Lecture 6 - PowerPoint PPT Presentation

About This Presentation
Title:

Lecture 6

Description:

... keys, plus trust labels was too much people would delete ... http://www.example.com/bankname/login/ http://49320.0401/bankname/login/ Free web hosting ... – PowerPoint PPT presentation

Number of Views:27
Avg rating:3.0/5.0
Slides: 31
Provided by: RossAn1
Category:
Tags: keys | lecture

less

Transcript and Presenter's Notes

Title: Lecture 6


1
Lecture 6 PsychologyFrom Usability and Risk
to Scams
  • Security
  • Computer Science Tripos part 2
  • Ross Anderson

2
Usability and Psychology
  • Why Johnny Cant Encrypt study of encryption
    program PGP showed that 90 of users couldnt
    get it right give 90 minutes
  • Private / public, encryption / signing keys, plus
    trust labels was too much people would delete
    private keys, or publish them, or whatever
  • Security is hard unmotivated users, abstract
    security policies, lack of feedback
  • Much better to have safe defaults (e.g. encrypt
    and sign everything)
  • But economics often push the other way

3
Usability and Psychology (2)
  • 1980s concerns with passwords technical (crack
    /etc/passwd, LAN sniffer, retry counter)
  • 1990s concerns weak defaults, attacks at point
    of entry (vertical ATM keypads), can the user
    choose a good password and not write it down?
  • Our 1998 password trial control group, versus
    random passwords, versus passphrase
  • The compliance problem and can someone who
    chooses a bad password harm only himself?

4
Social Engineering
  • Use a plausible story, or just bully the target
  • Whats your PIN so I can cancel your card?
  • NYHA case
  • Patricia Dunn case
  • Kevin Mitnick Art of Deception
  • Traditional responses
  • mandatory access control
  • operational security

5
Social Engineering (2)
  • Social psychology
  • Solomon Asch, 1951 two-thirds of subjects would
    deny obvious facts to conform to group
  • Stanley Milgram, 1964 a similar number will
    administer torture if instructed by an authority
    figure
  • Philip Zimbardo, 1971 you dont need authority
    the subjects situation / context is enough
  • The Officer Scott case
  • And what about users you cant train (customers)?

6
Phishing
  • Started in 2003 with six reported (there had been
    isolated earlier attacks on AOL passwords)
  • By 2006, UK banks lost 35m (33m by one bank)
    and US banks maybe 200m
  • Early phish crude and greedy but phishermen
    learned fast
  • E.g. Thank you for adding a new email address to
    your PayPal account
  • The banks make it easy for them e.g. Halifax

7
Phishing (2)
  • Banks pay firms to take down phishing sites
  • A couple have moved to two-factor authentication
    (CAP) well discuss later
  • At present, the phished banks are those with poor
    back-end controls and slow asset recovery
  • One gang (Rockphish) is doing half to two-thirds
    of the business
  • Mule recruitment seems to be a serious bottleneck

8
Types of phishing website
  • Misleading domain name
  • http//www.banckname.com/
  • http//www.bankname.xtrasecuresite.com/
  • Insecure end user
  • http//www.example.com/user/www.bankname.com/
  • Insecure machine
  • http//www.example.com/bankname/login/
  • http//49320.0401/bankname/login/
  • Free web hosting
  • http//www.bank.com.freespacesitename.com/

9
Rock-phish is different!
  • Compromised machines run a proxy
  • Domains do not infringe trademarks
  • name servers usually done in similar style
  • Distinctive URL style
  • http//session9999.bank.com.lof80.info/signon/
  • Some usage of fast-flux from Feb07 onwards
  • viz resolving to 5 (or 10) IP addresses at once

10
Phishing website lifetimes (hours) sites(8 weeks) Mean lifetime Medianlifetime
Non-rock 1695 62 20
Rock-phishdomains 421 95 55
Fast-flux rock-phishdomains 57 196 111
Rock-phishIP addresses 125 172 26
Fast-flux rock-phish IP addresses 4287 139 18
11
Site lifetimes (hours) January 2008 sites mean median
eBay sites on free web-hosting 395 47.6 0
if eBay aware 240 4.3 0
if eBay not aware 155 114.7 29
eBay sites on compromised hosts 193 49.2 0
if eBay aware 105 3.5 0
if eBay not aware 88 103.8 10
Rock-phish domains (all targets) 821 70.3 33
Fast-flux domains (all targets) 314 96.1 25.5
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
Mule recruitment
  • Proportion of spam devoted to recruitment shows
    that this is a significant bottleneck
  • Aegis, Lux Capital, Sydney Car Centre, etc
  • mixture of real firms and invented ones
  • some fast-flux hosting involved
  • Only the vigilantes are taking these down
  • impersonated are clueless and/or unmotivated
  • Long-lived sites usually indexed by Google

16
(No Transcript)
17
(No Transcript)
18
(No Transcript)
19
(No Transcript)
20
(No Transcript)
21
(No Transcript)
22
Fake banks
  • These are not phishing
  • no-one takes them down, apart from the vigilantes
  • Usual pattern of repeated phrases on each new
    site, so googling finds more examples
  • sometimes old links left in (hand-edited!)
  • Sometimes part of a 419 scheme
  • inconvenient to show existence of dictators
    millions in a real bank account!
  • Or sometimes part of a lottery scam

23
(No Transcript)
24
(No Transcript)
25
(No Transcript)
26
(No Transcript)
27
(No Transcript)
28
Fraud and Phishing Patterns
  • Fraudsters do pretty well everything that normal
    marketers do
  • The IT industry has abandoned manuals people
    learn by doing, and marketers train them in
    unsafe behaviour (click on links)
  • Banks approach is blame and train long known
    to not work in safety critical systems
  • Their instructions look for the lock, click on
    images not URLs, parse the URL are easily
    turned round, and discriminate against nongeeks

29
(No Transcript)
30
Results
  • Ability to detect phishing is correlated with
    SQ-EQ
  • It is (independently) correlated with gender
  • So the gender HCI issue applies to security too
Write a Comment
User Comments (0)
About PowerShow.com