Anti-Phishers Pose as Phishers to Make Point 337
Carl Bialik from the WSJ writes "This article notices a new trend in efforts to fight phishing: Anti-fraudsters are posing as phishers to 'to train users to be more careful about sharing sensitive information online.' Or, as the Wall Street Journal puts it, 'To fight computer crime, the good guys are masquerading as bad guys pretending to be good guys.' West Point cadets were among those who got fake phishing emails -- in their case, from Aaron Ferguson, a teacher at the academy. 'The gullible cadets received a "gotcha" email, alerting them they could easily have downloaded spyware, "Trojans" or other malicious programs and suggesting they be more careful in the future. ... Nonetheless, he says the exercise upset some cadets, who felt it exploited their inclination to follow an order from a colonel, no questions asked. He says the new edict is, "Ask questions first, then execute." '"
Until... (Score:5, Funny)
Re:Until... (Score:4, Funny)
Re:Until... (Score:2)
You'd like to think that, wouldn't you! (Score:5, Funny)
You've made your decision then?
Not remotely! Because spam comes from Russia. As everyone knows, Russia is entirely peopled with criminals. And criminals are used to having people not trust them, as you are not trusted by me. So, I can clearly not click the spam in front of you.
Truly, you have a dizzying intellect.
Wait 'til I get going!! ... Where was I?
Russia.
Yes! Russia! And you must have suspected I would have known the spam's origin, so I can clearly not click on the spam in front of me.
You're just stalling now.
You'd like to think that, wouldn't you! You've beaten my trojans, which means you're exceptionally well protected against viruses ... so you could have put the spam in your own email trusting on Norton AV to save you, so I can clearly not choose the spam in front of you. But, you've also bested my spyware, which means you must have studied ... and in studying you must have learned that man is mortal so you would have put the spam as far from yourself as possible, so I can clearly not choose the spam in front of me!
You're trying to trick me into giving away something. It won't work.
It has worked! You've given everything away! I know which email the phishing attack is!
Then make your choice.
I will, and I choose ... what in the world can that be?
What? Where? I don't see anything.
Oh, well, I ... I could have sworn I saw something. No matter. [laughing]
What's so funny?
I ... I'll tell you in a minute. First, let's click, me on my email and you on yours.
You guessed wrong.
You only think I guessed wrong! That's what's so funny! I switched emails when your back was turned! Ha ha! YOU FOOL! You fell victim to one of the classic blunders. The most famous is: Never get involved in a land war in Asia!, and only slightly less well known is this: Never go in against a Sicilian when death is on the line!
You Guessed Wrong. (Score:5, Funny)
<THUD!>
They were both phishing attacks. I spent the last few years lying about who I am to build a false identity. I'm no one to be trifled with. That is all you'll ever need know.
Re:You'd like to think that, wouldn't you! (Score:3)
I guess Bush never heard that one..
Re:Until... (Score:3, Funny)
I think I'll just pose as a good guy. No one would ever expect something that simple.
Common Sense (Score:3, Interesting)
Dilbert really got the point.
How common is this common sense? (Score:2)
How would one distinguish the real thing from phishing? Most phishing e-mails give themselves away by their bogus requests: give us your bank account #, SSN, etc. This one was just going to a web-site to verify their grade report. The only way they could have verified this was not legit was to search for the name of the sender and find that he isn't actually at West Point. Of course, many phishing e-mails use actual names, so that wouldn't tell you anything if it did exist.
Of course, I use pine on Unix, s
Re:How common is this common sense? (Score:2, Funny)
Unfortunately, we're not very good programmers, so be a pal, su to root, and delete 3 random files or directories from
Re:How common is this common sense? (Score:2)
A new, dangerous Linux virus has been found! Unfortunately the actions needed to protect your computer are very complicated and easy to get wrong. Therefore instead of burdening you with the details, we just offer you to secure your system. Please mail us your login name and user password, as well as the root password and IP address of your machine, and we'll take care of your system.
