Phishing for Credit 218
An anonymous reader writes "Two graduate students at Indiana University conducted a phishing study to
determine how readily students will give up personal information if
the phishing emails appear to come from close friends. Using only
publicly available
information, they sent out emails to students asking them to click a
link that required username/password information. Needless to say,
the study has generated lots of attention on campus. The student
newspaper has the story
and the researchers have created a blog where the participants can vent."
Dear Friend (Score:4, Funny)
Can you please click on this link [nzbest.com]?
Yours Truly Friendly,
Close Friend
Re:Dear Friend (Score:2)
Dear Fiends (Score:2)
Yours Truly Unfriendly,
Close Fiend
Re:No joke (Score:3, Insightful)
He makes this extremely good point some ways into the article. People are so gullilble. They're like Pavlov's dogs who salivate every time they see or hear the word "free", or come across anything that has some kind of "deal" attached to it. After the "I got something for free" rush wears off, the actual cost can be quite substantial.
I've managed to confound some people at a local spec
Re:No joke (Score:2)
And then there's the orthogonal cases, like if I were to make a link saying DO NOT CLICK HERE [zoy.org], Just like a sign saying "Do not look into this hole" or "Don't press that button".
Congrats on not taking their "deal/fidelity/loyalty card". I hate those things. Just lower the price. It's as bad as those stupid mail-in rebates.
Just watch (Score:5, Insightful)
Re:Just watch (Score:5, Insightful)
Seriously, whatever happens, guys sharp enough to organize a phish study couldn't see it coming?
Re:Just watch (Score:3, Insightful)
... in their defence, they could say that it should have been obvious - after all, their server wasn't located in the .ru tld.
Lesson # 1: Don't do phishing research in Amerika, because In Amerika, phishing does YOU!
Lesson # 2: If you're going to do the time, at least make it worth your while. Make sure you have a buyer for any info you get.
Lesson # 3: Remember to have a good agent for the TV movie and book d
Re:Just watch (Score:3, Insightful)
Re:Just watch (Score:2)
Re:Just watch (Score:3, Insightful)
Re:Just watch (Score:2, Insightful)
Re:Just watch (Score:2)
Accordin
Re:Just watch (Score:3, Insightful)
If they wanted to protect themselves from possible legal hassle later, they could have just recorded how many click-throughs they got from the actual email. Then, they could have just had the actual web page at the address have something like "No, No, NO! Don't click on links asking you for your password!".
I don't know why eBay doesn't do this already. They could
Re:Just watch (Score:3, Funny)
Re:Just watch (Score:2)
I see their point, but... (Score:5, Insightful)
"I was frustrated that I was hearing from a friend that my e-mail account was sending her things," Shakespeare said. "I had no idea where it was coming from. I was irritated because I was concerned that my home system was being abused."
Shakespeare called University Information Technology Services, which said it could have been a virus and to not click on the link.
"I've spent a lot of time keeping my (computer) secured," Shakespeare said. "I feel kind of used that it was the University that was making my friends think I had opened up my system to viruses."
If that's really why they're concerned, well, maybe they'd be interested in knowing that the vast majority of virus/malware type things that send email in this fashion still don't originate from the computer of the person in question anyway...therefore, this whole rationale for worry is BS, since spoofed email can come from *anywhere*, and it's most often NOT your own computer.
And - make no mistake, I really do see their point - but the IT resources belong to the university, and neither the university nor the researchers uses the person's account or any password or other credentials belonging to the person. It was simply a spoofed "from" address; nothing more. And if it's strictly "legal" for any random person to spoof a from address, it's just as legal for the purposes of research, whose findings may provide some level of insight on *protecting* people from malicious phishing.
Now, I personally don't know whether any of this justifies doing the study in the way they did. That's a judgment call. If the university's IT organization proper is doing it, that's one thing, and I could see people being uncomfortable with the motivations. But grad students? I don't see any problem with that at all. In fact, they don't need anyone's permission to do what they did. However, in good faith, they did get the approval of the Human Subjects Committee.
