69
Who’s winning the phishing arm’s race? Non-cooperation when countering phishing Evaluating the ‘wisdom’ of PhishTank’s crowd An Empirical Analysis of Phishing Attack and Defense Tyler Moore and Richard Clayton University of Cambridge Computer Laboratory Computer Lab Security Seminar April 8, 2008 Tyler Moore An Empirical Analysis of Phishing Attack and Defense

An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

An Empirical Analysis of PhishingAttack and Defense

Tyler Moore and Richard Clayton

University of CambridgeComputer Laboratory

Computer Lab Security SeminarApril 8, 2008

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 2: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Outline

1 Who’s winning the phishing arm’s race?The mechanics of phishingRock-phish attacksPhishing-website lifetimes

2 Non-cooperation when countering phishingComparing lifetimes for different feedsEstimating the cost of phishing attacks

3 Evaluating the ‘wisdom’ of PhishTank’s crowdPhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 3: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Outline

1 Who’s winning the phishing arm’s race?The mechanics of phishingRock-phish attacksPhishing-website lifetimes

2 Non-cooperation when countering phishingComparing lifetimes for different feedsEstimating the cost of phishing attacks

3 Evaluating the ‘wisdom’ of PhishTank’s crowdPhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 4: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Technical requirements for phishing attacks

Attackers send out spam impersonating banks with link tofake website

Hosting options for fake website

Free webspace(http://www.bankname.freespacesitename.com/signin/)Compromised machine(http://www.example.com/∼user/images/www.bankname.com/)Registered domain (bankname-variant.com) which thenpoints to free webspace or compromised machine

Personal detail recovery

Completed forms forwarded to a webmail addressStored in a text file on the spoof website

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 5: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Defending against phishing attacks

Proactive measures

Web browser mechanisms to detect fake sites, multi-factorauthentication procedures, restricted top-level domains, etc.Not the focus of our research

Reactive measures

Banks tally phishing URLsReported phishing URLs are added to a blacklist, which isdisseminated via anti-phishing toolbarsBanks send take-down requests to the free webspace operatoror ISP of compromised machineIf a malicious domain has been registered, banks ask thedomain name registrar to suspend the offending domain

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 6: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Defending against phishing attacks

Proactive measures

Web browser mechanisms to detect fake sites, multi-factorauthentication procedures, restricted top-level domains, etc.Not the focus of our research

Reactive measures

Banks tally phishing URLsReported phishing URLs are added to a blacklist, which isdisseminated via anti-phishing toolbarsBanks send take-down requests to the free webspace operatoror ISP of compromised machineIf a malicious domain has been registered, banks ask thedomain name registrar to suspend the offending domain

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 7: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Data collection methodology

Phishing website availability

Several organizations collate phishing reports; we selectedreports from PhishTankPhishTank DB records phishing URLs and relies on volunteersto confirm whether a site is wicked33 710 PhishTank reports overs 8 weeks early 2007We constructed our own testing system to continuously querysites until they stop responding or change

Caveats to our data collection

Sites removed before appearing in PhishTank are ignoredWe do not follow web-page redirectors

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 8: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 9: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 10: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 11: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 12: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 13: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks are different!

‘Rock-phish’ gang operate different to ‘ordinary’ phishing sites1 Purchase several innocuous-sounding domains (e.g.,

lof80.info)2 Send out phishing email with URL

http://www.volksbank.de.netw.oid3614061.lof80.info/vr

3 Gang-hosted DNS server resolves domain to IP address ofone of several compromised machines

4 Compromised machines run a proxy to a back-end server5 Server loaded with many fake websites (around 20), all of

which can be accessed from any domain or compromisedmachine

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 14: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish attacks (cont’d.)

