WebApp Sec mailing list archives
Re: Phishing
From: Glenn and Mary Everhart <Everhart () gce com>
Date: Wed, 12 May 2004 13:03:35 -0400
How do folks feel about other techniques to make a site harder to fake, given that we're seeing keystroke loggers placed by spam/virii these days? That is, stuff like putting in a number pad made of images, in some random order, and asking people to "key in" a PIN with mouse clicks? I agree wrt the posting from HTTP pages. Just wondering about other techniques to try to make using phish'd information harder. Really, one needs a way for a user to check the bank identity (since https certs don't seem to be enough). (Then we start dealing with the fools who phone in to complain we won't let them have 3 character passwords like "aaa" and still want their transactions guaranteed. Honestly sometimes I think people like that should bank at sites with names like robmeblind.com...) Glenn Everhart Mark Curphey wrote:
A trend I have noticed with a lot of online banks is to place the login page within http and then POST the form to HTTPS. They typically use a padlock icon (image) on the form to indicate that the POST location is over HTTPS. However the end result is that the place you are being asked to enter your username and password was not authenticated using server SSL auth (i.e. the cert). Net result you do not know that you are entering your username and password into a legitimate site (sure you could check POST action but howmany end users would ever do that).This practice IMHO makes phishing another step easier and I really think there needs to be awareness of the issues to stop it. -----Original Message-----From: Rogan Dawes [mailto:discard () dawes za net] Sent: Wednesday, May 12, 2004 8:59 AMTo: Griffiths, Ian Cc: Amit Sharma; webappsec () securityfocus com Subject: Phishing Griffiths, Ian wrote:I'd guess that a major issue at the moment is users being fooled in to entering their details in to a nefarious web application which looks authentic but of course is not. I'm not sure if discussion of this would be beyond the scope of the list.IanIt probably is in-scope. The question is, what can we do about it? Perhaps start by describing the various ways that such phishing attacks are being executed, and then move on to ways to thwart them? Method 1: Scammer downloads a copy of the target's web site, and hosts it locally, using either a non-SSL site, or an SSL-site with a fake certificate. Counter: Educate users to check that the "lock" exists, and that the certificate matches the bank's URL. Method 2: Scammer sets up a proxy pointing to the targets web site, and records sensitive information submitted, while relaying it to the target. Sends aredirect to the actual site when the sensitive info has been captured. Proxy uses own certificate to terminate SSL socket, and re-encrypts to talkto target. (e.g. WebScarab in transparent proxy mode) Counter: Again, educate users to check the certificate details. Method 3? Anyone? Notes regarding educating users: Make the site name as short as possible, and as obvious as possible, to reduce confusion. Rather than "www{1,2,3,4,5,6,7,8,9}.encrypt.bank.com", try to use something short and simple like "secure.bank.com", and use it consistently for all servers supporting a particular application. That way there is less confusion for users, and less likelihood that a scammer will get away with using a slightly different domain name. Also, if your bank is abc.com, don't make your internet banking URL abc-online.com, or similar. Keep it under the original domain. Less for the user to be confused about. There is no RFC stating that all URL's have to start with "www". It is simply a convention from many years ago that helped users find your online presence. By all means name your company's main web site www.company.com. But there is no need for www.secure.company.com, and www.admin.secure.company.com, etc. [ Apologies for my little rant ;-) ] Regards, Rogan -- Rogan Dawes *ALL* messages to discard () dawes za net will be dropped, and added to my blacklist. Please respond to "lists AT dawes DOT za DOT net"
Current thread:
- Internet based banking applications security Amit Sharma (May 11)
- <Possible follow-ups>
- RE: Internet based banking applications security Griffiths, Ian (May 12)
- Phishing Rogan Dawes (May 12)
- Re: Phishing Jordan Dimov (May 12)
- RE: Phishing Mark Curphey (May 12)
- Re: Phishing Glenn and Mary Everhart (May 12)
- Re: Phishing Antonio Varni (May 12)
- Phishing Rogan Dawes (May 12)