Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security The Almighty Buck

A Foolproof Way To End Bank Account Phishing? 436

tcd004 writes "F-Secure's Mikko Hypponen proposes an elegant solution to the problem of bank account phishing in the latest Foreign Policy magazine. Hypponen thinks banks should have exclusive use of a new top-level domain: .bank. 'Registering new domains under such a top-level domain could then be restricted to bona fide financial organizations. And the price for the domain wouldn't be just a few dollars: it could be something like $50,000 — making it prohibitively expensive to most copycats. Banks would love this. They would move their existing online banks under a more secure domain in no time."
This discussion has been archived. No new comments can be posted.

A Foolproof Way To End Bank Account Phishing?

Comments Filter:
  • by brian.gunderson ( 1012885 ) * on Monday May 07, 2007 @08:16PM (#19029705) Journal
    An improvement? Maybe. Foolproof? No. DNS poisoning is still just as prolematic, and appended URLs (i.e. www.mybank.bank.badurl.com) will still fool *some* people.
  • This idea is even stupidder than people who fall for phishing attacks. Another tld gold rush isn't going to solve anything because the problem is people's credulousness,

    I'd expect to see a rush of tld registrations to Macedonia [wikipedia.org] (citybank.ba.mk) and Saint Kitts and Nevis [wikipedia.org] (citibank.ba.kn)

    Even if you could train people to look at the URL properly, theres always the chance that we'll see another Internet Explorer URL Spoofing Vulnerability [secunia.com].
  • Solution? (Score:2, Insightful)

    by g0dsp33d ( 849253 ) on Monday May 07, 2007 @08:21PM (#19029779)
    This doesn't stop people to giving out account information over the phone, or link spoofing. How many people just click links and don't read them. "My email says its from a bank, and some Prince wants to give me a buttload of money. Yey!".

    Its a step I guess, but education goes a bit further, I think. At least they could use the 50k to help victims of spoofing, or to come up with other (better) solutions.
  • by MarcoAtWork ( 28889 ) on Monday May 07, 2007 @08:23PM (#19029815)
    what kind of financial institution couldn't afford to spend 50 grand to register a domain name? or even 50 grand a year to keep it? If it was me I'd make it 500 grand a year: this way only reputable institutions would sign up for this (institutions that realize that this is peanuts compared to the damage phishing can cause, not to mention that half a million these days seems to be pocket change compared to some banks' advertising budgets)
  • by sporkmonger ( 922923 ) on Monday May 07, 2007 @08:27PM (#19029871) Homepage
    Not just appended URLs, also urls like:

    http://somedomain.ru/ [somedomain.ru]
  • This wouldn't work (Score:5, Insightful)

    by j0nb0y ( 107699 ) <jonboy300NO@SPAMyahoo.com> on Monday May 07, 2007 @08:27PM (#19029881) Homepage
    Phishing works because people don't pay attention to URLs. How would changing the URL help?
  • Not even. Most of the phishing emails that reach my inbox don't even bother to make the URL look like the bank. They just redirect you and hope you don't bother to look at the URL at the top.

    As long as a signifigant portion of the population doesn't take even basic steps to protect themselves phishing will be a prevalent problem.
  • Exactly. For $50,000, I get a domain that people will "know" is phish-proof. A decent scammer can make tht back in a day if everyone "knows" its "the real bank" and lets their guard down ...

    People who think this will work are also gonna love "security through obscurity."

  • by OverlordQ ( 264228 ) on Monday May 07, 2007 @08:30PM (#19029907) Journal
    Neither of those would work, since your main domain name needs to be at least three characters.

    Might want to tell that to people who register .co.uk domains.
  • by dgatwood ( 11270 ) on Monday May 07, 2007 @08:31PM (#19029921) Homepage Journal

    The banks that do such high volume transactions also tend to be leeches on society, taking a lot and giving back very little. I say make it ten million dollars a year. Those of us with a clue will keep using our credit unions' .org domains while the .bank TLD bleeds the blood suckers dry.