Rock-phish strategy is more resilient to failure

Dynamic pool of domains maps to another pool of IP addresses

Also increase confusion by splitting the attack componentsover disjoint authorities

Registrars see non-bank domainsCompromised machine owners don’t see bank webpages

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 15: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

‘Fast-flux’ phishing domains

Rock-phish gang’s strategy is evolving fast

In a fast-flux variant, domains resolve to a set of 5 IPaddresses for a short time, then abandon them for another 5

Burn through 400 IP addresses per week, but the upside (forthe attacker) is that machine take-down becomes impractical

Fast-flux strategy demonstrates just how cheap compromisedmachines are

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 16: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish site activity per day

10

20

30

40

50

60

70

Mar Apr

Rock domains operationalRock IPs operational

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 17: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

New and removed rock-phish IPs per day

0

5

10

15

Mar Apr

Rock IPs addedRock IPs removed

Correlation coefficient r: 0.740Synchronized =⇒ automated replenishment

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 18: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

New and removed rock-phish domains per day

0

5

10

15

20

25

30

35

Mar Apr

Rock domains addedRock domains removed

Correlation coefficient r: 0.340Unsynchronized =⇒ manual replenishment

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 19: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Rock-phish domain and IP removal per day

0

5

10

15

20

25

30

35

Mar Apr

Rock domains removedRock IPs removed

Correlation coefficient r: 0.142Unsynchronized =⇒ uncoordinated response

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 20: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Phishing-website lifetimes

Sites Mean lifetime (hrs) Median lifetime (hrs)Non-rock 1 695 61.7 19.5Rock domains 421 94.7 55.1Rock IPs 125 171.8 25.5Fast-flux domains 57 196.2 111.0Fast-flux IPs 4 287 138.6 18.0

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 21: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Histogram of phishing-site lifetimes

1 2 3 4 5 6 7 8 9 10 11 12 13 14 MoreLifetime (days)

0%

10%

20%

30%

40%

50%Non−rock phishRock−phish domainsRock−phish IPsFast−flux domainsFast−flux IPs

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 22: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

And now for some curve fitting

1 5 50 5005e−0

45e

−03

5e−0

25e

−01

Site lifetime t (hours)

Prob

(Life

time>

t)

1 5 50 5005e−0

45e

−03

5e−0

25e

−01

Site lifetime t (hours)

Prob

(Life

time>

t)

1 5 50 5005e−0

45e

−03

5e−0

25e

−01

Site lifetime t (hours)

Prob

(Life

time>

t)

Figure: CDF of website lifetimes for non-rock (left), rock domains(center) and rock-phish IPs (right).

Lognormal Kolmogorov-Smirnovµ Std err. σ Std err. D p-value

Non-rock 3.011 0.03562 1.467 0.02518 0.03348 0.3781Rock domains 3.922 0.05966 1.224 0.04219 0.06289 0.4374Rock IPs 3.434 0.1689 1.888 0.1194 0.09078 0.6750

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 23: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Breaking down site lifetimes

Phishing site lifetimes vary greatly, but can we make sense ofthe differences?

We have already established that the rock-phish gang are moreeffective than other attackersDo some banks perform better than others?Do some ISPs respond better than others?

Identifying exceptional performers (both good and bad) couldencourage improved response times

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 24: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Number of phishing sites per bank

USBANKRBCCHASELLOYDSNATIONWIDE

POSTE_ITHALIFAX

HSBCFARGO

WACHOVIABOA

EBAY

PAYPAL

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 25: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

Phishing-site lifetimes per bank (only banks >= 5 sites)EG

G

TCF

EGO

LD

BOA

CITI

BANK

GER

MAN

AMER

ICAN

WAM

U

LLO

YDS

WAC

HOVI

A

WES

TUNI

ON

EBAY

NCUA

DNCU

CHAS

E

PAYP

AL

DESJ

ARDI

NS

FARG

O

HALI

FAX

HSBC

POST

E_IT

HAW

AIIU

SAFC

U

USBA

NK

MIL

BANK

STG

EORG

E

BANK

OFQ

UEEN

SLAN

D

NATI

ONW

IDE

AMAZ

ON

FNBS

A

RBC

MO

NEYB

OO

KERS

BARC

LAYS

VISA

WES

TPAC

CAPI

TAL1

NATW

EST

FLAG

STAR

Life

time

(hou

rs)

