Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Spam

Phish Scams Fooling 28% of Users 618

Etaipo writes "Anti-spam firm MailFrontier Inc has done some testing with consumers to see if they could differentiate between legitimate e-mails and phish scams. The results, to me, were pretty shocking. The company also has provided a similar test on its web site. Get an answer wrong, and we revoke your geek license on the spot."
This discussion has been archived. No new comments can be posted.

Phish Scams Fooling 28% of Users

Comments Filter:
  • by grub ( 11606 ) <slashdot@grub.net> on Wednesday July 28, 2004 @04:03PM (#9824522) Homepage Journal

    I answered 2 incorrectly as Fraud to get an 80% score so I lose 2 geek points but gain them back for erring on the side of caution. Actually I never bother with HTML mail and just skip it. That hasn't bit my butt yet.

    IT's colour schemes are giving me a seizure...
  • This test is bogus (Score:3, Insightful)

    by stecoop ( 759508 ) on Wednesday July 28, 2004 @04:03PM (#9824535) Journal
    This test is like a Kobayashi Maru test on star trek. You have to alter the conditions to win. You can't see the details in the hyper links nore the refer information in the header.
  • by gbulmash ( 688770 ) * <semi_famous@yah o o . c om> on Wednesday July 28, 2004 @04:03PM (#9824536) Homepage Journal
    I scored 90%, incorrectly IDing one legit e-mail as a fraud, meaning I missed one because of being overly cautious.

    Some of these fraud mails looked really legit and were mainly given away by the fact that their URLs went to something like fraudprevent-visa.com instead of fraudprevent.visa.com. fraudprevent-visa.com is a domain name that may or may not be affiliated with Visa, while fraudprevent.visa.com is a subdomain of Visa.com, meaning it's not 100% safe, but much more likely to be legit.

    But asking people to know this difference is asking a bit much of them. What might be interesting would be a "Phisher Identifier" built into mail clients that could identify bogus or unauthorized URLs based on a very carefully maintained database of legitimate URLs.

    Seems that a plug-in could be written for Outlook, Eudora, etc.

    - Greg

  • by mabu ( 178417 ) * on Wednesday July 28, 2004 @04:04PM (#9824556)
    Let me be among the first to call "Bullshit" on this supposed test.

    Any nerd worth his salt knows to first check the headers of the e-mail and Lookup the IP [dnsstuff.com] to see where the mail really came from, and/or view the source of the HTML and identify obfusicated URL redirects. Then again, any IT guy who is using HTML-enabled e-mail should have his geek license revoked in the first place.
  • by bennomatic ( 691188 ) on Wednesday July 28, 2004 @04:05PM (#9824566) Homepage
    I had a client recently who called me complaining that she was getting hundreds of e-mails bounced to her that she didn't send out. I asked her if she had recently opened any email attachments, and sure enough, she said, "Only the one that Microsoft sent me that was a required security upgrade. Come to think of it, that's about when this problem started"

    When it's that easy, you can't even call it social engineering. It's just social nudging, and people are ready to fall for it.

  • Tax on the stupid? (Score:1, Insightful)

    by Mr. Vandemar ( 797798 ) on Wednesday July 28, 2004 @04:07PM (#9824597) Homepage
    Everytime I read a statistic like this I have to ask myself if it's even worth fighting against this kind of thing any more, or if we should consider it a tax on the stupid. Cynical, maybe, but I'm tired of explaining why you should never give out personal information via email to people and having them turn around and do exactly that a week later. I admit, some of the newer emails are getting quite professional looking, but as soon as they start asking for passwords/CC #s, red flags should go up. Sadly, many users gladly give the scammers what they're after with not a thought.
  • by EmagGeek ( 574360 ) on Wednesday July 28, 2004 @04:12PM (#9824662) Journal
    Do you have any data to back up this outrageous claim?
  • by russler ( 749464 ) on Wednesday July 28, 2004 @04:12PM (#9824666)
    We've all received a number of these scams, and most of us on /. are surely not likely to fall victim. But I can see why the confusion for some people:
    1. They are intimidated the moment they sit at the computer.
    2. The same people who might be skeptical as ever when dealing with a live human do not have a clue that the "internet" can be an evil place at times.
    3. Some of these sights look exactly like the page they are emulating including all the other links on the page going to the real site. These people just do not know to look for "www.ebay.com" instead of 200.50.66.71 in the address bar. That is (sadly) still meaningless to a lot of people.

