0 Aiet/Cse/Seminar On It Act
0 Aiet/Cse/Seminar On It Act
0 Aiet/Cse/Seminar On It Act
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes. There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business on line through erosion of customer confidence. The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss. This report also concerned with anti-phishing techniques. There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing. No single technology will completely stop phishing. However a combination of good organization and practice, proper application of current technologies and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. Antiphishing software and computer programs are designed to prevent the occurrence of phishing and trespassing on confidential information. Anti-phishing software is designed to track websites and monitor activity; any suspicious behavior can be automatically reported and even reviewed as a report after a period of time. This also includes detecting phishing attacks, how to prevent and avoid being scammed, how to react when you suspect or reveal a phishing attack and what you can do to help stop phishers.
0 AIET/CSE/SEMINAR ON IT ACT
Chapter 1 Introduction
In the field of computer security, Phishing is criminally fraudulent process to acquire sensitive information such as passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes. There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business online through erosion of customer confidence. The damage caused by the Phishing ranges from denial of access to e-mail to substantial financial loss. This report also concerned with antiPhishing techniques. There are several different techniques to combat phishing including legislation, technology created specifically to protect against phishing. No single technology will completely stop Phishing. However a combination of good organization and practice, proper application of current technologies & improvements in security technology has the potential to drastically reduce the prevalence of Phishing and the losses suffered from it. AntiPhishing software and computer programs are designed to prevent the occurrence of Phishing and trespassing on confidential information. Anti-Phishing software is designed to track websites and monitor activity; any suspicious behavior can be automatically reported and even reviewed as a report after a period of time. This includes detecting Phishing attacks, how to prevent and avoid being scammed, how to react when you suspect or reveal a Phishing attack and what you can do to help stop Phishers. The simplified flow of information in a phishing attack is
1 AIET/CSE/SEMINAR ON IT ACT
Figure 1.1 Simplified Flow of Information in a Phishing Attack 1. A deceptive message is sent from the Phishers to the user. 2. A user provides confidential informat-ion to a phishing server (Normally after some interaction with the server). 3. The phishers obtains the confidential information from the server. 4. The confidential information is used to impersonate the user. 5. The phishers obtains illicit monetary gain.
Steps 3 and 5 are of interest primarily to law enforcement personnel to identify and prosecute Phisher.
2 AIET/CSE/SEMINAR ON IT ACT
4 AIET/CSE/SEMINAR ON IT ACT
5 AIET/CSE/SEMINAR ON IT ACT
But if they select premium, then the Phishing site records their login before passing them to the download. Thus the Phishers has lifted the premium account information from the victim.
Figure 3.1 Example of Phishing Email Message Example of a Phishing e-mail msg which includes a deceptive Web addresses that links to a scam Web site. To make these Phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site. Phishing links that you are urged to click in e-mail messages,
6 AIET/CSE/SEMINAR ON IT ACT
on Web sites, or even in instant messages may contain all or part of a real companys name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate Web site. Notice in the following example that resting (but not clicking) the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like company's Web address, which is a suspicious sign.
7 AIET/CSE/SEMINAR ON IT ACT
8 AIET/CSE/SEMINAR ON IT ACT
9 AIET/CSE/SEMINAR ON IT ACT
10 AIET/CSE/SEMINAR ON IT ACT
legitimate. Furthermore, another recent study concluded in part that the presence of personal information does not significantly affect the success rate of Phishing attacks, which suggests that most people do not pay attention to such details. The Anti-Phishing Working Group, an industry and law enforcement association has suggested conventional Phishing techniques could become obsolete in the future as people are increasingly awareness of the social engineering techniques used by Phishers. They predict that Pharming and other uses of malware will become more common tools for stealing information.
Google anti-Phishing software some implementation of this approach sends the visited URLs to a central service to be checked, which has raised concerns about privacy. To mitigate the problem of Phishing sites impersonating victim site by embedding its images (such as logos), several site owners have altered the images to send a message to the visitor that a site may be fraudulent. The image may be moved to a new filename and the original permanently replaced, or a server can detect that the image was not requested as part of normal browsing, and instead send a warning image.
13 AIET/CSE/SEMINAR ON IT ACT
Individuals can contribute by reporting Phishing to both volunteer and industry groups, such as Phish Tank.
14 AIET/CSE/SEMINAR ON IT ACT
procedural counter measures, initiate an investigation with law enforcement, and staff up for the attack in a timely manner.