0

50

100

150

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 26: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

The mechanics of phishingRock-phish attacksPhishing-website lifetimes

‘Clued-up’ effect on free host & registrar take-down times

020

040

060

0.hk

Day reported

Site

lifet

ime

(hou

rs)

Mar Apr Jun Jul Aug

020

040

060

0

.cn

Day reported

Site

lifet

ime

(hou

rs)

May Jun Jul Aug0

200

400

600

alice.it

Day reported

Site

lifet

ime

(hou

rs)

May Jun Jul

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 27: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Outline

1 Who’s winning the phishing arm’s race?The mechanics of phishingRock-phish attacksPhishing-website lifetimes

2 Non-cooperation when countering phishingComparing lifetimes for different feedsEstimating the cost of phishing attacks

3 Evaluating the ‘wisdom’ of PhishTank’s crowdPhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 28: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Non-cooperation when countering phishing

The phishing-website lifetimes just presented are longer thanthose reported by banks and take-down companies

We collected feeds of phishing URLs from two take-downcompanies, a brand owner, the Anti-Phishing Working Groupand PhishTank

Using this wider perspective, we can explain the disparity:websites unknown to the banks take much longer to beremoved

So we have examined the feeds from two take-downcompanies, called A and B, in greater detail duringOctober–December 2007

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 29: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

How one bank suffers when take-down companies don’t

share phishing URLs

A’s client A1

A

452

Others 1st

A 1st

41

267

Ordinary phishing sites

Others

664

A

62.4

Others 1st

A 1st

43.5

15.0

Mean lifetime (hours)

Others

192.6

A

22.9

Others 1st

A 1st

7.7

0.0

Median lifetime (hours)

Others

34.2

A

56.2

Others 1st

A 1st

84.1

Mean difference (hours)

Others

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 30: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Most banks suffer when phishing URLs are not shared

B

80

Others 1st

B 1st

443

1 540

Ordinary phishing sites

Others

115

B

31.4

Others 1st

B 1st

26.3

16.4

Mean lifetime (hours)

Others

42.9

B

17.3

Others 1st

B 1st

9.7

0.0

Median lifetime (hours)

Others

0.0

B

14.3

Others 1st

B 1st

15.7

Mean difference (hours)

Others

B’s 66 clients attacked during Q4 2007

A

2 225

Others 1st

A 1st

395

2 267

Ordinary phishing sites

Others

2 219

A

51.1

Others 1st

A 1st

38.8

13.1

Mean lifetime (hours)

Others

112.2

A

18.2

Others 1st

A 1st

13.7

Median lifetime (hours)

Others

20.1

A

40.9

Others 1st

A 1st

41.3

Mean difference (hours)

Others

A’s 53 clients attacked during Q4 2007

0.0

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 31: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Popularity of phishing target affects gain from sharing

1−10 11−100101−1000 >1000

A’s client banks

# phishing websites per bank

% w

ebsit

es id

entif

ied

020

4060

8010

0

A onlyA firstOther firstOther only

1−10 11−100101−1000 >1000

B’s client banks

# phishing websites per bank

% w

ebsit

es id

entif

ied

020

4060

8010

0

B onlyB firstOther firstOther only

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 32: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Long-lived phishing websites caused by not sharing URLs

All sites A−aware sitesA−unaware

sites All sites B−aware sitesB−unaware

sites

% w

ebsit

es la

stin

g >

1 we

ek0

24

68

1012 A’s client banks

B’s client banks

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 33: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Rock-phish website lifetimes depend on A and B’s effort

0

50

100

150

200

250

Day attacked by rock−phish

Life

time

(hou

rs)

