Title: Phishing for Phish in the Phispond
1Phishing for Phish in the Phispond
- A lab on understanding Phishing attacks and
defenses - Group 21-B
- Sagar Mehta
2Phishing attacks State of the Art (simple ? )
- Do-it-yourself phishing kits found on the
internet, reveals Sophos - Use spamming software/ hire a botnet
- Url obfuscation
- Source - A Framework for Detection and
Measurement of Phishing Attacks - Doshi et al
3What you need to be aware of ? - Subtle aspects
- Unicode attacks paypal.com/ cyrillic a
- False security indicators pad-lock icon,
certificates - Address bar hijacking
- Discrepancy between anchor text/link
- Redirects
- Dynamic nature site up for 4.8 days on
average/rotating ips - Negligence Why Phishing works ?
- Legitimate sites usually wont ask you to update
information online, out of band methods similar
to symmetric key exchange
4Statistics
Source - Phishing Activity Trends Report July,
2006 , Anti-Phishing workgroup
5Defenses State of the Art
- Why phishing works ? Dhamija et al
- The Battle Against PhishingDynamic Security
Skins - Dhamija et al - Detection of Phishing pages based on visual
similarity - Liu et al - Modeling and Preventing Phishing Attacks
Jakobsson et al - PHONEY Mimicking User Response to Detect
Phishing Attacks - Chandrasekaran et al - Cont
6Defenses State of the Art
- Anomaly Based Web Phishing Page Detection - Pan
et al - Phighting the Phisher Using Web Bugs and
Honeytokens to Investigate the Source of Phishing
Attacks - McRae et al - A Framework for Detection and Measurement of
Phishing Attacks - Doshi et al - Anti-Spam Techniques spam, a vehicle for
Phishing attacks
7What to do if you suspect an url/ip is Phishing ?
- Look if already present in any blacklist
phishtank, anti-Phishing workgroup - DIG ltIPgt.multi.surbl.org
- entry will resolve into an address (DNS A record)
whose last octet indicates which lists it belongs
to - The bit positions in that octet for the different
lists are - 2 comes from sc.surbl.org4 comes from
ws.surbl.org8 comes from phishing data source
(labelled as ph in multi)16 comes from
ob.surbl.org32 comes from ab.surbl.org64
comes from jp data source (labelled as jp in
multi)
8Anti-Phishing tools
Source - A Framework for Detection and
Measurement of Phishing Attacks - Doshi et al
9Enough of the application layer yada yada
- Can we do better ?
- Analysis of Phishing at network level the
current set up - Why it is challenging ?
- Lessons learned
10Interaction with Phishing Sites
11Interaction with Phishing Sites
12Interaction with Phishing Sites
13Source address frequency
14Dest addr frequency
15(No Transcript)
16CDF Bank Of America, Phishing site bytes
17CDF Bank Of America, Phishing site duration
18CDF Bank Of America, Phishing site packets
19Src addr frequency to yahoo hosted Phishing site
20CDF bytes - yahoo
21CDF duration yahoo
22CDF packets yahoo
23Recent statistics
- A number of phishing websites are in fact
legitimate servers that were compromised through
software vulnerabilities, exploited by hackers
and covertly turned into illegal phishing sites -
making the hackers more difficult to track. - Source SecurityFocus.com
24What we learned ?
- Challenges of Network Level Phishing
- Data Sources
- Real-Time Mapping
- Multiple Domain Hosting
- Redirection Techniques
- Grad Students
25What we are exploring now ?
- Combined Data Sources
- Application Level Sources
- DNS Traces
- Multiple Vantage Points
- Different Universities with Spam Traps
- Is Phishing Targeted?
- Percentage Phishing Mails per Spam Trap
26What does the lab look like ?
- Phishing basics
- Attacks state of the art
- Defenses state of the art
- What you need to be aware of so as no to fall
prey to Phishing ? - Phishing IQ test -
- 100 - Hurray !!! Im the Phishmaster ?
- lt 70 - Dont do online transactions
27References
- Why phishing works ? Dhamija et al
- The Battle Against PhishingDynamic Security
Skins - Dhamija et al - Detection of Phishing pages based on visual
similarity - Liu et al. - Modeling and Preventing Phishing Attacks
Jakobsson et al - PHONEY Mimicking User Response to Detect
Phishing Attacks - Chandrasekaran et al - Anomaly Based Web Phishing Page Detection - Pan
et al - Phighting the Phisher Using Web Bugs and
Honeytokens to Investigate the Source of Phishing
Attacks - McRae et al - A Framework for Detection and Measurement of
Phishing Attacks - Doshi et al