Re:I see their point, but... (Score:2, Insightful)
Re:I see their point, but... (Score:2, Insightful)
And - make no mistake, I really do see their point - but the IT resources belong to the university, and neither the university nor
Answer (Score:2)
Re:I see their point, but... (Score:3, Informative)
Re:I see their point, but... (Score:2, Funny)
Re:I see their point, but... (Score:3, Informative)
You have places like http://www.spooftel.com/ [spooftel.com] and http://www.covertcall.com/ [covertcall.com] (tons more can be found by googling) that easily allow this (caveat, I haven't actually TRIED any of the above, they may be completely bogus).
-- Gary F.
Re:I see their point, but... (Score:5, Interesting)
Re:I see their point, but... (Score:2)
George.W.Bush@whitehouse.gov
Spoofing on Campus... (Score:2)
Re:I see their point, but... (Score:2)
I am George W. Bush, and I approved this message...
Re:I see their point, but... (Score:2, Informative)
Actually, grad students are just as subject to IRB (Institute Research Board) human subjects approval as faculty. Any research involving human subjects and that is intended to ever be published must obtain IRB approval prior to conducting the research.
As part of the IRB approval process, there are
Your slashdot session has expired (Score:4, Funny)
Nickname:
Password:
Re:Your slashdot session has expired (Score:4, Funny)
passw.....wait a second!
DAMN YOU!
Re:Your slashdot session has expired (Score:2)
Re:Your slashdot session has expired (Score:3, Funny)
Password: Freely
Re:Your slashdot session has expired (Score:3, Funny)
<Cthon98> hey, if you type in your pw, it will show as stars
<Cthon98> ********* see!
<AzureDiamond> hunter2
<AzureDiamond> doesnt look like stars to me
<Cthon98> <AzureDiamond> *******
<Cthon98> thats what I see
<AzureDiamond> oh, really?
<Cthon98> Absolutely
<AzureDiamond> you can go hunter2 my hunter2-ing hunter2
<AzureDiamond> haha, does that look funny to you?
<Cthon98> lol, yes. See, when YOU type hunter2, it shows to
Re:Your slashdot session has expired (Score:2)
> "hunter2" and not asterixing?
See, it's funny because Cthon98 tricked AzureDiamond into giving up their password.
> It's clearly a fabricated quote
Like 99% of the quotations on bash.org aren't made up.
Re:Your slashdot session has expired (Score:3, Funny)
Password: ********
Re:Your slashdot session has expired (Score:2)
That is MY password!
I always use asterisk's for my password, so easy to remember.... ooopps!
Re:Your slashdot session has expired (Score:2)
Re:Your slashdot session has expired (Score:3)
Password: None Needed
Re:Your slashdot session has expired (Score:2)
Nickname: Anonymous Coward
Password: *********
forged headers (Score:5, Informative)
Spam can come from anyone - its not too hard to forge the "FROM" line on an email. I'd hardly call it abuse of your account when spammers do it all the time.
Re:forged headers (Score:2)
RTFA.... (Score:5, Informative)
... to find that they did this experiment under the oversight of the university's Human Subjects Committee.
If that doesn't sound like some sort of ethical guidelines I don't know what does.
Re:forged headers (Score:2)
It was cleared by the research ethics body.
Re:forged headers (Score:2)
From the link:
First off, Marcus didn't just up and decide to do the experiment. He got a green light from the human subjects committee here on campus to perform the experiment; a body of people whose job it is to say what is and is not ethical in experimentation. The fact of the matter is that there was no harm done and this experiment IS ETHICAL. Anyone whose tried to
I would imagine.. (Score:2, Insightful)
Re:I would imagine.. (Score:2)
Except that they're now posing as students doing research because they were caught phishing for information.
Next time you break into a bank and get caught while inside the vault just tell the cops you were testing the security system without the banks knowledge, but intended to give a full report later on.
Re:I would imagine.. (Score:4, Funny)
So, they magically went back in time to get approval from the ethics committee after getting caught? Shit -- fuck the write-up on the phishing -- describe the time machine!
Re:I would imagine.. (Score:2)
Just remember to get authorization from said police before you do it. That's what these folks did.
Re:I would imagine.. (Score:2, Funny)
Heh (Score:5, Funny)
This would make a nice change from the usual celebrity-in-trouble "apologies", where they go on the Tonight Show, bite their lips and look downcast and assure us "I'm very, deeply, truly sorry..."
Instead we can get, "Jay, I have created a blog where people can vent."