Oct Nov Dec

B’s clientsA’s clients

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 34: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

User response to phishing

Webalizer data

Web page usage statistics are sometimes set up by default in aworld-readable stateGives daily updates of which URLs are visitedWe can view how many times a ‘thank you’ page is visitedWe automatically checked all reported websites for theWebalizer package, revealing over 700 sites

On-site text files

We retrieved around two dozen text files with completed userdetails from phishing sites200 of the 414 responses appeared legitimate

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 35: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

User response to phishing

Webalizer data

Web page usage statistics are sometimes set up by default in aworld-readable stateGives daily updates of which URLs are visitedWe can view how many times a ‘thank you’ page is visitedWe automatically checked all reported websites for theWebalizer package, revealing over 700 sites

On-site text files

We retrieved around two dozen text files with completed userdetails from phishing sites200 of the 414 responses appeared legitimate

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 36: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

User responses to phishing sites over time

0 1 2 3 4 5

Days after phish reported

User

resp

onse

s

0

5

10

15

20

25

#victims

site= mean lifetime×

8.5 victims

24 hrs+8.5 victims before detection.

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 37: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks

Having measured how many phishing sites exist, how longthey stick around, and how many people give away theirdetails, we can estimate the losses due to phishing

DISCLAIMER: Cost is the product of several fuzzy estimates1 61 hrs× 8.5 victims

24 hrs+ 8.5 victims on 1st day = 30 victims

site

2 PhishTank identified 1 438 banking phishing sites, whichimplies 9 347 p.a.

3 Upon examining other feeds, we conclude PhishTank identifiesjust 34.9% of phishing sites

4 We therefore estimate 9 3470.349 = 26 800 phishing websites p.a.

5 Gartner estimate cost of identity theft to be $572 per victim6 Estimated loss = 30 victims

site× 26 800 sites × $572 = $460m

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 38: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks

Having measured how many phishing sites exist, how longthey stick around, and how many people give away theirdetails, we can estimate the losses due to phishing

DISCLAIMER: Cost is the product of several fuzzy estimates1 61 hrs× 8.5 victims

24 hrs+ 8.5 victims on 1st day = 30 victims

site

2 PhishTank identified 1 438 banking phishing sites, whichimplies 9 347 p.a.

3 Upon examining other feeds, we conclude PhishTank identifiesjust 34.9% of phishing sites

4 We therefore estimate 9 3470.349 = 26 800 phishing websites p.a.

5 Gartner estimate cost of identity theft to be $572 per victim6 Estimated loss = 30 victims

site× 26 800 sites × $572 = $460m

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 39: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks

Having measured how many phishing sites exist, how longthey stick around, and how many people give away theirdetails, we can estimate the losses due to phishing

DISCLAIMER: Cost is the product of several fuzzy estimates1 61 hrs× 8.5 victims

24 hrs+ 8.5 victims on 1st day = 30 victims

site

2 PhishTank identified 1 438 banking phishing sites, whichimplies 9 347 p.a.

3 Upon examining other feeds, we conclude PhishTank identifiesjust 34.9% of phishing sites

4 We therefore estimate 9 3470.349 = 26 800 phishing websites p.a.

5 Gartner estimate cost of identity theft to be $572 per victim6 Estimated loss = 30 victims

site× 26 800 sites × $572 = $460m

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 40: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks

Having measured how many phishing sites exist, how longthey stick around, and how many people give away theirdetails, we can estimate the losses due to phishing

DISCLAIMER: Cost is the product of several fuzzy estimates1 61 hrs× 8.5 victims

24 hrs+ 8.5 victims on 1st day = 30 victims

site

2 PhishTank identified 1 438 banking phishing sites, whichimplies 9 347 p.a.

3 Upon examining other feeds, we conclude PhishTank identifiesjust 34.9% of phishing sites

4 We therefore estimate 9 3470.349 = 26 800 phishing websites p.a.

5 Gartner estimate cost of identity theft to be $572 per victim6 Estimated loss = 30 victims

site× 26 800 sites × $572 = $460m

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 41: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks

