Phishing
By: Joanna Georgiou
Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April 22). Why Phishing Works. Gelernter, N., Kalma, S., Magnezi, B., & Porcilan, H. (2017). The Password Reset MitM Attack.
Phishing By: Joanna Georgiou Dhamija, R., Tygar, J. D., & - - PowerPoint PPT Presentation
Phishing By: Joanna Georgiou Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April 22). Why Phishing Works. Gelernter, N., Kalma, S., Magnezi, B., & Porcilan, H. (2017). The Password Reset MitM Attack. What is Phishing? Dhamija, R.,
By: Joanna Georgiou
Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April 22). Why Phishing Works. Gelernter, N., Kalma, S., Magnezi, B., & Porcilan, H. (2017). The Password Reset MitM Attack.
Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April 22).
first empirical evidence about which malicious strategies are successful at deceiving users.
phishing attacks.
participants were shown 20 websites.
recognize security measures installed in web browsers.
meaning of the syntax of domain names and cannot distinguish legitimate versus fake URLs)
padlock icon in the browser indicates that the page they are viewing was delivered securely by SSL
can be fooled by its placement within the body of a web page.
certifi ficates
www.paypa1.com instead of www.paypal.com , or using non-printing / non-ASCII characters.
hyperlink to a rogue site.
windows / dialog windows.
next to a legitimate window. (if they have the same look and feel the user may mistakenly believe that are from the same source / may not even notice that a second window exists)
identucators
websites (including all related links, images and web pages)
better than it would be in real life
in randomized order.
labeled “Website 1”, “Website 2”.
Presented participants with 20 websites; the first 19 were in random order:
techniques
ficate (this website was presented last to segue into an interview about SSL and certificates).
ficate: Users are exposed to a risk that a third party could intercept traffic to the website using the third-party's
use more than one type of browser and operating system.
10 to 135 hours
hesitation when popup warning about fraudulent certifi ficates were shown.
experience, hours of computer use showed a statistically significant correlation with vulnerability to phishing.
content only
HTTPS
icon
than the username and password was requested.
pages to every website presented in the study.
top search result and compare it to the website presented in the study.
with 2 “v”s instead of a “w” in the domain name.
be the legitimate Bank of the West website
the page as one reason for their decision.
sites
logo(displaying an SSL protected webpage, hosted at Verisign, shows the SSL certificate status of the www.bankofthewest.com.)
URL was the primary factor in deciding.
users cannot distinguish a legitimate website from a spoofed website.
noticed) by many participants.
displayed within the page than if presented by the browser.
touches such as favicons (icons in the URL bar) than SSL indicators.
indicators to persuade the users that the spoofed websites were legitimate.
some of the participants to be less trustworthy. Confused the participants by hosting secure pages with third parties, where the domain name does not match the brand name.
fficient for security indicators to appear only under trusted conditions, it is important to alert users to the untrusted state.
periphery or focus of attention (e.g., using colors in the address bar to indicate suspicious and trusted sites) may be ignored entirely by some users
Gelernter, N., Kalma, S., Magnezi, B., & Porcilan, H. (2017).
Facebook.
vulnerabilities in popular mobile applications.
SMS and phone calls, and evaluate of them on Google and Facebook users.
the password reset process.
in the middle (MitM) attack at the application level.
challenge to the victim who either wishes to register in the attacking site or to access a particular resource on it.
information can be extracted from the victim by the attacker during a registration process to the attacking website or before some operations like file download, when the victim is required to identify themselves using their phone.
register to a website or prove they are human using their phone or both, in order to use common online services such as fi file downloads for free”.
1) They would never register for unknown websites or give their phone number, no matter what free services are offered. 2) Said they would agree to use both
3) Would only agree to register. 4) Would only agree to identify themselves using their phone
files and requires a valid phone number to download them. The verification is done via SMS code, and the user is only required to insert his phone number.
1) 39.4% said they would insert their phone number immediately. 2) 14.1% said they would fi first try to
files via friends or via
3) 18.2% percent said they would insert their phone number only if they really needed the fi files (rather than just wanting them). 4) They wouldn’t insert their phone number.
1) CAPTCHA: do not aim to prevent an attacker from resetting the password, but rather aim to prevent the attacker from doing this automatically. 2) Security Question: During the registration, users are sometimes asked to answer personal question(s) that will be used to identify them. 3) Code to the Mobile Phone: Authentication can be done via one of three approaches: (1) something you know (e.g., password), (2) something you are (e.g., fi fingerprints), and (3) something you have (e.g., special token device or a phone). Authentication with phone is usually done by sending a message with a password reset code to the phone of the user via SMS or by automated phone call to the user, in which the code is given. The user is required to insert this code in order to change her password.