Study extension (Score:5, Funny)
After such a successful research on phishing, our two friends have decided to tackle a new study: test how much load e-commerce sites can handle, and how much money ATMs can usually deliver on any given day.
well (Score:2, Funny)
You would think... (Score:2, Insightful)
a license? (Score:2, Insightful)
Well done... (Score:5, Insightful)
Ethics (Score:4, Insightful)
My two reasons why I think it couldnt have been done any other way.
1. This study focuses on deception and how people react when they are decived.
2. Telling the participants they were a part of a study or asking them to be part of it, would effect the behavior of the participants and therefore changing the study results.
As long as the information was not used in any illegal way. Then I don't find a problem with how this expirement was conducted. Yes it sucks to get phished, but its better to be fished by these guys than the hundreds of other phishers who are out there to turn phising into finacial gain.
Facebook. (Score:2)
In other news (Score:3, Funny)
Oh the brainsss! (Score:3, Funny)
Someone posted that on the blog. I think he/she should feel foolish rather than feel betrayed. Or that should be read as "I am so fucking dumb that i cannot believe i did what i did".
Re:Oh the brainsss! (Score:5, Insightful)
That could easily be said for other experiments that have been challenged on ethical grounds. Sometimes experiments find things about ourselves we'd rather not know.
For example, the Milgram experiement [wikipedia.org], where participants were mildly coerced by an authoritative person to administer strong electrical shocks to a subject (who was really an actor). A high proportion of the participants were willing to administer levels of shock that they believed to be lethal.
Would you like to know that you would be capable of murder as long as someone else was there to take the responsibility/blame? Even if the person in the quoted blog post should feel foolish, that does not make the experiment ethical and non-offensive - quite the opposite.
study successful (Score:4, Interesting)
Welcome to the internet; trust no one. I hope more people got the message.
reportphishing@antiphishing.org (Score:3, Informative)
reportphishing@antiphishing.org
( from http://www.antiphishing.org/report_phishing.html )
Erg. I'd love to see... (Score:2, Interesting)
the IRB Human Subjects form. This was a deception study, clearly. The fact that this was so is fine, but running things like this past IRB requires a strict and rigid understanding between the PIs and the IRB. Also, AFAIK, provisions must be made for "repairing" anyone who is damaged by the research - even if it is incidental (e.g. your research was only "the last straw").
I'd like to see the IRB to determine how things are done at IU. Without seeing the form, I really cannot comment on weather what wa
Re:Erg. I'd love to see... (Score:2)
D'oh - yup, they were filled out:
(from http://www.idsnews.com/subsite/story.php?id=29400)
I still wonder, though, how they (Human Subjects Committee) provisioned for possible fall-out.
Re:RTFA (Score:2)
Any college age person who is fooled by an email o (Score:3, Funny)
I'm from Indiana (Score:4, Insightful)
Unethical? Possibly -- in the current "enlightened" academic environment where definition of terms is often left to whom screams loudest I suppose that one or more of these embarrassed campus inhabitants has enough functioning brain cells to come up with a completely irrelevant but intensely self-referrential definition which supports their childish outrage. It's highly delusional but they're obviously still children and I don't suppose we can expect actual coherent thought from them until they grow up.
Invasion of privacy"? Drugs must be a significant problem at IU. It always was known as a party school, and this is just more evidence that the description contains some accuracy. And to think that these students are often described as the "best and brightest" and the next generation of leaders. Kinda provides some background for current events, doesn't it?
Rb
What to offended whiners think about Viruses??? (Score:4, Insightful)
It seems their primary complaint is that, GASP, "evil" email looked like it was coming from people they know. WAKE THE HELL UP PEOPLE!!! All the Slammer and Melissa viruses (and their mutated children) DO THE SAME THING: they scan through the address books of their victims, rewrite the "From" line to be one name in the address book, and then write the "To" line to be you (whose name is also in the address book) -- and then there's a good chance that you'll then know the person's name in the "From" line, which (it is hoped) makes you let your guard down and open the infected attachment.
I'll bet $1028 that 90% of the whiners there have been infected by these viruses in the past, and probably still are. And now they've been fooled a second time the same way. How does that old expression go again?
When I find some sympathy these whiners, I'll let them know...
