37
Copyright © 2005 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec DC October 2005 http://www.owasp.org / Identity Theft, Phishing and Pharming: Accountability & Responsibilities Danny Allan Research Analyst, Watchfire [email protected] 781-547-7833

OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

Copyright © 2005 - The OWASP FoundationPermission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License.

The OWASP Foundation

OWASPAppSec

DCOctober 2005

http://www.owasp.org/

Identity Theft, Phishing and Pharming: Accountability & Responsibilities

Danny AllanResearch Analyst, [email protected]

Page 2: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

2OWASP AppSec DC 2005

NOTE !!

Some demonstrated phishing techniques are shown in this presentation

All brands used in the screenshots are fictitious and do not reflect true organizations

Page 3: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

3OWASP AppSec DC 2005

Discussion Topics

Definitions and StatisticsMalicious Techniques

PhishingPharmingAdvanced

Current Security ModelsBest Practices

TechnicalOperational

Page 4: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

4OWASP AppSec DC 2005

The Demolished Man

Snim trudged downtown to Maiden Lane and cased the banks in that pleasant esplanade … Snim entered the bank, crossed the crowded main flood to the row of desks opposite the tellers' cages, and stole a handful of deposit slips and a pen.

Snim lurked outside the bank, watching the tellers' cages closely. A solid citizen was making a withdrawal at Cage Z. The teller was passing over big chunks of paper cash. This was the fish. Snim hastily removed his jacket, rolled up his sleeves, and tucked the pen in his ear.

As the fish came out of the bank, counting his money, Snim slipped behind him, darted up and tapped the man's shoulder.

"Excuse me, sir," he said briskly. "I'm from Cage Z. I'm afraid our teller made a mistake and short-counted you. Will you come back for the adjustment please?" Snim waved his sheaf of slips, gracefully swept the money from the fish's fins and turned to enter the bank. "Right this way, sir," he called pleasantly. "You have another hundred coming to you.“

As the surprised solid citizen followed him, Snim darted busily across the floor, slipped into the crowd and headed for the side exit. He would be out and away before the fish realized he'd been gutted.

 Alfred Bester, 1951

Page 5: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

5OWASP AppSec DC 2005

Definitions

Identity TheftThe act of impersonating another, by means of using

the person's information

PhishingA form of social engineering, characterized by

attempts to fraudulently acquire sensitive information

PharmingThe exploitation of a vulnerability in the DNS server

software that allows a hacker to acquire the Domain Name for a site, and to redirect that website's traffic to another web site

Page 6: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

6OWASP AppSec DC 2005

APWG Statistics – July 2005

86%Phish targeted at Financial Services

30 daysLongest time online for site

5.9 daysAverage time online for site

41%No target name – just IP address

46%Contain some form of target name

United StatesCountry hosting most phishing sites

6Number of brands in top 80%

71Hijacked Brands

14,135Phishing Reports Received

Page 7: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

7OWASP AppSec DC 2005

More Statistics

> 90,000Number of calls in one hour to a top 20 US Bank after a phishing attack

> $40,000At EarthLink, which averages eight unique phishing attacks each month, the cost per attack

1 in 10People who are duped into acting on a phishing e-mail that was identified as probably fraudulent

3 – 5%Recipients who divulge personal or financial information to phishers

19%Recipients who opened a phishing e-mail

57 millionEstimated number of people who think they got phishing emails in the past year

Page 8: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

8OWASP AppSec DC 2005

Causes for Growth

Average web user can be fooledWebsites & branding look officialSocial engineering plays on fearAdvanced techniques difficult to detect

Organizations are only beginning to address the issueWeb and email protections lackingCommunication is inconsistent

Enforcement and Prosecution is difficult

Page 9: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

9OWASP AppSec DC 2005

Common Phishing Attack Methodology

From: [email protected]: Security Alert

Dear HackMe Bank Client,

We are performing system maintenance, wich may interfere with access to your Online Services. Due to these technical updates your online account has been deactivated.

Click here to reactivate:

http://www.hackmebank.com/us/login.asp 

Fake Site

Real Site

Attacker Data Collection

Name: John DoeAddress: 15 Broadway AveSSN: 123 45 6789CC: 4388 1234 1234 1234Username: jdoePassword: password

Name: Jane DoeAddress: 15 7th AveSSN: 123 45 6798CC: 4388 1234 1234 4321Username: jane.doePassword: password

Page 10: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

10OWASP AppSec DC 2005

Common Email Attack Techniques

Look & Feel ReplicationDirect Data Collection Link Obfuscation

JavaScript RedirectionURL EncodingDirect IP Address

Hot linked image

Page 11: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

11OWASP AppSec DC 2005

Direct Data Collection

Page 12: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

12OWASP AppSec DC 2005

JavaScript Redirection

<a href=http://www.legitsite.com onClick=validate>http://www.legitsite.com</a>

<script>function validate() {

top.location.href = http://www.badsite.com;return false;

}</script>

Page 13: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

13OWASP AppSec DC 2005

URL Encoding

Viewed in Sourcehttp://%31%39%35%2E%32%33%39%2E%37%39%

2E%31%37%30:%38%37/%73%74/%69%6E%64%65%78%2E%68%74%6D

Resolved by Browserhttp://192.239.79.170:87/st/index.htm

Useful siteshttp://www.netdemon.net/decode.html

Page 14: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

14OWASP AppSec DC 2005

Hot Linked Image

Page 15: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

15OWASP AppSec DC 2005

Other Communication Attack Techniques

Instant messagesMessage boardsGuestbooksBlog CommentsWirelessVirus, TrojansEtc.