  • by sporkmonger ( 922923 ) on Monday May 07, 2007 @08:32PM (#19029925) Homepage

    In retrospect, I should have previewed the previous comment. Didn't expect Slashdot to munge the url.

    The scheme would still fall victim to urls like this:

    http: //paypal.bank:d7b0425f-a9b5-4dee-8e5d-ae97680e9118 @somedomain .ru Sadly, there doesn't seem to be a way to turn off Slashdot's autolinking. Ignore the spaces.
  • Bad! Bad! Bad! (Score:4, Insightful)

    by NeutronCowboy ( 896098 ) on Monday May 07, 2007 @08:33PM (#19029935)
    Even if we discount the problems we currently have with various DNS poisoning attacks, social engineering and just URL spam, it's basic premise is completely flawed. Why? Because the two assumptions it rests on are laughably easy to circumvent: spammers don't want to spend $50k on one domain, and registering as a financial institution anywhere is difficult.

    If I'd be an organized crime ring, I'd be barely able to contain my enthusiasm for this solution: for a paltry $50K, I can set up a site that users will almost automatically assume to be safe and part of a real bank. Time to register for mypersonalcity.bank, bankofus.bank, continentwide.bank, and make a killing!
  • Oh wait, I'm an idiot. I take that back.

    Those graphs said "(in thousands)"...
  • by adrianmonk ( 890071 ) on Monday May 07, 2007 @08:40PM (#19030001)

    This is a dumb idea in the first place. But assuming we went with it, .bank is the wrong domain name.

    First of all, I have a credit union. It's not a bank. There is an important legal difference. Its domain should not end with .bank. Then there are also savings and loans, which are also not banks.

    On top of that, people try to phish for account information for other financial institutions which aren't credit unions, savings and loans, or banks. For example, investment companies and stockbrokers. This scheme would force us to have fidelity.bank and vanguard.bank and etrade.bank and so forth. They're not banks, yet people often have accounts there with millions of dollars that bad guys want to phish for.

    Effectively, the idea of putting it into DNS all under .bank seems to be based on the assumption that the set "things crooks want to phish for" equals the set "banks". Which is not reality.

    A much better idea would be a separate SSL/TLS certificate signing authority that would specifically mark the registered domain as having some proven attribute, like "this is a bank" or "this is a credit union". That is certificate authorities that not only sign, but make specific assertions like "we verified that this web site belongs to a bank named Foo licensed in the following states: CA, CT, NJ, NY, TX".

  • Duh (Score:4, Insightful)

    by Mwongozi ( 176765 ) <slashthree AT davidglover DOT org> on Monday May 07, 2007 @08:42PM (#19030017) Homepage

    There's already a foolproof solution. My bank never contacts me by e-mail! So I know that all e-mails claiming to be from my bank are fake.

    Quite simple really.

  • by grcumb ( 781340 ) on Monday May 07, 2007 @08:51PM (#19030105) Homepage Journal

    An improvement? Maybe. Foolproof? No. DNS poisoning is still just as prolematic, and appended URLs (i.e. www.mybank.bank.badurl.com) will still fool *some* people.

    True, but this time, we could actually use technical means to ensure the validity of the address. Browser plugins could quite easily be programmed to mitigate (if not solve) the issues you raise. A hypothetical 'MyBank' plugin could, among other things, use only trusted (or consensus) DNS to resolve the name, and it could absolutely, positively be guaranteed to check the domain spelling every time.

    Knowing the precise namespace would not solve every problem, but software developers could do a lot with that one extra datum for validation.