    Education and experience on the web is likely to reduce these issues over time, but for now, it's just a way-too-easy niche opportunity for thieves and scammers to prey upon the naive.
  • by deragon ( 112986 ) on Wednesday July 28, 2004 @04:17PM (#9824732) Homepage Journal
    I was once fooled believing that I received a fraudulant email making me believe it came from Sony. I wrote to Sony to report the email and they told me it was legite!

    What caused me to think it was fraudulant? Well, the URLs in the email was going for something like sony.<somecompany>.com. The URL did not finish with "sony.com". The only way to figure out if an email is phoney or not is to check the URLs (assuming your browser does not have the famous URL bug which shows you a legite URL but once clicked, sends you to another site while still showing the legite URL in the URL bar), but when companies use 3rd parties to email their users and provide services, they cause these confusions.
  • by real_smiff ( 611054 ) on Wednesday July 28, 2004 @04:18PM (#9824741)
    "I am genuinely disgusting.."

    disgusted. you are disgusted. i make this mistake all the time :/

    agree about the leet speak.

    i came very very close the other day to falling for a fake eBay "your account has been hacked, verify your account details" type scam. it was brilliant, no typos, perfect grammar, good layout, and most of all: i was tired when i got it. felt like a right plonker for even believing it for a second. now i have a lot more sympathy for people who fall for these things. thank god i did check the url.

  • by lukewarmfusion ( 726141 ) on Wednesday July 28, 2004 @04:18PM (#9824753) Homepage Journal
    Let's all use Pine!

    Maybe you don't live in the real world, but in my company we deal with clients that send HTML emails when plaintext would do, we send HTML (or even Flash) newsletters for clients, and we have a 1-5 geek ratio. So checking headers, looking up the IP originator, or viewing the source isn't an option for the four of us that aren't geeks.

    Since I'm one of the geeks, I do my best to educate and inform my colleagues. But I can't do that for everyone - my wife's grandparents will probably fall for every phishing scam. Hell, they forward every cute email, virus warning, (and usually virus) they get.
  • by PhxBlue ( 562201 ) on Wednesday July 28, 2004 @04:19PM (#9824766) Homepage Journal

    No, you just have to recognize the proper set of conditions. If an E-mail already contains correct and verifiable information about your account, or if it does not ask for any account information in the first place, it's probably legit. Otherwise, it's probably a fraud. My non-geek wife and I both took the test and scored 10 / 10.

  • by ameoba ( 173803 ) on Wednesday July 28, 2004 @04:26PM (#9824856)
    The problem with the test is that they obscure the links. To me, the big test of a scam v. a real email is where the links point to rather than the content and the test uses javascript to obscure where they're going.
  • by LittleBigLui ( 304739 ) on Wednesday July 28, 2004 @04:27PM (#9824871) Homepage Journal
    So checking headers, looking up the IP originator, or viewing the source isn't an option for the four of us that aren't geeks.


    Can the four non-geeks in your company manage to hover the mouse cursor over a link to see where it really goes to?

    (Also, do they use a browser/MUA that tells correct information in its address/status bar?)
  • by pHatidic ( 163975 ) on Wednesday July 28, 2004 @04:28PM (#9824886)
    I don't get it, can someone explain this to me. How is it possible to tell which emails are real and which are fraud just but looking at them in this test? For example I marked the paypal one as fraud when it was actually real, but how could I tell that? For all the fake ones the email came from support@domainname.com or whatever with no email header, and all of the links looked accurate. How could one possibly tell where the email came from without looking at the header? How could you tell whether the paypal email linked to https://www.paypal.com or http://www.geocities.com/~paypal.html without being able to click the link? I got these all right except for the paypal which I thought was fraud, but that was only because I recognized them from real email where I was able to look at the headers. Someone please explain to me why it is so bad that 28% of people couldn't pass an unfair test. To me this says nothing about the test takers, only that the people who made this test are morons.
  • by Kazoo the Clown ( 644526 ) on Wednesday July 28, 2004 @04:29PM (#9824891)

    No, you just have to recognize the proper set of conditions. If an E-mail already contains correct and verifiable information about your account, or if it does not ask for any account information in the first place, it's probably legit. Otherwise, it's probably a fraud. My non-geek wife and I both took the test and scored 10 / 10.

