• No results found

The word Phishing was first used in january of 1996, however the attack existed before this [15]. In 1990 Harriman wrote a paper on a related topic using the termFishing[33].

Phishing attacks exploit the weak cognitive server identification. It is a way to get a user to give some information about himself to a fake service, while believing this is a legitimate service. The information has mostly been log-in credentials and credit card information, but have evolved into automatic ways to get complete identities for identity thefts.

It is important for the attacker to be careful not to give the user any misgivings. If the user gets suspicious after the attack he or she might change all their passwords and notify credit card issuer or other authorities.

Phishing has always been about profit in some way or another. An attacker can use credentials to get access to resources and information, which again can be sold or used in a way to benefit the attackers cause. In recent years, the selling of identities or user credentials on the black market has become more common.

2.4.1 Types and techniques

There are several types of phishing attacks. The simplest is sending an email and ask for some information. The most used is phishing websites, where a false website gives the impression of being legitimate.

Advanced phishing attacks tries to install some kind of malware on the user’s computer. The malware is used by attackers to get information from the computer, e.g. keystrokes and file contents. Malware is outside the scope of this thesis.

Phishing email

Email is the most used form of communication between people on the Internet. Sadly most of the emails sent are characterised as SPAM. A

SPAM-mail can be described as one email sent to many receivers, which the receivers do not want. One of the reasons for its popularity is how simple it is to send an email. Most automatically recognised phishing emails is stopped in SPAM-filters.

In listing 2.1 we show an example of a phishing mail. Here we can see the attacker’s use of email addresses to try fool the receiver. They are also writing that the receiver’s email can be deleted and the account unavailable if he or she does not answer. The text is made to intimidate the user and get them to provide the requested information. The first problem for this attack to succeed is that the email was sent to a company email to a Norwegian ISP. Which goes to show that this is sent to all e-mail addresses the attacker can get their hands on.

Listing 2.1: Classic example of a phising mail

ReplyTo : <updatevices@yahoo . co . jp >

From : " IT S e r v i c e s " < I T s e r v i c e s @ a c t i v i s t . com>

updatevices@yahoo . co . j p Confirm Your EMail D e t a i l s . .

Thanks f o r your understanding . Regard ,

IT S e r v i c e s

Email as a direct mean to get information like user names and passwords has lost some ground over the years. The reason for this is mostly because people are more cautious about sending sensitive information by email [46]. The scepticism against email can be related to the big number of SPAM emails users on the internet receives every day and the publicity on the topic.

Today, phishing websites are more likely to succeed as users are more accustomed to enter personal information on a web page. Links to a

phishing website can be distributed in emails, posts on social websites, advertisement banners and instant messaging among others [63].

Phishing sites

In [19] Dhamija et al. found that a good phishing site was able to fool 90 % of their participants just by using different widely available phishing techniques. These are described in the list below.

Visually deceptive text

This is character replacement as already discussed in Section 2.1.2 on page 12.

Images masking underlying text

Attackers can use an image of a legitimate hyper link, which in fact points to another fake site.

Images mimicking windows

This technique is an image that looks like a real window, but in fact it is a hyper link. The image can look like an error message window, making the user click on the image out of habit.

Windows masking underlying windows

An attacker can get the browser to spawn new windows. These can be moved to a specific place and show the attackers content.

Deceptive look and feel

The site is cleverly made and there is only small elements as misspelling or tone of language that give it away. It can also be asking about more information then the site would normally do.

In their set of 22 participants they did not find any correlation between the subjects test scores and their sex, age, education level, the weekly number of hours used on a computer or how acquainted they were with the browser or operating system.

Phishing in the URI

Klevjer [47] described a way to save a complete web page in a link. It was done by using data Uniform Resource Identifier (URI) scheme, where one can set the content type of the media, what kind of encoding has been used and the data itself. He also pointed out that it was possible to save such URIs in Uniform Resource Locator (URL) shortening services e.g.

TinyURL.com. Below is one simple example from the paper put in a html link tag.

<a href="data:text/plain;base64,aGVsbG8=">link</a>

2004 2006 2007 2008 2010 2011 2012 0

10,000 20,000 30,000 40,000 50,000 60,000

Time

Uniqereports

Website Email

Figure 2.8: Unique phishing reports received by APWG 2.4.2 Statistics

The Anti-Phishing Working Group (APWG) has over the last years collected reports of phishing attempts through emails and websites [1].

The number of unique attempts has been published in theirPhishing Attack Trends Reports. These numbers have been put together in Figure 2.8. It shows that the number of unique reports varies for phishing websites.

Some of the spikes in Figure 2.8 comes of changes done by the APWG in their methodology. In August 2006 APWG changed the method of counting unique URLs to differentiate between phishing sites on different sub-domains as well as different paths. The change is the reason for the big jump in recorded phishing websites in that same month. The next big spike in April 2007, was caused by multiple phishing sites on the same domain.

The next two periods with high number of phishing sites, the second part of 2009 and first part of 2012, is due to higher phishing activity and not to any changes in the method by APWG. It is clear that the number of phishing websites is rising.

The number of phishing emails might be slightly dropping, however it is hard to determine with such short a time span. It is important to note that these numbers are based on reported cases, which means the real number of attempts might be higher.

In APWGsPhishing Activity Trends Reportfrom second half of 2011, Carl Leonard from Websense Security Labs states:

"Even fewer phishing web sites are using the oh-so-obvious IP host to host

their fake login pages, instead preferring to host on a compromised domain. There has been a 16 percent drop in the number of phishing URLs containing the spoofed company name in the URL. These combined trends show how phishers are adapting to users becoming more informed and knowledgeable about the traits of a typical phish."[2]

2.4.3 Spear phishing

The termspear phishing is used when an attacker has a particular target.

Normal phishing attacks try to get credentials from anyone, while spear phishing points out one person or a small group of people. This gives the attacker the opportunity to make the attack so specific that is hard for automatic systems to detect it. One recent example of such an attack was targeted towards some of the executives in the Norwegian telecommunication company Telenor [40]. The attacker got access to their personal computers which includes their Email, files and passwords.