  • by patio11 ( 857072 ) on Monday May 07, 2007 @08:51PM (#19030111)
    Banks spend incredible amounts of effort getting people to use their online properties, since they're the most cost effective way to service retail customers (i.e. natural persons as opposed to businesses, institutions, etc). No bank is going to sink their brand investment in citi.com or bankofamerica.com just to head off a wee bit of fraud. The only thing fraud is to a bank is a cost of doing business, nothing more -- they'll make a dispassionate calculation that fraud is less expensive than launching a new nationwide advertising/customer education campaign and pass on this idea. Its the same way that they've decided that it is more important to be able to receive a credit card decision in 15 seconds than it is to verify the identity of the person submitting the request -- fraud stings, losing potential customers to your easy-to-apply competitors stings more.
  • by jorgevillalobos ( 1044924 ) on Monday May 07, 2007 @09:01PM (#19030185) Homepage

    An improvement? Maybe. Foolproof? No. DNS poisoning is still just as prolematic, and appended URLs (i.e. www.mybank.bank.badurl.com) will still fool *some* people.

    I think that if this solution were to be adopted as a standard, browser makers would follow and reflect the "secure" TLD on the main UI. Firefox and IE7 already to this to some extent (yellow URL bar for SSH enabled sites, green (I think) on IE). There could be a special UI state that indicates you're on a secure .bank site. This would help make this solution even more robust and harder to circumvent.

    This is obviously not fool proof, and I don't think such a solution exists, as there will always be someone oblivious or stupid enough not to notice the blatant lack of security signs, or highly sophisticated attacks (window spoofing, for instance) that confuse even savvy users.

  • Wont Work (Score:3, Insightful)

    by Fujisawa Sensei ( 207127 ) on Monday May 07, 2007 @09:01PM (#19030187) Journal

    People don't look at domain names now, nor do they check for https. What makes you think this will change things?

  • by Vellmont ( 569020 ) on Monday May 07, 2007 @09:05PM (#19030225) Homepage
    There's no need for some dumb .bank tld for users to hope to verify authenticity of a bank site. All we need is something akin to an electronic ATM card.

    The card plugs into a USB port (or a reader plugs into USB and the card plugs into the reader). The card performs several functions:

    authenticates the user to the bank (after you enter in a pin).
    authenticates the bank to the user.
    authenticates a secure connection to the bank has been established.
    authenticates each transaction.

    for an added bonus, keeps the users authentication secrets INSIDE the magic card (authentication of the user performed via challenge-response).

    This is NOT a terribly complicated system. Encryption has been doing authentication for years. If banks wanted to prevent fishing attacks, they'd develop a standard and not do any online banking without this device.

    Could it still be hacked? Sure, but an attacker would have to compromise the users computer AND have the magic card inserted into it while performing the attack. Lose your magic card? No problem, it gets invalidated just like an ATM card and the bank sends you a new one, possibly for a small fee.

    Of course, banks are too cheap and conservative to do this on their own. We need a regulatory body to start pushing this on them, otherwise it'll never happen.
  • by griffjon ( 14945 ) <GriffJon&gmail,com> on Monday May 07, 2007 @09:08PM (#19030251) Homepage Journal
    I can see it now:

    Dear Customer,

    We are in the process of moving to our new, more secure .bank domain, as you have read about in the news. Further, you no doubt have read about the various scams and "phishing" attacks preying on value bank customers such as yourself. To avoid these problems, OurBank (tm) has come up with an innovative and secure system to avoid the problems with the transfer of domain names. Attached to this email is a program which will install itself on your computer. It uses some of the very same techniques that many advanced attackers use, but to defend your privacy! It will ensure that when you want to see either OurBank.COM and/or OurBank.BANK, that you'll get to the right location by setting this at your computer, so no mistakes can be made along the way from your computer to ours.

    Please be aware that some "anti-ad-ware" programs currently detect our system as a "hijacker" - while we are, in effect, "hijacking" your connection, it is to improve your privacy and we are working with vendors to remove this warning for our program.

    Please open and install OurBank.exe - it will ask you to verify your customer information, bank branch, and then log you in (the first time only) to your account with us. Remember to disregard any security warnings and allow our program to communicate through your firewall until we are able to resolve this mis-identification by the anti-ad-ware vendors.