7.3.1 Filtering
Email filters intended to combat spam are often effective in combating phishing as well. Signature-based anti-spam filters may be configured to identify specific known phishing messages and prevent them from reaching a user. Statistical or heuristic antispam filters may be partially effective against phishing, but to the extent that a phishing message resembles a legitimate message, there is a danger of erroneously blocking legitimate email if the filter is configured to be sufficiently sensitive to identify phishing email. Phishers depend on being able to make their messages visually appear to be from a trusted sender. One possible countermeasure is to detect unauthorized imagery in emails. There are many countermeasures that Phishers may employ against a image comparison, including displaying many tiled smaller images as a single larger image, and stacking up transparent images to create a composite image. This means that imagery should be fully rendered before analysis. An area of future research is how to recognize potentially modified trademarks or other registered imagery within a larger image such as a fully rendered email. A similar approach may be fruitful when applied to web sites, when a user has clicked on a link.
7.3.2 Authentication
Message authentication techniqu- -es such as Sender-ID have considerable promise for anti-phishing applications. Sender-ID prevents return address forgery by checking DNS records to determine whether the IP address of a transmitting mail transfer agent is authorized to send a message from the senders domain. Yahoo! Domain Keys provides similar authentication, using a
16 AIET/CSE/SEMINAR ON IT ACT
Domain-level cryptographic signature that can be verified through DNS records. Some form of lightweight message authentication may be very valuable in the future in combating phishing. For the potential value to be realized, Sender-ID a similar technology must become sufficiently widespread that invalid messages can be summarily deleted otherwise treated prejudicially, and security issues surrounding the use of mail forwarders need to be resolved.
7.4.1 Signing
Cryptographic signing of email is a positive incremental step in the short run and an effective measure if it becomes widely deployed in the long run. Signing may be performed either at the client or at the gateway. However, current email clients simply display an indication of whether an email is signed. A typical user is unlikely to notice that an email is unsigned and avoid a phishing attack. Signing could be more effective if the functionality of unsigned emails were reduced, such as by warning when a user attempts to follow a link in unsigned email. However, this would place a burden on unsigned messages, which today constitute the vast majority of email messages. If critical mass builds up for signed emails, such measures may become feasible.
textual and/or graphical information that will be used in subsequent personalized information. In this example, a customer of the Large Bank and Trust Company has typed in the personalized text You were born in Prague and selected or uploaded a picture of a Canadian penny that is used for your identification.
Figure 7.1 A subsequent email from Large Bank and Trust Company will include this personalized information. Since Phishers will not know what personalized information a user has elected; they will not be able to forge deceptive emails.
Figure 7.2
18 AIET/CSE/SEMINAR ON IT ACT
included: An informative warning has the benefit of allowing legitimate links even if of a suspicious nature, while providing a risk assessment with the information a user needs to determine an appropriate action.
Figure 7.3
technology is unclear, but presently most phishing attacks do not include effective countermeasures.
dictionary attack, in that stolen password data cannot be applied to any other site. However, the user still types in his or her usual password in a browser to gain account access, and it would be difficult to prevent phishers from simulating password input, bypassing any hashing, to capture the raw password data. If combined with reserved screen real estate for password entry, password hashing would be rendered less susceptible to attack.
Phishing attacks typically compromise what a user knows. In a remote computing environment such as the internet, it is difficult to ascertain what the user is, so the usual second factor is to verify something that the user has in addition to account information. In order for this to be effective, two-factor authentication must be required for every transaction. For example, a user must have a USB dongle, or type in a time-sensitive code from a hardware device, or swipe a smart card. This is a highly effective measure, though expensive in the cost of purchasing and distributing security devices, the deployment of infrastructure for reading them, inconvenience to customers in using them. Conventional two-factor authentication is appropriate for high-value targets such as commercial
22 AIET/CSE/SEMINAR ON IT ACT
banking accounts, but so far has not taken root in the United States for typical consumer applications.