    Congratulations. However, by ALLOWING YOUR FINANCIAL INSTITUTION to send you correct and verifiable information over email, and since email is sent unencrypted they have in effect, published your information to the web at large. I would consider this a CONTRIBUTION TO FRAUD, and therefore equivalent to fraud, in my book. If I were to get that kind of information from a bona-fide financial institution I'm associated with, I will immediately contact them and treat it like an actual fraud-- change my account, etc.

    This site is bogus because it is giving you a false sense of security...

  • by Ricdude ( 4163 ) on Wednesday July 28, 2004 @04:31PM (#9824916) Homepage
    ...that I would have clicked any of the links in the emails.

    If I get any message that smells remotely like phish (i.e. any email that tells me to do something with my account), I go to my browser, and visit the site by manually entering the name of the website. If it then turns out to be a bogus email, I send a copy to the admins of the site, so they can track the insensitive clods down, and do whatever it is they do with them.

    The IQ test would be a lot easier with access to full mail headers, too...
  • by Satan Dumpling ( 656239 ) on Wednesday July 28, 2004 @04:34PM (#9824955) Homepage
    Aw if he was God he would have removed those nasty moles on his face years ago!
  • Re:hard? (Score:1, Insightful)

    by selderrr ( 523988 ) on Wednesday July 28, 2004 @04:36PM (#9824989) Journal
    copy and paste the URL rather than click it

    Com'on puhlease !!!

    Do you really really expect just about anyone to do do this ? It simply kills the whole purpose of the web ! It's like the typical MS security apporach to the IE activeX scripting problem : "disable everything".

    Jeez... is that's your view on safety, i bet you never come out of the house. Come to think of it , when was the last time you had a breath ?
  • by forevermore ( 582201 ) on Wednesday July 28, 2004 @04:38PM (#9825014) Homepage
    Actually, they all go to #, which doesn't actually go anywhere. I call foul on this test -- it doesn't actually matter what the content of the email says (since I have no way to know that ebay would never suspend my account for not updating my info unless I actually go and look at the fraud stuff in their faq). A phishing message is easily (and only accurately) detected by looking at the address pointed to by the links within (which is what you will see banks, etc. telling you: "if you are unsure, just manually type our URL in, or call us"). How can this test be an accurate measure of people's ability to detect phishing emails if the links (the only worthy mark of a phishing email) they've given us don't actually link to real or fake sites?
  • Re:I got a 3 (Score:1, Insightful)

    by Anonymous Coward on Wednesday July 28, 2004 @04:39PM (#9825037)
    Perhaps you could use a better sense of humor...
  • by pudding7 ( 584715 ) on Wednesday July 28, 2004 @04:39PM (#9825038)
    Why would Visa cancel your account unless you "validated" the account once a month? What if you're on a two month vacation? You lose your account? Why would Citibank send you an email saying "Unless you click this link and enter all your info, your credit card will expire!" If my card's about to expire, I get a new one in the mail. Be cynical and suspicious. It's healthy.
  • by lordsid ( 629982 ) on Wednesday July 28, 2004 @04:44PM (#9825099)
    i entirely agree, the way i verify if an email is legitimate is to check where the links go. this test was entirely fubared and any data collected from it is worthless.
  • This is why... (Score:5, Insightful)

    by devphil ( 51341 ) on Wednesday July 28, 2004 @04:46PM (#9825141) Homepage


    ...I won't use an email client that renders HTML. Or at least, won't let me turn that off.

    When I get these mails, 95% of the time I delete them unread; no legitimate business should ever need me to "confirm my information". Every so often I look at one, and since I only see the raw HTML, it's easy to see that the images and whatnot are all being pulled from the real company site, except for the "login" link which goes to some mysterious dotted quad address.

    (Side note to companies: stop letting outsiders pull images off your server; only let your own pages refer to them. It's an Apache FAQ, fer cryin' out loud.)

    Every so often a friend will send me HTML mail, but I can cope. :-)

  • by boaworm ( 180781 ) <boaworm@gmail.com> on Wednesday July 28, 2004 @04:47PM (#9825153) Homepage Journal
    I think this poll i rubbish, mostly because I got 50 %. But let me explain...