Having measured how many phishing sites exist, how longthey stick around, and how many people give away theirdetails, we can estimate the losses due to phishing

DISCLAIMER: Cost is the product of several fuzzy estimates1 61 hrs× 8.5 victims

24 hrs+ 8.5 victims on 1st day = 30 victims

site

2 PhishTank identified 1 438 banking phishing sites, whichimplies 9 347 p.a.

3 Upon examining other feeds, we conclude PhishTank identifiesjust 34.9% of phishing sites

4 We therefore estimate 9 3470.349 = 26 800 phishing websites p.a.

5 Gartner estimate cost of identity theft to be $572 per victim6 Estimated loss = 30 victims

site× 26 800 sites × $572 = $460m

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 42: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks (cont’d.)

Notes regarding the $460m annual loss estimate

Ignores rock-phish attacks, which account for around half ofphishing spamLess than Gartner’s estimate that 3.5m people fall victim toidentity theft at annual cost of $2 BnMuch of the gap can be attributed to rock-phish, keyloggers,and other causes of identity theft not related to phishingMicrosoft Research estimated 2m victims (vs. our 800kestimate) using a completely different technique

We can similarly estimate losses caused by not sharing feeds

Compare the lifetimes of phishing websites known to A and B

to the lifetimes of websites unknown to themThis time difference is a direct consequence of not sharingfeeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 43: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

Estimating the cost of phishing attacks (cont’d.)

Notes regarding the $460m annual loss estimate

Ignores rock-phish attacks, which account for around half ofphishing spamLess than Gartner’s estimate that 3.5m people fall victim toidentity theft at annual cost of $2 BnMuch of the gap can be attributed to rock-phish, keyloggers,and other causes of identity theft not related to phishingMicrosoft Research estimated 2m victims (vs. our 800kestimate) using a completely different technique

We can similarly estimate losses caused by not sharing feeds

Compare the lifetimes of phishing websites known to A and B

to the lifetimes of websites unknown to themThis time difference is a direct consequence of not sharingfeeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 44: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

What is the cost of non-cooperation?

Total exposure of A’s 53 targeted clients during Q4 2007:

(57.4 hrs×8.5 victims

24 hrs+8.5 victims)×7 106 sites×$572 = $117m

2 219 websites impersonating A’s clients missed by A:

(112.2− 13.9) hrs ×8.5 victims

24 hrs× 2 219 sites × $572 = $44m

2 205 websites found by A 40.9 hours after other sources:

40.9 hrs ×8.5 victims

24 hrs× 2 225 sites × $572 = $18m

$62m of A’s clients’ $117m put at riskduring Q4 2007 is due to not sharing feeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 45: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

What is the cost of non-cooperation?

Total exposure of A’s 53 targeted clients during Q4 2007:

(57.4 hrs×8.5 victims

24 hrs+8.5 victims)×7 106 sites×$572 = $117m

2 219 websites impersonating A’s clients missed by A:

(112.2− 13.9) hrs ×8.5 victims

24 hrs× 2 219 sites × $572 = $44m

2 205 websites found by A 40.9 hours after other sources:

40.9 hrs ×8.5 victims

24 hrs× 2 225 sites × $572 = $18m

$62m of A’s clients’ $117m put at riskduring Q4 2007 is due to not sharing feeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 46: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

What is the cost of non-cooperation?

Total exposure of A’s 53 targeted clients during Q4 2007:

(57.4 hrs×8.5 victims

24 hrs+8.5 victims)×7 106 sites×$572 = $117m

2 219 websites impersonating A’s clients missed by A:

(112.2− 13.9) hrs ×8.5 victims

24 hrs× 2 219 sites × $572 = $44m

2 205 websites found by A 40.9 hours after other sources:

40.9 hrs ×8.5 victims

24 hrs× 2 225 sites × $572 = $18m

$62m of A’s clients’ $117m put at riskduring Q4 2007 is due to not sharing feeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 47: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Comparing lifetimes for different feedsEstimating the cost of phishing attacks

What is the cost of non-cooperation?