4) Reset Link to the Email: The most common countermeasure. The PRMitM attack cannot be applied on websites that allow password reset only by sending a reset link to the email. Unfortunately, this option is usually not relevant for the email services themselves. Moreover, relying only on this option blocks password recovery when users have lost access to their email account.
Participants were asked to register to a website in order to perform a short experiment. During the registration process, they were asked to type their email address, and only then, to answer a classical security question: What is your mother’s maiden name. Once the users completed the registration, they were asked whether the answer they just typed was correct.
PRMitM attack on Facebook users using SMS and comparison between Facebook’s SMS and more detailed SMS. The experiment page (attacker’s page) asked them to identify themselves using their phone number. Specifically, the page asked the participants to type their phone number, so they can receive an SMS with a code that should be typed in. Participants: 88 volunteer students
Detailed SMS: *WARNING* Someone requested to reset your Facebook password. DO NOT SHARE THIS CODE with anyone or type it outside Facebook. The password reset code is XXXXXX.
1) Many users just searched for the code without reading the text. Some of them did not
phone. 2) Many users who noticed that the message was sent from Facebook, thought the login to experiment was done using the widely used login with Facebook mechanism.
in the attack, mainly if the content of the message is unclear. Furthermore, adding sentences to the attacking page like ”Powered by Facebook” or even just an explanation that the message will arrive with specifi fic sender, may make SMS spoofi fing even more worthless.
fier.
deliver longer messages.
phone call, the user dedicates more attention to the content of the phone number.
numbers are written the same in many languages. To extract the reset code from a phone call, at least basic understanding in the language is required; hence, a user that extracts the code from a phone call is more likely to also understand the message.
Phone call from Google in English: Hello! Thank you for using Google phone verification. Remember! You should not share this code with anyone else, and no one from Google will ever ask for this
Phone call from Google in other language: Hello! Thank you for using our phone verification. Your code is XXXXXX. Again, your code is XXXXXX. Good bye.
PRMitM attack on Google users using phone calls To initiate a password reset process in Google, only the email address of the victim is required. Nevertheless, they asked the users to insert both their email address and phone number, so the call will not be suspicious The most common argument was the fact that the phone call did not specify anything about the meaning of the code.
about the user.
in the name of the user.
themselves to the mobile phone of the user.
bypass them, they cannot be forwarded to the user as legitimate security questions for other websites.
limitations of the SMS with the code.
unusual.
has an alert about the attempt to reset the user password.
but this has nothing to do with an SMS that is sent by a service that intends to protect its users
however, they can do the same also for legit SMS messages.
users The LVS message was: *WARNING* Someone requested to reset your Facebook password. Press this link to reset your Facebook password: http://bit.ly/XXXXXXX. DO NOT SHARE IT!
did not participate in any other experiment or survey All the participants stopped the attack
PRMitM attacks. Two elements must hold: (1) the message must include the sender, the meaning of the code, and a warning about misuse (2) the call must cause the user to listen and understand the message
Instead of initiating a phone call from Google, they called the users with an (interactive) phone call.
Participants: 45 volunteer students that did not participate in any other experiment Results: None of the participants disclosed their code
1) Password-reset messages (SMS, phone call, email) must include the sending website, clear explanation about the meaning of the code (password reset), and a warning to avoid giving this code to any person or website. 2) For each supported language, the password reset messages (SMS, phone call, email) must be sent in that language. 3) Test password reset process for every supported language separately. 4) Notify the user when a password reset request is sent, to both the email and the
notification to email account that got compromised is useless.
5) The link or the code sent to reset the password should be valid only for short time period, e.g., 1 − 15 minutes. 6) If there are several ways to reset the password for a user, automatically disable the less secure ones. If it is impossible to use a secure password reset process, contact the user in advance and offfer them both to add information that can be used to reset their password securely and to disable the (only) insecure ways. 7) Require several details about the user before sending the password-reset message (SMS, phone call, email). This prevents the easy option for the attacker to launch the attack given only the phone number of the user, without knowing anything else about the user.
has to intensely explore each of its target websites.
also be authenticated to the attacked website.
clicks are required.
website and tricks the victim into inserting her credentials (username and password)
impersonation to another website.
and the victim is required.
at least a single minimal correct piece of information about themselves.
information (e.g., phone number) in order to get some services.
be launched naturally from every website.
Phishing PRMitM
in the design of the attacked website, the attacker exploits unwary users who ignore indications given to them by the browsers.
password-reset process.
and other client-side defenses (e.g., browser built-in mechanisms or extensions) to detect the attack.
Phishing PRMitM
ackground-vector-31048858
a=X&ved=2ahUKEwjZg9OQrernAhVRKewKHdLnDgQQ_AUoAXoECA4QAw&biw=1920&bih=949#imgrc=42buE2aboOLKDM