modified over 9 years ago
1
Using Social Networks to Harvest Email Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: m98570015@ntou.edu.tw 9/14/2015 1
2
Reference I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas, and E. P. Markatos, “Using social networks to harvest email addresses,” in WPES ’10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society 9/14/2015 2
3
Outline Introduction Social network harvest email Facebbok informaition Conclusions 9/14/2015 3
4
Introduction Social networking is one of the most popular Internet activities ▫Facebook has more than 400 million users ▫Twitter has more than 40 million users Privacy leakage is one of the biggest problems of social networking 9/14/2015 4
5
http://www.checkfacebook.com/ 9/14/2015 5
6
Social network Used for malicious purposes ▫name, nickname https://www.facebook.com/btaylor How names extracted from social networks ▫harvest email addresses Names collected ▫Facebook and Twitter networks Query terms for the Google search engine ▫harvest almost 9 million unique email 9/14/2015 6
7
Current Methodologies Give a brief overview of the current methodologies used by spammers to harvest email addresses ▫Web crawling ▫Crawling mailing list archives sites ▫Malware ▫Malicious sites ▫Dictionary attacks 9/14/2015 7
8
Two approaches Present two different approaches to harvesting ▫Blind harvesting ▫Targeted harvesting Social network ▫Facebbok and Twitter Google search engine ▫gather email addresses Facebook ▫personal information 9/14/2015 8
9
Find name and nickname Crawlers for extracting names ▫Facebook fan pages ▫Twitter crawled the accounts the user follows 9/14/2015 9
10
Google search engine Once the names have been harvested ▫8 different combinations "term@hotmail.com", "term“, "term@msn.com", "term at “, "term@windowslive.com", "term@", "term@gmail.com", "term@yahoo.com" ▫retrieve the first 50 results ▫parse the two-line summary provided 9/14/2015 10
11
Blind Harvesting (1/2) Able to harvest, on average ▫45 emails per name for the Facebook names ▫25 emails per name for the Twitter nicknames 9/14/2015 11
12
Blind Harvesting (2/2) Dictionary :http://wordnet.princeton.edu/ Surnames: http://www.census.gov/genealogy/www/data/ 9/14/2015 12
13
Targeted harvesting (1/3) Traditional phishing contain generic terms ▫“Dear user”, ”Dear customer”, ”Hello subscriber” Personalized phishing ▫Email look like they originate from a friend 9/14/2015 13
14
Targeted harvesting (2/3) Use the harvested email addresses in the Facebook search utility ▫gain profile The first technique ▫Uses information from the Facebook network Successfully link 11.5% of the harvested names with their actual email address The second technique ▫Uses information from the Twitter network 43.4% of the profiles returned 9/14/2015 14
15
Targeted harvesting (3/3) The third technique ▫collected from other social networks ▫harvest profiles from Google Buzz 40.5% valid Gmail addresses 9/14/2015 15
16
Fetch name Method ▫facebook app ▫friend 9/14/2015 16
17
Permissions Read Permissions Write Permissions Page Permissions 9/14/2015 17
18
Basic profile 9/14/2015 18
19
9/14/2015 19
20
Facebook profile 9/14/2015 20
21
Content categorization 9/14/2015 21
22
Conclusions We present how information, that is publicly available in social networking sites ▫for harvesting email addresses ▫deploying personalized phishing campaigns We present two different approaches to harvesting email ▫greatly enhance the efficiency of a spam campaign 9/14/2015 22
23
Thanks for Your Attention Q & A 9/14/2015 23
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.