Phishing Steals Spotlight at MIT Conference 74
Bob Brown writes "Companies are coping with spam, but phishing is another matter altogether, according to researchers at the annual MIT Spam Conference this week. From the article: "The response rate for phishing e-mails is much higher than for spam, says Paul Judge, CTO of messaging security maker CipherTrust. So while spammers have to send more and more unsolicited e-mail these days, as anti-spam filters get better at identifying and blocking spam, phishing attacks are well enough disguised that a higher percentage get through such filters, and more recipients click on them, he says."
Re:Two words (Score:1, Funny)
Re:Two words (Score:2, Insightful)
Phishing fighting is the Internet equivalent of this.
Re:Two words (Score:1)
Socialist = government
Capitalist = economy
Further more, where, on this planet, have you found a purly Capitalist society?
Uh, duh? (Score:4, Insightful)
Gee, I wonder why...
Which would you click on? (Under the assumption you're a BoA customer)
Cl1ck H33RE F0R S|0ft V1A_GR_A!!!!!
or
Click here to update your account information.
Its a matter of logic. You can expect people to fall for things that look legitimate, not the things that just look utterly retarded, like most spam these days.
Re:Uh, duh? (Score:3, Interesting)
Re:Uh, duh? (Score:3, Insightful)
The value of the database must go down where there is invalid info in it...
Re:Uh, duh? (Score:2)
Re:Uh, duh? (Score:2)
Re:Uh, duh? (Score:1)
Forgot the comedian who said it, but let Darwin work. Take the caps off the bleach bottles.
Re:Uh, duh? (Score:2)
Re:Uh, duh? (Score:2)
Re:Uh, duh? (Score:2)
Geez. Will it never end? (Score:5, Funny)
Phishers are a buncha rats ... (Score:2)
Log-in to Slashdot to Post (Score:1)
Password: [-----------]
[Submit]
Re:Log-in to Slashdot to Post (Score:2)
Help stop them, by reporting them (Score:5, Informative)
Also, those of you who use GMail, there is a "Report Phishing" option under "More Options"
Re:Help stop them, by reporting them (Score:4, Interesting)
Re:Help stop them, by reporting them (Score:2)
Re:Help stop them, by reporting them (Score:1)
What WERE you thinking?
--
Mission drift is a hazard in all pursuits.
Phishing emails look legit (Score:3, Interesting)
The emails say something to the effect of "bla bla, because of recent security issues, you have to reset your password or your account will be closed within 24 hours."
The thing is, these emails I've been getting lately look professional and legit. If I was a grandma or ininformed parent I would have clicked on them and likely have my credit account wiped. The email address states "blabla@chase.com" and even the spoofing address looks legit.
Don't know what we can do about it other than educate people to call their banks and confirm, log onto the banks real address, and not click on any address in an email.
Re:Phishing emails look legit (Score:1, Insightful)
I know people do not think but does it really take that much?
Re:Phishing emails look legit (Score:1)
So for a certain subset of phishing sites, one check might be to enter incorrect login info and see if it admits you. This should identify sites that are illegit. However, if the site doesn't log you in -- don't then assume tha
Re:Phishing emails look legit (Score:2)
With browser support, you would identify the certificate when you originally set up your account, and you'd mark the certificate in your browser as belonging to your bank, and no other site could make the greeting look like your ba
Re:Phishing emails look legit (Score:2)
Temporary e-mail (Score:5, Informative)
From the article: Among these were a proposal to improve Bayesian filter accuracy, a system for generating temporary e-mail addresses so that a person's preferred address doesn't have to be given out, spam filters based on adaptive neural networks, a new message-verification platform. (emphasis added)
This is called "keyed e-mail". I have used a keyed email system from Zoemail [zoemail.com] in the past and it works very, very well for this purpose. There is some extra time required for managing the keys, but the idea works great for me. (and no I do not work for them... I just think the technology works.)
