What is Phishing (from Wikipedia)
In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
How can it cheat people?
1. A perfect mail from famous website, such as online shopping site like eBay, PayPal, Amazon, etc. And online banks (if you don't have any online accounts except email, you can sleep or leave now :). Some problems you may concern, like account stolen,, win a prize, etc.
2. Give a link to a phishing site, most often using a URL redirection which is perfect like the origin site
3. Input you private information
Analysis the steps
Step 1 is achieved by spam email. But it is not easy to filter such emails claimed from famous websites. The most important thing is to tell you a good story and make you believe it. They have many talent writers. They are social engineering techniques.
Step 2 is obvious to expert but difficult to normal users. You have trusted the story in step 1, so you will move your eye from the ball. To expert, by instinct they will try to see something behind the surface.
Step 3 is also easy. Hiring a professional to build a website is very cheap, especial just making a copy of some website.
A real STORY
A professor of SIS received an email from: "Amazon.com Service Center" <support@amazon.com> at Fri, 01 Sep 2006. The email asks the user to update member information for security reasons, because "we are unable to verify or authenticate any information you provide to us.” through a link "http://www.amazon.com/exec/obidos/sign-in.html"
The mail is perfect when we look at it, but in fact danger under the surface. Look at the source code of the link:
hre=f=3D"http://rds.yahoo.com/_ylt=3DA0geurgnV4VEPnoB98hXNyoA;_ylu=3DX3oDMTE5a=XJmaGJ2BGNvbG8DZQRsA1dTMQRwb3MDMTIzBHNlYwNzcgR2dGlkA0Y3NTFfMTA4/SIG=3D12hh=jkhah/EXP=3D1149675687/**http://www.google.com/url?q=3Dhttp://211.94.240.2=1/_us/obidos/index.html?ref=3Dpd_irl_gw_r/102-8758036-5777720?opt=3Doa&pag=e=3Drecs/sign-in-secure.html&response=3Dtg/recs/recs-post"target=3D_BLANK
It is MIME email and use Quoted-printable code. Following is decoded:
href="http://rds.yahoo.com/_ylt=A0geurgnV4VEPnoB98hXNyoA;_ylu=X3oDMTE5aXJmaGJ2BGNvbG8DZQRsA1dTMQRwb3MDMTIzBHNlYwNzcgR2dGlkA0Y3NTFfMTA4/SIG=12hhjkhah/EXP=1149675687/**http://www.google.com/url?q=http://211.94.240.21/_us/obidos/index.html?ref=pd_irl_gw_r/102-8758036-5777720?opt=oa&page=recs/sign-in-secure.html&response=tg/recs/recs-post"target=_BLANK
Look at the URL: it is a URL from yahoo.com and google.com. They are big company. If we don't trust them, what we should trust?
In fact it is Phishing and Redirection Vulnerability in Yahoo and Google!
The URL combines the Yahoo Redirection and Google Redirection and redirect to a phishing website. The redirection now has been proved an official redirection hole used for spam, phishing.
Why they choose Yahoo and Google?
Because 99% of Internet users trust Google and when they see a link starting with "www.google.com" they think its part of Google or a site Google knows about and has included it in its structure. The same is the Yahoo.
More analysis for URL Redirection
URL redirection, also called URL forwarding, domain redirection and domain forwarding, is a technique on the World Wide Web for making a web page available under many URLs. More information is at http://en.wikipedia.org/wiki/URL_redirection
If you try "http://www.google.com/url?q=http://www.uncc.edu/", what will you see? That is good news because 1) clearly Google now can no longer deny it’s a hole - they themselves fixed it 2) some consumers may now be slightly safer, kinda. But this really isn’t a complete fix as this is only one of many known redirects in Google that have the potential of aiding phishing attacks. There are 10 more redirects in Google that are still functional on this one URL alone.
A severe redirection and phishing vulnerability have been found in Yahoo Network. The specific URL linked to any further yahoo website can be manipulated by the attacker to redirect the traffic and used for phishing. The critical point is the URL can be called by third party for phishing.
[Original URL]
The above stated URL's are taken from the next page of query set as "Hacking". the network used is rds.yahoo.com. the phisher exploits it by stripping off full yahoo search and appending the rogue website.
[Phishing URL]
Anti-Phishing
Beat the weakness of human being! “Training people to recognize phishing attempts” is the best way.
We also have technical tools to help us. Phishing in fact is impersonating a victim site. If we can identify a website, it is easy to find out a faked one.