    I dont live in the US. I haven't heard of most of the companies in the poll at all, and those I've heard of (paypal, msn etc) have never crossed my mind to use. If i would have received any of those mails, of course it would have been fraud.

    What I'm trying to say is, if my bank, with secure connection and proper URL, send me an email telling me to do something, i'd probably look into it. If the bank is called "usbank.com", I wouldn't click on it.

    Basically, how on EARTH am I going to be able to determine whether they are frauds or not, if I'm marked incorrect when stating "usbank.com" isnt fraud?

    If you disregard any messages you dont recognize, and are cautious with the rest, you are fine.
  • Re:Unfair test (Score:3, Insightful)

    by Koyaanisqatsi ( 581196 ) on Wednesday July 28, 2004 @04:56PM (#9825275)
    No, the key is, a legit email should not ask you to click a link, but rather to "go to our website" (but not provide the link).
    Let the user login as usual, and he/she will be safer.

    That logic gave me a 10/10 result on the test.
  • by zurab ( 188064 ) on Wednesday July 28, 2004 @04:57PM (#9825293)
    I only got the first one wrong - MS Hotmail e-mail was actually legitimate and I marked it as fraud. But I don't have Hotmail, and I don't plan on ever having it - so for me it would be illegitimate.

    Besides, you are right about HTML mail. If I subscribe to e-mail notifications from websites, I always choose plain text e-mails. If I do get HTML mail, I look at its headers first (without opening content and certainly not loading any images) - most of it is spam/fraud/whatever. So, maybe there should have been a way to display headers in the test.
  • by silverfuck ( 743326 ) <dan@farmer.gmail@com> on Wednesday July 28, 2004 @05:00PM (#9825333) Homepage

    I answered one incorrectly as fraud (the MSN one), and the rest perfect. But I was surprised I actually scored so highly as the test removed all the methods I use to spot fakes:

    1) I couldn't see where the links were pointing as they had been removed.
    2) I couldn't see the email headers.
    3) I had no idea if any personal information (at the most basic level, name) was correct or not. Though I would err slightly on the side of counting any email that has personal details in it as legit, it is obviously fraud if it carries somebody else's name.
    4) Am I supposed to be actually subsribed to any of these services or not? If I get something from citibank like that in my inbox, I'm going to mark it as fraud as I have absolutely nothing to do with them. (This is my excuse for the hotmail/MSN one!)

    It's very possible most people don't check the first two at all, in which case I have slightly more sympathy with them seeing how confusing it can be now.

    Maybe an added layer of security could be to go to the site in question and log in from there manually to check everything?

  • Re:Unfair test (Score:2, Insightful)

    by FreeTheFurniture! ( 727298 ) on Wednesday July 28, 2004 @05:03PM (#9825364)

    I agree, it was made much harder with the actual URLs removed. I think the point of the test though was see how people faired based on the look (logos, etc) and obvious content. There are the things that your *average* user looks at to determine legitimacy (not reverse lookups, urls, etc).

    I got caught marking a PayPal one as fraudulent (the one where some one had made a payment), which the article says happens 20% of the time. My misread was based on the long and ugly URL with a cgi call in the middle. In real life, if I had been expecting a payment, I would most certainly have been less skeptical.

    So yeah, the test isn't perfect, but it's interesting to see (from all the previous posts) just how bad tech savvy users do when they are faced with the same knowledge base as a regular user.

  • by gryphokk ( 648488 ) on Wednesday July 28, 2004 @05:15PM (#9825476) Homepage Journal
    The first rule I use to test is whether they use an emotional fear response to manipulate you into clicking. No vendor or business is going to frighten you with "All your data will be lost" or such nonsense.

    Sadly, this led me astray with the MSN "legitimate" email. One more reason not to use M$ for anything!

  • Re:I got a 3 (Score:5, Insightful)

    by jandrese ( 485 ) * <kensama@vt.edu> on Wednesday July 28, 2004 @05:19PM (#9825519) Homepage Journal
    The biggest tipoff is when it starts off with "Dear Paypal user" or something like that. Most companies go to the trouble of putting your actual name in there, so if whoever is sending you the email doesn't even know your name...well, you figure it out. This tactic even worked in the example quiz! It's a great first pass (the second pass is of course to mouseover any URLs (or check the source) and see exactly where they're sending you.