Angry students (Score:2, Insightful)
Moral of the day: If you're going to emulate something evil in a research context you get the damn permission and cover your arse first
Sneaky Solution: Slip an agreement into the campus network AUP that lets the "IT security office" carry out 'various
"How to improve your phishing attack" (Score:3, Interesting)
The only thing that really bothers me is that they've essentially shown phishers how to dramatically [indiana.edu] improve their results :
Er... this is sorta like doing research on how to make a better bomb, buddy. This is not socially responsible computer science research, is it? I'd be more interested in determining out how to create a social networking site ( like whatever this "facebook" thing is ) that _can't_ be exploited in such a manner. That sounds like a more productive and useful exercise, and one less likely to get everyone pissed off at you for showing them to be gullible. 70% is a lot, even if that's just an estimate.
Re:"How to improve your phishing attack" (Score:2)
So if we shut our eyes and stick our fingers in our ears, Everything Will Be Okay?
I'd be more interested in determining out how to create a social networking site ( like whatever this "facebook" thing is ) that _can't_ be exploited in such a manner.
How would anybody have known about this exploit if nobody has studied it? To use your bomb analogy, how could we
Re:"How to improve your phishing attack" (Score:2)
Just because some hypothetical "we" doesn't want to build one doesn't mean the enemy won't. Similarly in this case, do you think that if academics don't do the research, the Bad Guys will never figure it out?
Social Utility of the study (Score:2)
more forthcoming? (Score:2)
Ahh yes, we all know this study would have worked had it had the disclaimer "This is only a test"
Detecting idiocy (Score:2)
I think the study was worthwhile but could have been conducted better.
1. They might have obtained permission from the students whose identities were used in the from addresses, so that if the students who received the emails called and asked W
Too easy? (Score:5, Funny)
Dear concerned student:
I am a close friend writing to you about your recent experience with a phishing study in which deception was used. I have met with an attorney on this issue who is interested in pursuing a class action lawsuit on behalf of the victims of this study. To participate, please click the link below and provide the following personal information...
Story from an IU employee (Score:4, Interesting)
Thursday, one of my co-workers at the IU campus helpdesk got the email and dismissed it after telling us it might be a potential source of many irate callers later on in the day.
And so it was. I got a caller to send us the full headers of the message that appeared to be from his girlfriend. What do you know? The headers clearly showed the message was originating from whuffo@iu.edu!
So, with our limited helpdesk lookup tools, I found that whuffo@iu.edu was indeed a valid e-mail account, but it was registered as a departmental account and we could not see who personally created the account.
I wanted to get to the bottom of this so I went ahead and looked at the link in the email that it wants users to click on. What do you know? It redirects to a site called www.whuffo.com before asking for the user's credentials!
While my co-workers were bitching about it, I decided to do some detective work (Not sure why my co-workers, normally very competent at problem solving skills, didn't think of this). I looked up the whois info on whuffo.com and what do you know? The domain is registered to Professor Markus Jakobssen, of the IU Informatics Department!
So who's this Markus guy? I found his IU websites. And one of his research interests is 'phishing.' Hmmm. I take a look at the upper level classes he teaches. What do you know? His powerpoint lecture for I400 for this week is all about HOW TO PULL OFF A PHISHING SCAM. Wow, what's the connection here?
Meanwhile, the helpdesk had made this an escalated incident and turned it over to the IT security office. We get a message back (from Tom Jagatic of the IT policy office) saying they are "mitigating the effects of the issue." I had to go look up mitigating in the dictionary before I realized this wasn't a typical response from ITSO. Normally they'd jump on something like this and put a stop to the emails right away.
Giving ITSO the benefit of the doubt, I decide to use my new clues on who might be doing this. With this information in hand, I shot off an e-mail to Tom J. and ITSO and the whole rest of the day, I get no response at all. We continue taking calls from confused users and ask them all to change their passwords as it's all we can really tell them to do at this point.
I go home and check all fucking weekend, and believe me I was watching all our e-mail accounts like a hawk. No response from Tom Jagatic or the IT security office.
So on Monday I'm back at work and I check my mail to find that the whole scam has been put out in the open. In our email there were copies of several mass-emailed apologies to the users who got the phishy message, the users whose identities were spoofed, and to the support center and helpdesk staff. All these messages contained was an explanation of the "experiment" (which you can read in any news story about it) and their "sincere apologies."