Re:Temporary e-mail (Score:2)
Re:Temporary e-mail (Score:2)
Charity Confusion? (Score:1)
Perhaps someone can create a charity web site, where you submit the URL of a phishing site, and then it goes and submits millions of randomly generated username/password combinations to the phishing site?
Would be relatively simple to create, just web-scrape for the words
Re:Charity Confusion? (Score:1)
http://www.phishfighting.com/ [phishfighting.com]
Re:Charity Confusion? (Score:2)
phishfighting.com [phishfighting.com]
Best Cure for Phishing (Score:2, Insightful)
This has the following advantages:
1) There's no clicking on links - if you want to go to a referenced website, you have to think a little.
2) Links to phishes are very obvious when you see the whole URL.
3) Most Phishes sent as multipart alternative don't even have a
phish attempt in the text-only part.
In addition, because you're not loading any images referenced in HTML, the whole WebBug
Phishing is no joke... (Score:3, Insightful)
I've never fallen for one obviously, but just the fact I have to stop and check things out for Kosherability shows how insidious phishing has become. There is just no way someone like my wife who is just savvy enough to browse the web and read email could spot the difference (which is why i severely restrict her browsing/email habits, but not every newbie is so lucky to have the surf-nazi on their back!)
There is a LOT of potential here for the unscrupulous. I don't even think phishing has even remotely reached its peak yet.
Random_Amber
Re:Phishing is no joke... (Score:2)
As I said in another post to this story, I generally right-click and "View Source" when I'm unsure. The presence of the numbers in the URLs, like "http://10.30.1.42/chase_login.html", give it away to me.
So, the easy answer is that any time an email arrives which is in HTML format and has at least one link whose URL is numeric, then it should be flagged with "[PHISH]" (or "[SPAM - phishing attempt]", or some
Web page of the conference (Score:1)
Why not cryptographically authenticate e-mail? (Score:5, Informative)
If you visit a website and initiate an SSL session, the public-private key cryptography (along with the public root certificates imbedded in your browser) will verify that the website you're visiting is really who they say they are. (Or at least that Verisign thinks they are legit.)
I don't see why companies don't make a similar effort to cryptographically authenticate their e-mail. People use PGP for security advisories etc......, but I don't understand why all e-mail coming from my bank, coming from Paypal etc... shouldn't be signed.
If there was a portion of your e-mail window at the bottom right hand of your screen that said stuff like:
"This is an authentic e-mail from BankOfBlanBlah signed on 3/31/06 at 3:52PM" or "This is an unsigned e-mail. It is possible that this e-mail is fraudulent." or "This e-mail has an incorrect signature. It is highly possible that its contents are fraudulent."
My rough guess that e-mail authentication isn't done because (1) programmers are lazy and sending plain text is easier to program and (2) The way you do e-mail auth in e-mail clients is all different and a huge mess from a usability standpoint.
It might put at least a dent in some of this phishing stuff if people expected all e-mail from e-bay, paypal, their bank, amazon etc... to be signed.
Re:Why not cryptographically authenticate e-mail? (Score:3, Interesting)
I'm surprised that Microsoft didn't lead the pack with a feature in MS Outlook, and work directly with all the certificate issuers or even directly with the financial companies. But maybe they were under pressure from Washington, DC not to implement encrypted email. If they had done it, it'
Re:Why not cryptographically authenticate e-mail? (Score:3, Insightful)
I think you're missing the point of having a public encryption key: it's supposed to be, you know, public. In
Re:Why not cryptographically authenticate e-mail? (Score:2)
Re:Why not cryptographically authenticate e-mail? (Score:2)
Re:Why not cryptographically authenticate e-mail? (Score:2)
Re:Why not cryptographically authenticate e-mail? (Score:2)
It would have to be 30 point font for most people. People don't even read pop-up messages, centered on the screen, that have to be closed by user action.