    Thanks again for your business,

    OurBank./
  • by billstewart ( 78916 ) on Monday May 07, 2007 @09:16PM (#19030321) Journal
    Unfortunately, the best customers for phishers usually aren't using Firefox - they're either using the browser that came with their PC, or else the one that came with their AOL account.


    And if they're using the one that came with their PC, they may very well have several extra toolbars to "help" them use the Internet, though that can be a problem for phishers because other crackers may get the bank account info before they do.

  • We have certificates to solve DNS poisoning.

  • by samkass ( 174571 ) on Monday May 07, 2007 @09:21PM (#19030383) Homepage Journal
    Quick, someone register ba.kn! It's already in a nice Caribbean island. Or you could register "ba" in Bosnia/Herzegovina and fool people with URLs like bankofamerica.ba [bankofamerica.ba]nk. There is no "foolproof" method... you'll always be able to convince people to make a mistake.

    I like the idea of the one-time authentication RSA fobs better.
  • by Hyperhaplo ( 575219 ) on Monday May 07, 2007 @09:24PM (#19030413)
    How long until all browsers have a url checker built in with some simple basic rules applied?
    Eg: If the address contains ".bank.com" and there is a "." after the com then alert the user / disable javascript / etc.

    Yes, I do know that for a lot of people having technology that calls attention to these kinds of problems just causes them to not worry about it. There are, however, too many people who just don't have a clue, are not capable or don't care. I've taught many of them to be careful.

    I still wonder why people don't use the Firefix [getfirefox.com] / Adblock [mozilla.org] / Filterset.G [mozilla.org] combination as a basic starting point.

    It is good to see that there are some anti-phishing [mozilla.org] addons for Firefox now.
  • by Anomolous Cowturd ( 190524 ) on Monday May 07, 2007 @09:28PM (#19030497)
    Maybe browsers should start color-coding the tld in the URL input box...
  • because... (Score:4, Insightful)

    by xlsior ( 524145 ) on Monday May 07, 2007 @09:59PM (#19030829) Homepage
    ...None of us have ever seen alternate DNS-circumvention crapware layers like new.net running on Joe User's PC without their knowledge.

    For the vast majority of users, a new TLD like .bank will be nothing but a false sense of security.
  • by BobGregg ( 89162 ) on Monday May 07, 2007 @10:35PM (#19031141) Homepage
    THANK YOU. My very first thought on seeing this - gee, my credit union probably won't like the .bank domain so much, and neither would my brokerage.

    Re: having a special certificate class, there kind of already is - they're called Extended Validation certificates, from Verisign:

    http://www.verisign.com/ssl/ssl-information-center /faq/extended-validation-ssl-certificates.html [verisign.com]

    Supposed to turn the address bar in IE 7 (and upcoming Firefox releases) green. Not that it will matter much, they're still only ~ $2K, easily within reach of even casual phishers.
  • That's why the phisher's MyBank.exe installs a new certficate authority in your browser certificate store...
  • by glittalogik ( 837604 ) on Monday May 07, 2007 @10:57PM (#19031359)
    Whilst I agree with your appraisal of the admins, how is the problem not piss-poor end-users? If certificates 'worked', the bank should have been flooded with calls, and no one should have logged in without confirming the situation over the phone.
  • by xeoron ( 639412 ) on Monday May 07, 2007 @11:25PM (#19031591) Homepage
    The title says it all. A new top level domain won't stop this. Yes, there are browser extensions and features that can help detect such things or stop them, but again, how does a new domain play into all of this?
  • by FutureDomain ( 1073116 ) on Tuesday May 08, 2007 @12:04AM (#19031875)