    The only example that really made me think was the MSN account expiring message. At first I thought that had to be a fake because what's the point of sending you an email telling you that you need to log into your email to save your account? Then I realized it was actually an ad for a related pay MSN service and immediatly knew that it was real.
  • by ottothecow ( 600101 ) on Wednesday July 28, 2004 @05:19PM (#9825524) Homepage
    I agree, some of those simply gave a link to the main site. I'm pretty sure when I get emails from people like that, they usually include a link to their home page.

    I usually am suspicions but I check where the link takes me. This test wouldnt let me check this, so I assumed that the links pointed to where they said to (www.paypal.com/whatever/ points to www.paypal.com/whatever/)

    I think that makes the test inaccurate. if I click a link, it should show me the real target (even if they do a fake replica (something like 201.123.123.34/www.usbank.com/account/blah/)

  • by @madeus ( 24818 ) <slashdot_24818@mac.com> on Wednesday July 28, 2004 @05:49PM (#9825797)
    The test was completly meaningless as you couldn't do all the correct things you SHOULD to to check the authenticity of an email.

    It encorages people to base decisions based on *hunches*, which is utterly retarded. You could take a genunine email and alter the URL and you'd never know you'd been duped if you went by the examples in this test - you'd just think it looked real, click on the URL, login and end up being scammed.

    This 'test' is utterly worthless as a result. You *can't* tell just by looking at the surface content of an HTML rendered email. If you can't look at the email headers or the URLs you have no way of knowing all of them arn't spoofed.
  • by tiskel2000 ( 670149 ) on Wednesday July 28, 2004 @06:15PM (#9826018)
    I agree. How is this one fraud when all of the links on the site are valid, and they aren't asking for any information?
  • Re:I got a 3 (Score:4, Insightful)

    by Chibi ( 232518 ) on Wednesday July 28, 2004 @06:21PM (#9826075) Journal
    The biggest tipoff is when it starts off with "Dear Paypal user" or something like that. Most companies go to the trouble of putting your actual name in there, so if whoever is sending you the email doesn't even know your name...well, you figure it out. This tactic even worked in the example quiz! It's a great first pass (the second pass is of course to mouseover any URLs (or check the source) and see exactly where they're sending you.


    I've recently been getting some spam that has my name and some address info in the subject line. It's obviously spam, and someone trying to rip me off. I've also been getting a lot more 419 spam, and that usually has my name (although they always refer to me by my last name *sigh*). But I just wanted to point out that we all probably have a lot of info about us out there ready to be used against us. As you say, it's a good "first pass" test, but nothing more than that.

  • by meta-monkey ( 321000 ) on Wednesday July 28, 2004 @06:32PM (#9826185) Journal
    On the other hand, consider that in this test, subjects were actively thinking about whether or not these emails were fraud. They had advance warning that they might be exposed to fraud. That doesn't happen in the real world...the general assumption when you get an email from a service to which you subscribe is, "Oh, this service I use is trying to contact me about something important."

    It's kind of like April Fool's Day. Play a prank on somebody on April Fool's Day, when they're expecting it, and they might not fall for it, because they're on the lookout. On any other day, the same prank might succeed easily, because the victim is caught off gaurd.
  • by Anonymous Coward on Wednesday July 28, 2004 @06:36PM (#9826217)
    I nearly fell for myself, except that I didn't recall having an eBay account.
  • by jcsehak ( 559709 ) on Wednesday July 28, 2004 @06:44PM (#9826281) Homepage
    You're right, but most people don't know how to check the headers, much less look up the IP. But the two easiest checks against these type of messages weren't available in the test:
    1) Does it make sense that I would get this? If I don't use US Bank, for instance, it's obvious it's fraud. But for the sake of the test, I think they assume you're involved with those companies, and that's okay.

    2) More importantly, they don't let you check where the links are going to. If I rollover "www.paypal.com" and in the little bar in my browser it says "www.paypal.com," I know it's alright. But if it says "ccnums.steal-this-suckers-identity.com"...
  • by mrchaotica ( 681592 ) on Wednesday July 28, 2004 @07:15PM (#9826505)
    If that's so, then why did we all score so high (I got a 90% -- I thought the "paypal shipping" one [#9] was a fraud)?