Total exposure of A’s 53 targeted clients during Q4 2007:

(57.4 hrs×8.5 victims

24 hrs+8.5 victims)×7 106 sites×$572 = $117m

2 219 websites impersonating A’s clients missed by A:

(112.2− 13.9) hrs ×8.5 victims

24 hrs× 2 219 sites × $572 = $44m

2 205 websites found by A 40.9 hours after other sources:

40.9 hrs ×8.5 victims

24 hrs× 2 225 sites × $572 = $18m

$62m of A’s clients’ $117m put at riskduring Q4 2007 is due to not sharing feeds

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 48: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Outline

1 Who’s winning the phishing arm’s race?The mechanics of phishingRock-phish attacksPhishing-website lifetimes

2 Non-cooperation when countering phishingComparing lifetimes for different feedsEstimating the cost of phishing attacks

3 Evaluating the ‘wisdom’ of PhishTank’s crowdPhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 49: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

PhishTank

Online community established in 2006 using the ‘wisdom ofcrowds’ to fight phishingUsers contribute in two ways

1 Submit reports of suspected phishing sites2 Vote on whether others’ submissions are really phishing or not

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 50: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

PhishTank’s open feed vs. company’s closed feed

PhishTank Company

2 585 5 711 3 019

Ordinary phishing websites

PhishTank Company

127 459 544

Rock-phish domains

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 51: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Verification speed: PhishTank vs. company

Voting introduces significant delays to verification

46 hr average delay (15 hr median)Company, by contrast, uses employees to verify immediatelyImpact can be seen by examining sites reported to both feeds

∆PhishTank Ordinary phishing URLs Rock-phish domains− Company Submission Verification Submission VerificationMean (hrs) −0.188 15.9 12.4 24.7Median (hrs) −0.0481 10.9 9.37 20.8

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 52: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

PhishTank data collection

We examined reports from 176 366 phishing URLs submittedbetween February and September 2007

3 798 users participated, casting 881 511 votes

=⇒ 53 submissions and 232 votes per user. But . . .

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 53: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Density of user submissions and votes

1 100 10000

15

5050

0

# submissions per user

Coun

t

1 100 10000

15

5050

0

# votes cast per user

Coun

tTop two submitters (93 588 and 31 910) are anti-phishingorganizations

Some leading voters are PhishTank moderators –the 25 moderators cast 74% of votes

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 54: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

User participation in PhishTank follows power law

5e+01 5e+02 5e+03 5e+04

0.00

10.

005

0.05

00.

500

Number of submissions x

Prob

(# s

ubs

> x)

, us

ers

> 60

sub

s

5e+01 5e+02 5e+03 5e+041e−0

41e

−02

1e+0

0

Number of votes cast xPr

ob(#

vot

es >

x),u

sers

> 3

0 vo

tes

Power-law dist. Kolmogorov-Smirnovα xmin D p-value

Submissions 1.642 60 0.0533 0.9833Votes 1.646 30 0.0368 0.7608

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 55: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

User participation in PhishTank follows power law

What does a power-law distribution mean in this context?

A few highly-active users carry the loadMost users participate very little, but their aggregatedcontribution is substantial

Why do we care?