Besides, the phishers would just add to their e-mail: ""This is not an unsigned e-mail. This e-mail is not fraudulent." "This e-mail has a correct signature. It is impossible that its contents are fraudulent."
Which do you think users would read?
Re:Why not cryptographically authenticate e-mail? (Score:1)
on the best bet for getting a deployable protocol out there for
authenticating email. It's currently going through IETF standarization,
but the -allman-01 draft is stable and has multiple interoperable implementations
including a sourceforge sendmail milter.
usability: must work like ssh (Score:2)
Porting this to the email protocols...
When somebody emails me, the headers should include both a signature and their public key. At first it means nothing. If they email me again with the same public k
Re:Why not cryptographically authenticate e-mail? (Score:2, Interesting)
Signature schemes designed for this purpose, like DKIM, are actually a signatur
Re:Why not cryptographically authenticate e-mail? (Score:3, Interesting)
Re:Why not cryptographically authenticate e-mail? (Score:2)
Fear is more effective the greed (Score:4, Interesting)
Re:Fear is more effective the greed (Score:2)
I'd lay the blame with the banks and other financial institutions for sending out e-mail with links embedded. My banks do not send out e-mails, but send a message when I log in to my accounts. An e-mail from a bank could also be a plain text message with NO links that instructs the customer to log in to their account if there REALLY is a problem. Asking a customer to type a link into the browser or using the bank's bookmark i
Worst part about phishing... (Score:2)
DON'T CLICK ON BANK OF AMERICA EMAIL! ITS A SCAM!!!!
because the moron sent their warning out to the entire company. It's like an idiot test.
Re:Worst part about phishing... (Score:1)
We simply aren't doing enough to stop phishing (Score:5, Insightful)
Phishing is easier than spam to combat because it is constrained by the requirement to look authentic. And that can be used to virtually eliminate it.
Companies could do more to prevent phishing (Score:5, Insightful)
Well, excuse me if I can't keep all your fscking domains straight, Citibank! How am I supposed to spot a phishing attack when you have 18 URLs on your list of valid ones? I think you could do a lot to help folks spot phishing emails if you would restrict yourself to your citibank.com domain. Then folks could remember, "You want citibank? Go to citibank.com."
Re:Companies could do more to prevent phishing (Score:2)
Re:Companies could do more to prevent phishing (Score:2)
While it may be true that CitiBank has too many domains, you don't help your own argument much by exagerating your evidence.
Banks/EBay/Paypal not even using SPF/DKIM (Score:2)
Aside from the email-protectio
SmokedSalmon (Score:2)
Again, I shall plug my own anti-phishing Firefox extension: http://www.maryanovsky.com/sasha/smokedsalmon/ [maryanovsky.com].
It currently does the following:
It's not particularly useful at the moment though, because the database is empty :
Newsflash: people are stupid (Score:3, Interesting)
The best way to deal with this is to promote a healthy dose of cynacism amongst the populace.
Well, another way is to force ISPs to filter port 25 traffic on broadband and eliminate the value of zombie PCs being part of the scam network.
Re: (Score:1)
Publish Phisherman's web site name and email adrs (Score:2)
Got another yesterday posing as a paypal email.
To try to expose these clowns, I do a reverse DNS lookup, a WHOIS lookup, and Google on key words, and publish the results on my Blog. http://mrlinuxhead.blogspot.com/ [blogspot.com]
The IP address, port scans, who the domain owner is, the street address, email address and phone numbers, whatever I can find out about them I publish for the local authorities
My first phishing experience... (Score:3, Interesting)
In the day time, I tried to connect, but failed. Then, it hit me. I got TRICKED! Damn social engineering. I also found out my other friends got the same IMs from my friend and me. Damn phishers.
So pay attention even if you're super tired. They're getting you at your weakness! Good thing this account was only for IM and Launch.com.
Worse when the Login ID is Your SSN - Thanks Army! (Score:1)
https://cpolst.belvoir.army.mil/public/resumebuild er/builder/Logon [army.mil]