Page 16: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

16OWASP AppSec DC 2005

Website Attack Techniques

Fully spoofed siteStolen imagesBrowser GUI manipulationFramed KeyloggersPop-up / Pop-underXSS defacementPharming

Page 17: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

17OWASP AppSec DC 2005

Fully Spoofed Site

Page 18: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

18OWASP AppSec DC 2005

Stolen Images

Page 19: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

19OWASP AppSec DC 2005

Browser GUI Manipulation

Page 20: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

20OWASP AppSec DC 2005

Framed Keylogger

Page 21: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

21OWASP AppSec DC 2005

Pop-up / Pop-under

Page 22: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

22OWASP AppSec DC 2005

XSS Defacement

Page 23: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

23OWASP AppSec DC 2005

Pharming

HOSTS file modificationDNS AttacksWeb Cache Poisoning

Page 24: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

24OWASP AppSec DC 2005

Pharming: HOSTS File Modification

Trumps DNS settingsVirus, trojans, spyware

April, 2005 – 77May, 2005 – 79June, 2005 – 154 July, 2005 – 174

Disable AV update sitesAdvanced techniques

Multi-part

Page 25: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

25OWASP AppSec DC 2005

Pharming: DNS Attacks

Known vulnerabilitiesDNS protocol solely dependant on port and IDTechniques

Blind spoofingPRNG problemsBirthday paradoxDOS attacks

October, 2002

Page 26: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

26OWASP AppSec DC 2005

Blind Spoofing

Attacker can not see the queryMust guess the transaction ID and port

Poor DNS implementations make this easyStatic port configurationSequential transaction IDs

Page 27: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

27OWASP AppSec DC 2005

PRNG Problems

Random numbers are not always randomSome transaction IDs more likely to be used

Linux 2.2Attack feasibility: < 0.05%

Windows 98 SEAttack feasibility: 100%

Page 28: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

28OWASP AppSec DC 2005

Birthday Paradox

“ If there are 23 people in a room then there is a chance of more than 50% that at least two of them will have the same birthday”

Conventional logic suggests a transaction ID collision probability of 1 in 65,535Birthday paradox reduces this probability to only 1 in

700

Page 29: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

29OWASP AppSec DC 2005

Web Cache Poisoning

Coming soon to a phishing pond near you

Poisoned Cache Server

Hacker’ s Site

user

Hacker taints only pages that interest them.Personal Information is collected and sent to hacker’ s site using your cache server!

Web Server

–Web Cache Poisoning

Page 30: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

30OWASP AppSec DC 2005

Current Security Models

Secure Sockets Layer (SSL)Encrypts the data between the server and client

Web Browser SecuritySame origin policyCookie flag (httpOnly)Cookie flag (secure)

Two Factor AuthenticationSomething you know / have / are / do

Consumer Education

Page 31: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

31OWASP AppSec DC 2005

Best Practice Responsibilities

PreventionDetectionResolutionOperational Controls

Page 32: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

32OWASP AppSec DC 2005

Best Practices: Prevention

TechnologyWeb application security

Restrict Track / Trace HTTP methods Output Encoding Use “ httpOnly” & “ secure” cookie flags Break out of frames

– if (self != top) top.location = self.location;

Web application firewalls XSS detection Content referrer restrictions

Email integrity solutions Digital signatures Email sender verification

Page 33: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

33OWASP AppSec DC 2005

Best Practices: Operational Prevention

OperationalCustomer Education

Describe how you will interact with them Possible ID theft techniques & safeguards

Email Communication Be consistent with all customer communication Do not ask for personal information

Web Blanket SSL Two factor authentication Domain name consistency

Page 34: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

34OWASP AppSec DC 2005

Best Practices: Detection

TechnologyPhishing email monitoringDomain name managementTraffic analytics monitoring Internet monitoring

OperationalEmail bounce back analysisCall centersWebsite feedback

Page 35: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

35OWASP AppSec DC 2005

Best Practices: Resolution

Counter Measures - Site Take Down ISP communicationContact Email ProviderNotify law officialsData Poisoning

Fraudulent Site ForensicsOwner identification: Email & WebsiteRisk assessmentWebsite characteristics

Code, Technologies, ISP, etc.

Page 36: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

36OWASP AppSec DC 2005

Best Practices: Operational Controls

Policy and Procedures Incident Response Plan Internal and External Communications Plan

PrioritizationCustomer Impact Assessment

Customers affectedFinancial impact

FeedbackLearn from each event and improve process and

countermeasures

Page 37: OWASP AppSec 2005 Presentation · OWASP AppSec DC 2005 7 More Statistics Number of calls in one hour to a top 20 US Bank after a > 90,000phishing attack At EarthLink, which averages

37OWASP AppSec DC 2005

Thank - you

Questions ?Comments ?