Power-law distributions appear often in real-world contexts,including many types of social interactionThis suggests skewed participation naturally occurs forcrowd-sourced applicationsPower laws invalidate Byzantine fault tolerance – subvertingone highly active participant can undermine system

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 56: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Rock-phish attacks and duplicate submissions to

PhishTank

Rock-phish gang sends out unique URLshttp://www.volksbank.de.netw.oid3614061.lof80.info/vr

Wildcard DNS confuses phishing-report collators

120662 PhishTank reports (60% of all submissions)Reduces to just 3 260 unique domains893 users voted 550851 times on these domains, wastingusers’ resources that could be focused elsewhere

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 57: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Miscategorization in PhishTank

Nearly all submitted URLs are verified as phishing – only 3%are voted down as invalid

Many ‘invalid’ URLs are still dubious – 419 scams, malwarehosts, mule-recruitment sites

Even moderators sometimes get it wrong – 1.2% of theirsubmissions are voted down

PhishTank rewrites history when it is wrong, so we couldidentify 39 false positives and 3 false negatives

False positives include real institutions: ebay.com, ebay.de,53.com, nationalcity.comFalse negatives include a rock-phish domain already voteddown previously

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 58: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Does experience improve user accuracy?

1

2−10

11−1

00

101−

1000

1001

−10

000

1000

1−10

0000

1000

01− up

Perc

enta

ge0

1020

3040

50

Invalid submissionsDisputed votes

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 59: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Disrupting PhishTank’s verification system

Can PhishTank’s open submission and voting policies beexploited by attackers?

Other anti-phishing groups have been targeted by DDoSattacks

Attacks on PhishTank1 Submitting invalid reports accusing legitimate websites.2 Voting legitimate websites as phish.3 Voting illegitimate websites as not-phish.

Selfish attacker protects her own phishing websites by votingdown any accusatory report as invalidUndermining attacker goes after PhishTank’s credibility bylaunching attacks 1&2 repeatedly

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 60: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Disrupting PhishTank’s verification system

Can PhishTank’s open submission and voting policies beexploited by attackers?

Other anti-phishing groups have been targeted by DDoSattacks

Attacks on PhishTank1 Submitting invalid reports accusing legitimate websites.2 Voting legitimate websites as phish.3 Voting illegitimate websites as not-phish.

Selfish attacker protects her own phishing websites by votingdown any accusatory report as invalidUndermining attacker goes after PhishTank’s credibility bylaunching attacks 1&2 repeatedly

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 61: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Simple countermeasures don’t work

1 Place upper limit on the votes/submissions from a single user

Power-law distribution of participation means that restrictionswould undermine the hardest-working usersSybil attacks

2 Require users to participate correctly n times before countingcontribution

PhishTank developers tell us they implement thiscountermeasureSince 97% of submissions are valid, attacker can quickly buildup reputation by voting ‘is-phish’ repeatedly – there is nohonor among thievesSavvy attacker can minimize positive contribution by onlyvoting for rock-phish URLs

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 62: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Simple countermeasures don’t work

1 Place upper limit on the votes/submissions from a single user

Power-law distribution of participation means that restrictionswould undermine the hardest-working usersSybil attacks

2 Require users to participate correctly n times before countingcontribution

PhishTank developers tell us they implement thiscountermeasureSince 97% of submissions are valid, attacker can quickly buildup reputation by voting ‘is-phish’ repeatedly – there is nohonor among thievesSavvy attacker can minimize positive contribution by onlyvoting for rock-phish URLs

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 63: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Simple countermeasures don’t work (cont’d.)

3 Ignore any user with more than n invalid submissions/votes

Power-law distribution of participation means that good usersmake many mistakesOne top valid submitter, antiphishing, also has the mostinvalid submissions (578)

4 Ignore any user with more than x% invalid submissions/votes

Power law still causes problems – attackers can pad their‘good’ statistics to also do badSignificant collateral damage – ignoring users with > 5% badsubmissions wipes out 44% of users and 5% of phishing URLs

5 Use moderators exclusively if suspect an attack

Moderators already cast 74% of votes, so it might work OKSilencing the whole crowd to root out attackers is intellectuallyunsatisfying, though

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 64: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Simple countermeasures don’t work (cont’d.)