    When you get a phishing eMail, go to the URL. Enter some information. Not valid information unless you are a fool. Enter bogus crap. It's fun, and if everyone did it just once a month the phishers would be so crapflooded with false information that it'd be nigh impossible for them to separate the crap from the valid information. Phishing won't be worth the time anymore.
    It would be even better if you had an automatic program that would do the work for you. It would submit bogus usernames and random passwords to drive the phishers crazy. I would call it "Dead Phish". Of course they could block any information from your IP if they figure out what you're doing, but the bogus information is still there for them to try unsuccessfully.
  • by syphoon ( 619506 ) on Tuesday May 08, 2007 @12:17AM (#19031953)

    That doesn't at all address the class of phishing scams that put up a fake copy of the site in question. Banks are usually the subject of such phishing attacks; throw up a copy of their site on a plausible-sounding URL, send out an email saying their account may have been compromised and they need to check, and when they enter their username and password you try the username and password at the real bank site, and make whatever transactions you want. That's the class that this TLD is aimed at preventing. Ideally I imagine the banks as a collective introducing it with public advertising campaigns to ensure the user looks for a .bank when they do their banking.

    Is it perfect? Foolproof? Not by any means. But it'd be a good step.

  • by hobo sapiens ( 893427 ) on Tuesday May 08, 2007 @12:31AM (#19032065) Journal
    I see your point, but someone will come up with ways around this. Even if its just the classic user@domain spoof or if its something more legitimate looking. This is not a "root of the problem" solution.

    You take away the profitability, then you've taken away the whole incentive for phishing. Schemes like this TLD thing are not cutting into the profits. It's just a more advanced "ignore them and they'll go away" strategy. That won't work here, since it only takes (SWAG alert) 1 in 1000 people to actually fall for it in order for it to be profitable. Crapflooding them will make sure they never find that 1 in 1000 who is credulous enough to give personal information to someone with a somewhat credible looking website.

    This whole TLD thing is more of the same old thinking, that we'll just make up more rules to prevent crime. We'll legislate morality. We'll make up unenforceable laws. Look where that's gotten us: check your spam folder if you have a yahoo or gmail account, and marvel at the sheer volume of scam spam. I maintain that in this case, the only effective way to fight these crooks is with some of their own medicine. Fight fire with fire.
  • by choseph ( 1024971 ) on Tuesday May 08, 2007 @02:27AM (#19032745)
    Everyone here is trying too hard. You could send a mail out saying
    "Please update your BankOfAmerica account at www.somerandomname.com"
    and some people would do it.
    Foolproof is a word only used by fools.

    You're never going to get past the education issue whenever you add something that requires the user to notice that something is wrong. Your solution needs to completely invade the privacy of the user and double guess their intentions to 'protect' them and we all know how that will look. Even with this, some people would probably throw their password into a blank page with a text form on it that says "enter your information to update your account"
  • by zcat_NZ ( 267672 ) <zcat@wired.net.nz> on Tuesday May 08, 2007 @02:57AM (#19032923) Homepage
    Boy are you missing the point...

    If this certificate had been invalid because of a DNS poisoning attack rather than an expired certificate, what do you think would have happened? Basically the same thing; 300-odd people would have handed their authentication details to the attackers and only one would have been suspicious enough to contact the bank.

    So tell me again how well SSL certificates work?

  • by rs232 ( 849320 ) on Tuesday May 08, 2007 @12:29PM (#19038333)
    We need to move on from the current DNS system which basically maps character strings to IP addresses. There still is no validity to the Domain name or the IP address. For instance if I was going to hack a bank or do a stock fraud, I would buy an ISP and run it legitimately for a long time. Then on the day pollute the DNS record and redirect them to my fake phishing site. Where they would give me their bank statements or act on fake stock info.

    The new DNS system would consist of the name + contact details + IP + a digital signature + a public key stored on a root DNS servers. When my computer sees a URL, www.bankofAmerica.com, it contacts the root server and downloads the sig, it also requests the same info from bankofAmerica.com. BOI, using local copys of the same info sends an encrypted msg using its private key. The client compares the two and if they match then bankofAmerica.com is legitimate and so is its IP address.

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...