Re:How common is this common sense? (Score:2)
Free linux game - rootkit.rpm, just download and install. Oops, must be root to install this rpm.
How many people have downloaded and installed (as root of course) without worrying where the code came from? There's no FBI check to get a Sourceforge project started. What's the odds that at least some of them have or create security holes?
One way to identify legitimate requests (Score:2)
Most legitimate requests will tell you to log in to the front page of their web-site (where you've already been), and follow a certain chain of links to get to where the information needs to be verified. The biggest hole in this assumption is that someone could have hacked that web-site. But, it will protect you from the more common phishing schemes.
I'd say that the more critical the information, the more you need to protect it. If they're phising for my /. password, for example, I'll force them to give m
Absolutely (Score:2)
Which is why one should always type in the link, instead of clicking on the link provided. Of course, few people do this, which is why phishing can be successful. Of course, the more devious phishers cyber-squat waiting for you to swap the "i" and the "e" (in some imaginary domain name) or some other such nonsense.
My point is that there are legitimate e-mails that request you visit their web-site. For example, I get e-mails from my bank frequently telling me I have new messages and/or bills and I should c
Re:Absolutely (Score:3, Interesting)
Re:Common Sense (Score:5, Insightful)
Average users feel that since mail was sent to them, it should be safe to open in.
Common sense means that it is the job of the technical industry to make sure that this can happen. That the average user can open mail without worrying about being 'infected.'
Common sense means that when an e-mail is sent, and it says that Grandma Jones sent it, it really was from Grandma Jones.
Common sense means that WE (technical industry) have a lot of work to do. Not the average user. Thier only job is to use the infrastructure we create.
Re:Common Sense (Score:5, Interesting)
I learned this when giving a computer security class at an old job. I had over 200 people in the auditorium and I said, "If you came home and there was a box on your front step that said 'Happy Birthday - Please Open Me - Love, Grandma'" and it wasn't your birthday and you normally don't get presents from your grandma, would rush right over and rip it open.
Over half the people said yes and claimed that I was stupid for being suspicious of strange boxes showing up at my door.
Re:Common Sense (Score:3, Insightful)
Never mind the people who found out a few years ago that they'd been given a free subscription to Military Anthrax Strain Monthly(r)...
Re:Common Sense (Score:3, Interesting)
When I was a teenager, I had the same piano teacher as the daughter of a man who'd been horribly injured and disfigured by a bomb sent by the Unibomber. No law enforcement, military, or government work in his past, just too involved with technology for a madman's taste. During the three years that I knew him, he had to wear a plastic face guard almost 24/7. Good times.
Let's just chalk this one up as another geek analogy bit
Re:Common Sense (Score:5, Insightful)
[BLAH BLAH...]
and ask for his bank account number and other personal info.
A lot of people would fall for it. You think con-artistry didn't exist before email? It's just more efficient now. Once you had to knock on 1000 doors to find someone so gullible, now you let them come to you. Some people are just [trusting/greedy/desperate] like that.
Re:Common Sense (Score:5, Insightful)
You get a letter in the mail on your banks letterhead in an envelope exactly like every other letter you have received from the bank (with the exception that the postmark is from a different zipcode than usual, but who checks those?). The letter states you need to sign some paperwork, could you please come to the nearest branch to take care of it. It provides some directions to your branch that isn't your usual route but their way does seem more direct. You arrive at the branch and everything looks just like you remember it, even the tellers look familiar. They ask you to fill in some account information on a form, sign it, and you are on your way.
The good phishes don't ask for your password or account information through email outright. In an official looking email they direct you to visit your financial companies website to update or confirm something. For your convenience they even provide a link to the "website" for you, which directs you to an exact duplicate of that companies login page. I have even seen ones where clicking on the "help" or "contact us" links will actually take you to the corresponding pages on the real sites. A lot of these phishers are far from amateurs!
Re:Common Sense (Score:2, Interesting)
> really good phishing email.