3 Ignore any user with more than n invalid submissions/votes

Power-law distribution of participation means that good usersmake many mistakesOne top valid submitter, antiphishing, also has the mostinvalid submissions (578)

4 Ignore any user with more than x% invalid submissions/votes

Power law still causes problems – attackers can pad their‘good’ statistics to also do badSignificant collateral damage – ignoring users with > 5% badsubmissions wipes out 44% of users and 5% of phishing URLs

5 Use moderators exclusively if suspect an attack

Moderators already cast 74% of votes, so it might work OKSilencing the whole crowd to root out attackers is intellectuallyunsatisfying, though

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 65: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Simple countermeasures don’t work (cont’d.)

3 Ignore any user with more than n invalid submissions/votes

Power-law distribution of participation means that good usersmake many mistakesOne top valid submitter, antiphishing, also has the mostinvalid submissions (578)

4 Ignore any user with more than x% invalid submissions/votes

Power law still causes problems – attackers can pad their‘good’ statistics to also do badSignificant collateral damage – ignoring users with > 5% badsubmissions wipes out 44% of users and 5% of phishing URLs

5 Use moderators exclusively if suspect an attack

Moderators already cast 74% of votes, so it might work OKSilencing the whole crowd to root out attackers is intellectuallyunsatisfying, though

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 66: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Lessons for secure crowd-sourcing

1 The distribution of user participation matters

Skewed distributions such as power laws are a naturalconsequence of user participationCorrupting a few key users can undermine system securitySince good users can participate extensively, bad users can too

2 Crowd-sourced decisions should be difficult to guess

Any decision that can be reliably guessed can be automatedand exploited by an attackerUnderlying accuracy of PhishTank (97% phish) makesboosting reputation by guessing easy

3 Do not make users work harder than necessary

Requiring users to vote multiple times for rock-phish is a baduse of the crowd’s intelligence

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 67: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Lessons for secure crowd-sourcing

1 The distribution of user participation matters

Skewed distributions such as power laws are a naturalconsequence of user participationCorrupting a few key users can undermine system securitySince good users can participate extensively, bad users can too

2 Crowd-sourced decisions should be difficult to guess

Any decision that can be reliably guessed can be automatedand exploited by an attackerUnderlying accuracy of PhishTank (97% phish) makesboosting reputation by guessing easy

3 Do not make users work harder than necessary

Requiring users to vote multiple times for rock-phish is a baduse of the crowd’s intelligence

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 68: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

PhishTank vs. proprietary feedsUser participation in PhishTankDisrupting PhishTank’s verification system

Lessons for secure crowd-sourcing

1 The distribution of user participation matters

Skewed distributions such as power laws are a naturalconsequence of user participationCorrupting a few key users can undermine system securitySince good users can participate extensively, bad users can too

2 Crowd-sourced decisions should be difficult to guess

Any decision that can be reliably guessed can be automatedand exploited by an attackerUnderlying accuracy of PhishTank (97% phish) makesboosting reputation by guessing easy

3 Do not make users work harder than necessary

Requiring users to vote multiple times for rock-phish is a baduse of the crowd’s intelligence

Tyler Moore An Empirical Analysis of Phishing Attack and Defense

Page 69: An Empirical Analysis of Phishing Attack and Defense · Stored in a text le on the spoof website ... Not the focus of our research Reactive measures Banks tally phishing URLs

Who’s winning the phishing arm’s race?Non-cooperation when countering phishing

Evaluating the ‘wisdom’ of PhishTank’s crowd

Conclusions

Empirically examining attacks leads to many insights!

We have established that there is wide disparity in phishingwebsite lifetimes

Banks should demand take-down companies share URL feeds

We have also seen attackers innovate: rock-phish sites outliveordinary phishing sites through clever adaptations in strategy

While leveraging the wisdom of crowds sounds appealing, itmay not always be appropriate for information security tasks

For more, see http://www.cl.cam.ac.uk/~twm29/ andhttp://www.lightbluetouchpaper.org/

Tyler Moore An Empirical Analysis of Phishing Attack and Defense