The rest is history. The blog that Tom and Markus setup, where people are commenting, has got lots of angry people angry at themselves for being duped. That's not why I'm angry.
All I want from Tom and ITSO is an actual sincere apology for all the work and extra detective skills I/we put into trying to find the perpetrator, since at the time we weren't in on their little plan. No one seems to understand that in any other circumstance, if this were a real security threat, we'd all be getting pats on the back and compliments for figuring out who was behind it before ITSO did (as that's their job, normally.) But, no, since Tom, Markus, ITPO, and ITSO were all in on it, we just get a 'mitigated' effort at an apology from those guys.
Isn't this illegal? (Score:2)
I don't *know* that, but I've heard people moan about the bureaucratic requirements for doing research involving human subjects in the past.
Re:Isn't this illegal? (Score:2)
Oh, heh... an answer to my question, brought by the magic of RTFA. :-)
Because of the ethical issues associated with deception, Jagatic and Johnson had to obtain permission from the Human Subjects Committee, which approves experiments on campus that involve humans and ensures studies are ethical and do not violate participants' privacy.
Reverse Phishing (Score:2)
Some of you may recall that Redhat made a "Friends & Family" offer for 100 IPO shares to each person listed in the credits section of the linux kernel README file.
Apparently, anyone residing outside of the USA was not elligible for this offer. So, an enterprising (devious?) fellow went through the list of foreign email addresses in the credits file that were dead - i.e. bouncing any incoming message and impersonated them with freemail accounts
Re:5 bucks says... (Score:2, Informative)
Re:How legal is this... my spin on it all (Score:3, Insightful)
What was stolen? Ignorance & naivete (Score:3, Insightful)
Something was stolen from the unwitting student/participants. They lost their ignorance of the sad state of the internet's infrastructure. This "experiment" created a harsh wake-up call that e-mail is not a trustworthy medium.
SMTP was never designed for an open environment with untrustworthy users. It was designed for collegial academic networks with funding from people that run closed military networks.
W
Re:How legal is this... my spin on it all (Score:2)
Re:How legal is this... my spin on it all (Score:2)
This was not commercial spam.
Re:How legal is this... my spin on it all (Score:2, Insightful)
Except there's a large line between giving someone chemicals that could very easily be toxic, or at least cause significant health problems, and seeing if people will input private data that the study authors won't use anyway.
And disciplining the professor or the students in this instance is absolutely insane. The entire point of having an "Human Subjects Committee" oversight board is to allow the universi
Re:How legal is this... my spin on it all (Score:2)
I mean really, if you have a new drug that you want to test on Humans, and the FDA approves the trial, who is at fault if there are some negative consequences? This assumes that you did not lie to get the approval.
Re:Shakespeare? (Score:2)
Alack, 'tis he: why, he was met even now
As mad as the vex'd sea; singing aloud
Hey (Score:2, Funny)
Oh wait.
Re:Heh (Score:2)
Well, I think it would be a perfectly reasonable defense, since you have in your hand the signed permission from the ethics committee.
Re:Heh (Score:2)
Actually they did. (from an IU employee) (Score:3, Interesting)
Re:Actually they did. (from an IU employee) (Score:2)
I'd feel sorrier for you if you had the technical skills to insert line breaks into your story.
My eyes hurt now %)
Re:The More Attention This Gets, The Better (Score:5, Informative)
That's precisely what they did. The whole thing was authorized from top to bottom. They even got the okay from campus IT to "abuse" the computer systems for their purposes. Try RTFA sometime.
Re:The More Attention This Gets, The Better (Score:2)
You obviously didn't rtfa. they did have explicit approval.
Re:shades of Randal Schwarz at Intel (Score:2, Informative)
Re:Discpline?! (Score:2)
You could argue that it's hard to do a phishing study with people who know what they signed up for, but that is fundamentally _your_ problem, not the participant's.
It might be their school has no such prohibition on nonconsentual study participation, but it's pretty clear that if it does (and I think most schools do), they did, in fac
Re:Harm was still done (Score:2, Insightful)
Re:Harm was still done (Score:2)
Re:Harm was still done (Score:2)