    The reason is that there's one way you can tell: ALL the frauds had text saying "click this link" The two legitimate ones other than #9 told you to sign in, but didn't provide a link. (although they did provide other hyperlinks -- just not to the login page)

    #9 fooled me because it had a link to click.
  • Some bad examples (Score:3, Insightful)

    by Spazmania ( 174582 ) on Wednesday July 28, 2004 @07:35PM (#9826632) Homepage
    Just want to point out that two of the "legitimate" emails on the web survey could easily have been fraudulent. These are the "Don't lose your MSN Hotmail account!" email and the "Your credit card ending in 2008 will expire soon." email.

    In fact, I've seen a version very similar to the credit card expiration link that warns about typing in the URL but then goes ahead and provides a clickable link anyway. When you look at the code, the link actually goes to a completely different URL than what is displayed, using the old trickery of "http://paypal.com@12356789/cgi-bin/trickedyou.cgi ".

    For those not familiar with the trick, "paypal.com" in the above url is the login name the web browser is instructed to provide to the web server while 12356789 is the decimal representation of the web server IP address.

    Only the shipping notice fails to smell fraudulent. Even that could be rigged if you wanted to, by having the tracking link require you to "open a free UPS tracking account."

    Of course, if they'd provided the entire emails instead of just the html representation, any techie could have sorted it out. But not the mere mortals.
  • Re:This is why... (Score:4, Insightful)

    by OneSeven ( 680232 ) on Wednesday July 28, 2004 @07:37PM (#9826648)
    but... the work around is so easy, that it's barely worth even trying to protect the images. It's called 'Print Screen'.
  • Re:This is why... (Score:3, Insightful)

    by OneSeven ( 680232 ) on Wednesday July 28, 2004 @07:39PM (#9826664)
    oh...... wait.
    I'm stupid. Nevermind.
  • by SloWave ( 52801 ) on Wednesday July 28, 2004 @07:47PM (#9826710) Journal
    I counted them all as fraud because of the Javascript mouseovers for links.
  • by operagost ( 62405 ) on Wednesday July 28, 2004 @08:41PM (#9827105) Homepage Journal
    I got 100%, but it was difficult because the links were bogus. I easily identified an eBay Phishing attempt recently by going to the link properties and noting that it was one of those bogus redirects like people used to "goatse" slashdotters with.

    In this case, I had to use non-techie logic, which is what we need to teach the non-geeks how to use.

  • What a stupid test (Score:3, Insightful)

    by srn_test ( 27835 ) on Wednesday July 28, 2004 @09:00PM (#9827208) Homepage
    The _only_ way to tell the real thing from the fake is to look at the actual URL the link points to.

    The morons who run the test changed them all to point to their own site; so every one of them is clearly fake.

    Relying on any other content in the email is just stupid; the phishers will just improve their spelling and wording until it starts fooling enough people again.
  • by Anonymous Coward on Wednesday July 28, 2004 @09:46PM (#9827471)
    I had initially marked them all as bogus, because none of the links pointed to where they said they did (They specifically told you to mouse over the links to see where they went)
  • Re:This is why... (Score:5, Insightful)

    by Tony-A ( 29931 ) on Wednesday July 28, 2004 @09:47PM (#9827474)
    "confirm my information".

    There is a meaning to this word confirm.
    If they list the information they wish to confirm, it might be legitimate.
    If they list no information that is to be confirmed, it's a scam.
    There is a problem if several pieces of information with one of them wrong.

    "your account has been hacked, verify your account details"
    Which account has been hacked?

    You know the account has been hacked.
    You know the account is mine.
    You will not tell me which account, how you know it is hacked, and how you know it is mine.
    It's not the misspellings, bad grammar, etc. There's something missing that any legitimate message of that sort would have. Essentially it's insider information pertinent to why this comes from you to me.
  • by Xhad ( 746307 ) on Wednesday July 28, 2004 @10:06PM (#9827575) Homepage Journal
    ...more than once. Enough people have computers now that slang related to email in particular (i.e. SPAM) affects enough people to make its way into the media.

    This isn't new.

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...