-
Web browser or tool bar: it can remember the selected website. So if the victim site redirected to a different IP using URL redirection or DNS poison, the browser will warm user or just block the visit.
-
Two-factor authentication: for example BOA online bank provide Site-key for user. You can choose a personal image and three questions. Every time when user login, it will display the image to verify the truth of the website.
-
Eliminating phishing mail: make the email system smarter to reduce phishing mails
-
Monitoring and takedown: Several companies offer banks and other organizations likely to suffer from phishing scams round-the-clock services to monitor, analyze and assist in shutting down phishing websites. Individuals can contribute by reporting phishing to both volunteer and industry groups, such as PhishTank. (from Wikipedia)
Phishing = a good story + some system vulnerabilities
= the weakness of both human being and machines
分享到:
相关推荐
本文《Behind Phishing: An Examination of Phisher Modi Operandi》由D. Kevin McGrath和Minaxi Gupta撰写,作者来自美国印第安纳大学计算机科学系。该研究通过分析多种实时收集的数据集来深入探讨钓鱼网站的操作...
语言:English (United States) 一键检查电子邮件是否在网上诱骗! 只需突出显示任何文本,然后单击扩展程序图标,即可看到网页仿冒分析。 功能包括:-网络钓鱼关键字检测器-拼写检查-不安全的链接-总体评分享受:)
### Phishing攻击行为及其防御模型研究 #### 一、引言 随着互联网技术的飞速发展,网络犯罪活动也日益猖獗。其中,Phishing(钓鱼)攻击是一种常见的网络欺诈手段,它通过伪造合法网站或发送虚假邮件等方式,诱使...
### Syngress.Phishing.Exposed.Nov.2005.pdf 知识点解析 #### 标题:Syngress.Phishing.Exposed.Nov.2005.pdf 该标题表明这是一本由Syngress出版社在2005年11月出版的关于钓鱼攻击(Phishing)的书籍。 #### 描述...
Phishing
phishing-frenzy, Ruby on Rails 网上诱骗框架 网络钓鱼狂热Rails 网上诱骗框架的ruby 文档&信息可以在下面的官方钓鱼狂热网站上找到相关的最新文档网络钓鱼狂热网站。请将任何票证或者问题提交到github问题页面网上...
为了防止攻击者通过网络钓鱼(phishing) 这种新型的网络攻击手段窃取用户的私密信息。论文从网络攻击的角度, 指出了phishing 攻击的危害性,分析了Phishing 攻击的含义和方式,然后针对钓鱼攻击本身的特点,对...
Fb phishing tool working
网络钓鱼狂热食谱使用 Chef 自动安装网络钓鱼狂潮支持的平台Debian 7.0属性钥匙类型描述默认['网络钓鱼狂热食谱']['培根'] 布尔值是否包括培根真的用法网络钓鱼狂热食谱::默认在节点的run_list包含phishing-frenzy-...
《简明 Python 教程》byte-of-python-chinese-edition + pdf
Bank Phishing page download
### 以视觉相似为基础的Phishing检测方法 随着互联网技术的发展和普及,网络犯罪活动也日益猖獗。其中,钓鱼(Phishing)攻击作为一种常见的网络欺诈手段,对个人隐私、企业安全乃至国家安全构成了严重威胁。传统上...
phishing-url-detection-master.zip
研究并收集一组适当的良性 URL 和网络钓鱼 URL。要训练分类器,您需要从每个 URL 中提取一组特征。研究和选择一组合适的特征进行提取形成了这个任务。 合并动态功能(即不是直接从 URL 生成的功能)将获得荣誉...
### 防范网络钓鱼攻击保护用户安全 #### 摘要 本文旨在探讨网络钓鱼攻击这一日益严重的问题,并介绍一种新型浏览器扩展——AntiPhish,该工具旨在保护用户免受伪造网站的钓鱼攻击。文章首先对网络钓鱼进行了定义与...
藏经阁-Ichthyology_Phishing as a.pdf
【标题】"Phishing URL Detection: LSTM与CNN在网络安全中的应用" 网络安全是信息化时代不可或缺的一环,而网络钓鱼(Phishing)作为其中一种常见的欺诈手段,威胁着用户的隐私和财产安全。"Phishing URL Detection...
Testing repository for Phishing Domains, websites and threats. We use the PyFunceble testing tool to validate the status of all domains. 关于Ultimate-Hosts-Blacklist 可用于测试和跟踪中存在的每个输入...
In every spam message, phishing email, or web page, there are all sorts of clues that reveal something about the author. The Internet address of a server and the layout of files on a web site are the...