Bringing the Fight to Them: Exploring Aggressive Countermeasures to - - PowerPoint PPT Presentation

bringing the fight to them
SMART_READER_LITE
LIVE PREVIEW

Bringing the Fight to Them: Exploring Aggressive Countermeasures to - - PowerPoint PPT Presentation

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams Allen Zhou Comp116 Final Presentation What is Phishing? Social Engineering Steal credentials, data, or money Infect


slide-1
SLIDE 1

Bringing the Fight to Them:

Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams

Allen Zhou Comp116 Final Presentation

slide-2
SLIDE 2

What is Phishing?

  • Social Engineering
  • Steal credentials, data, or money
  • Infect target machine with malware
  • Over email, IM, or social media
slide-3
SLIDE 3

History of Phishing

  • Coined in 1992 on AOL
  • Malicious actors asked users to confirm billing info or

credentials

  • Originally identifiable through poor grammar, shoddily built

websites, overly urgent subject matters

slide-4
SLIDE 4

The Nigerian 419 Scam

  • Name comes from the section of the Nigerian Criminal Code

that outlaws it

  • Out of the blue email arrives from international individual,

asking for help to transfer money

  • Victim is promised large sum of money if they can help with the

transfer by paying a fee to a “trusted” organization

slide-5
SLIDE 5

What is Scambaiting?

  • Began in early 2000’s
  • Intentionally respond to phishing schemes, especially 419 scams
  • Try to waste phisher’s time and resources as much as possible
  • Ask phishers to take embarrassing/funny photos
slide-6
SLIDE 6

Phishing is Evolving

  • Increasingly intelligent, targeted, and harmful
  • Now represents a billion dollar criminal industry
  • Phishing kits and mailer programs openly available to criminals
slide-7
SLIDE 7

Clone Phishing

  • Replicate emails sent from trusted organizations
  • Pose as an “update” to previous email, with malicious payload
slide-8
SLIDE 8

Spear Phishing

  • Context aware phishing
  • Specifically crafted for a victim
  • Pretend to be an organization or individual the victim trusts
slide-9
SLIDE 9

Whaling

  • One form of Spear Phishing
  • Aimed at high profile targets
  • Administrators, Business executives, Government officials
  • If successful, incredibly destructive
slide-10
SLIDE 10

General Reactionary Approach to Phishing

  • Avoid phishing links
  • Last line of defense is the victim’s own intuition
  • Programs to educate employees on how to spot phishing attacks
slide-11
SLIDE 11

Machine Learning in Phishing

  • In theory, allows Spear Phishing attacks to become scalable
  • Precision of Spear Phishing with broad nature of older phishing

attacks

  • Already in widespread use today
slide-12
SLIDE 12

SNAP_R

  • Developed by John Seymour and Philip Tully
  • Sample prototype of how machine learning can generate custom

tweets for use in Spear Phishing

  • Uses Markov models and Long-Term Short Memory neural

networks

slide-13
SLIDE 13

Current Anti-Phishing Practices are not Enough

  • SNAP_R demonstrated a doubled success rate compared to

traditional large scale phishing attacks

  • Reactionary approach does not do enough for these tailored

phishing attacks

  • Being cautionary on traditional phishing platforms no longer

enough

slide-14
SLIDE 14

What is today’s Scambaiting?

  • As social engineering techniques become more sophisticated, so

has Scambaiting

  • Less focussed on wasting time, more on actually hacking back
slide-15
SLIDE 15

Tech Support Scam

  • Reports of scam from U.S. began in 2008
  • Cold call the victim, saying computer is vulnerable and must be

fixed

  • Use Ammyy Admin to perform a remote connection
  • Install keyloggers, malware, or steals data and credentials
slide-16
SLIDE 16

Hacking Back using Ammyy Admin

  • Turn tables on scammer by taking advantage of security flaw in

Ammyy Admin

  • Used by today’s scambaiters to hack scammers back
slide-17
SLIDE 17

The 0 Day

  • Developed by Matt Weeks AKA scriptjunkie in 2014
  • Available as a module on Metasploit
  • Allows arbitrary code to be run on scammer’s machine once

connection is established

slide-18
SLIDE 18

Ethicacy and Legality of Hack Back

  • Very risky, especially when botnet systems come into play
  • Attribution problem
  • How much hack back is too much?
slide-19
SLIDE 19

Active Cyber Defense Certainty Act

  • Presented by Georgia Congressman Tom Graves in October, 2017
  • Allows victims of cyber attacks to perform vigilante justice

(hack-back)

  • Highly controversial, most security professionals deem it too open

ended

  • Attribution problem inherent in the act
slide-20
SLIDE 20

How should Active Solutions be Constructed?

  • Solutions must be ethical, as well as effective
  • Must work at the same or greater speed as phishing attacks are

being implemented

  • Must be intelligent
slide-21
SLIDE 21

Honey-Phish

  • Prototype presented at ShmooCon 2016 by Robbie Gallagher
  • Automates replies to phishing emails with own phishing link
  • When clicked, logs as much info from phisher as possible
  • Messages are built using Markov chains
  • Corpus pulled from Reddit’s personal finance forum
slide-22
SLIDE 22

Phish Feeding

  • Proposed by John Brozycki
  • Pump phishing websites full of realistic but fake credentials
  • Value of real data is decreased
  • More time is available to shut site down
slide-23
SLIDE 23

Honey Tokens

  • Either leave fake tokens in databases so that they can be tracked
  • nce a phishing attack occurs, or submit it directly
  • Allows law enforcement to track the path of the token and find

the original perpetrator of phishing attack

slide-24
SLIDE 24

Closing Mailer Programs

  • Phishers depend on illegal mailer programs to distribute

phishing attacks

  • Can track down these programs and prevent its ease of access to

criminals

slide-25
SLIDE 25

Closing Phish Kits

  • Phishers rarely write their own packages to perform phishing
  • If information about phishing attack can be compiled, feasible to

hunt down origins of phishing kits and shut them down

slide-26
SLIDE 26

Action Items

  • Still not enough research and development in slowing rise of

social media phishing attacks

  • Adopt more aggressive anti-phishing campaigns
  • Keep up reactionary educational model
  • Be careful out there!