23 AIET/CSE/SEMINAR ON IT ACT
24 AIET/CSE/SEMINAR ON IT ACT
filtering would be as simple as enclosing areas of user-supplied text, such as search results or auction listings, with appropriate <noscript> and </noscript> tags. To prevent a cross-site script from including a valid </noscript> tag and inserting cross-site scripting, a dynamically generated random key should be used that must match in the <no script> and </no script> tags. For example: [Site-supplied HTML and scripts] <no script key=432097u5iowhe> [User-supplied HTML in which scripts/features are disabled] </no script key=432097u5iowhe> [Site-supplied HTML and scripts] 9. How Anti-Phishing Software Works Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail. It is often integrated with web browsers and email clients as a toolbar that displays the real domain name for the website the viewer is visiting, in an attempt to prevent fraudulent websites from masquerading as other legitimate web sites. Anti-phishing functionality may also be included as a built-in capability of some web browsers Common phishing tactics take advantage of a visitor by requesting them to link out to another site, asking that the enter personal information and passwords, or redirecting them to another site completely for registration. The process usually begins by sending out a forged e-mail that looks like it was sent from the company. Some tactics include saying an account has expired and needs to be updated, or has experienced unauthorized use and needs to be verified. Many banking and financial institutions become targets for these types of scams, and they can be a considerable threat to millions of account holders and users. Many leading web browsers and software programs have realized the impact of this trend, and have created programs that can limit the frequency of these types of scams. Microsoft Windows Internet Explorer 7, Firefox 2.0, Google Safe Browsing, and Earth Link Scam Blocker are just a few programs that have reduced the risks involved. In Firefox 2.0, Phishing Protection is always turned on and checks the
25 AIET/CSE/SEMINAR ON IT ACT
sites automatically for any potential risks or hazards. The list is reviewed on a regular basis, and can be configured to Firefox Security settings for maximum control. When Phishing Protection in enabled, the sites are downloaded into a list and checked for any anti-phishing services. A warning sign will if any suspicious activity is detected. The Net craft toolbar makes use of a risk rating system, allowing you the option of entering a password (or not). Trust Watch makes the Internet Explorer toolbar, and can help validate a Web site and provide a site report when needed. This option also allows you to review all suspected sites and find out which ones use SSL technology. EarthLink Toolbar with Scam Blocker will verify any popup messages that you may encounter as you visit a site, and can help you find out all the details on current phishing scams. Anti-phishing software is designed to track websites and monitor activity; any suspicious behavior can be automatically reported, and even reviewed as a report after a period of time. Antiphishing toolbars can help protect your privacy and reduce the risk of landing at a false or insecure URL. Although some people have concerns over how valuable anti-phishing software and toolbars may be, security threats can be reduced considerably when they are managed by the browser program. Other companies that are trained in computer security are investigating other ways to report phishing issues; programs are being designed that can analyze web addresses for fraudulent behavior through new tactics, and crosschecking domain names for validity.
26 AIET/CSE/SEMINAR ON IT ACT
Conclusion
No single technology will completely stop phishing. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. In particular: High-value targets should follow best practices and keep in touch with continuing evolution of them. Phishing attacks can be detected rapidly through a combination of customer reportage, bounce monitoring, the image use monitoring, honey pots and other techniques. The Email authentication technologies such as Sender-ID and cryptographic signing, when widely deployed, have the potential to prevent phishing emails from reaching users. Analysis of imagery is a promising area of future research to identify phishing emails. The most personally identifiable information should be included in all email communications. Systems allowing the user to enter or select customized text and/or imagery are particularly promising. Browser security upgrades, such as the distinctive display of potentially deceptive content and providing a warning when a potentially unsafe link is selected, could substantially reduce the efficacy of phishing attacks. Information sharing between the components involved in a phishing attack spam filters, email clients and browsers could improve the identification of phishing messages and sites, and restrict risky behaviour with suspicious content. The Anti-phishing toolbars are promising tools for identifying phishing sites and heightening security when a potential phishing site is detected. Detection of the outgoing confidential information that including password hashing is a promising area of future work, with some technical challenges.
27 AIET/CSE/SEMINAR ON IT ACT
An OS-level trusted path for securing the data entry and transmission has the potential to dramatically reduce leakage of confidential data to unauthorized parties.
The two-factor authentication is highly effective against phishing, and is recommended in situations in which a small number of users are involved with a high-value target. Device identifier based two-factor authentication offers the potential for cost savings.
Cross-site scripting is a major vulnerability. All user content should be filtered using a let-in filter.
28 AIET/CSE/SEMINAR ON IT ACT
References
1. http://en.wikipedia.org/ 2. http://webopedia.com/ 3. http://computerworld.com/ 4. http://www.anti-phishing.info/ 5. http://lorrie.cranor.org/
29 AIET/CSE/SEMINAR ON IT ACT