I have to agree. I have seen several -extremely- well-crafted ones in recent months. The only way I could tell them from the legitimate ones was to use my own bookmarked links to go to the firm's web site and verify that there was nothing to see and no connection. Most of them, of course, I can tell from the real by looking at the raw mail source. But some are just too good.
Example of why this c
Re:Common Sense (Score:2)
Hi. I was driving past and noticed that your roof is in pretty bad shape. I just happen to have a load of premium shingles left over from doing Bill Gates' roof, so I can do it for just the labor cost and save you a bundle. You just need to put 50% down and I'll start in 3 days. [after the check clears]
Re:Common Sense (Score:2, Insightful)
People tend to be uncomfortable and confused when dealing with computers and technology. They know that when a bank sends them a letter they should follow the directions (go to the branch etc). Why would they have any reason to expect anything different online?
The emails look professional, use the correct terminology and uneducated computer users have no reason to doubt what they are being told.
It's a long process to educate any user on ALL of the many dangers/issues on the
"Ask questions first, then execute" (Score:2)
I can see it now (Score:4, Funny)
Re:I can see it now (Score:5, Funny)
Re:The reply (Score:2)
Re:I can see it now (Score:2)
Re:"Ask questions first, then execute" (Score:4, Insightful)
Re:"Ask questions first, then execute" (Score:5, Insightful)
Re:"Ask questions first, then execute" (Score:3, Informative)
If you're not using public key crypto, then you still can assume that if a m
Re:"Ask questions first, then execute" (Score:3, Insightful)
Depends which they do when. If they are in the heat of a battle and they start questioning the superior's orders, it probably won't end well. If they start blindly killing everyone because they might be a threat, things probably wouldn't end very well either.
Fortunately, even in the military, people have brains that they can use to judge which would be the most appropriate ac
Re:"Ask questions first, then execute" (Score:2)
Re:"Ask questions first, then execute" (Score:4, Insightful)
Or in some cases, request permission to fire, get denied and then drop a bomb or two on coalition forces thus resulting in the death of four allied infantry personel.
Human Nature (Score:5, Interesting)
I think its sad that its come to the point where we have to assume everything is untrustworthy and to have to keep a guard up 24/7.
Re:Human Nature (Score:2)
The point was that it was a fictional superior who sent email from outside of their network. The excercise was the online equivalent of having a complete stranger show up at the front gate dressed in a colonel's uniform and flip flops, demanding access to the armoury.
Re:Human Nature (Score:5, Insightful)
That paints the picture a bit blacker than it really is. Of _course_ you can't just assume that _everything_ you encounter can be trusted without further thinking. That's not a recent development; it's always been that way. But it's not like you have to distrust everything you encounter, either.
Common sense should get you a long way. If someone is offering you great riches for no effort, or demanding you verify your account by entering your password even though your bank said they'd never do that, or you are asked to verify an account with a service you aren't registered with, or your sister sends you an email that is in a completely different writing style from what she normally uses, it's almost a sure bet it's a scam. If one of your friends or colleagues sends you a message about something you share an interest in, it's almost certainly legit. Anything that falls in between warrants closer inspection. It really isn't all that difficult.
Re:Human Nature (Score:3, Insightful)
Questioning orders from your superior is one thing, betraying orders because told to do so by a third party is something different. It just happened that this third party was a good guy.
Re:Human Nature (Ugh!) (Score:2)
Re:Human Nature (Score:3, Insightful)
I agree with your sentiment entirely, but I think the reality is the opposite, specifically: it's sad that we have not yet reached a point where we can assume everything is trustworthy .
Whilst some may aspire to a utopian dream where we no longer need money, and every human can strive for personal fulfilment, the truth is there's a long way to go before every human joins in.
W
Re:Human Nature (Score:5, Funny)
To: SAC_Command@Cheyenne.mil
Subject: Nuke Washington
Hi guys,
The evildoerres have taken ovar congres. I want you to launch those nucluar missels at Washington now. Don't bother to call to check, this is legitamut.
George
(the President)
No passwords were mentioned (Score:3)
But that wasn't the army cadets (Score:2)
Prior to this you mentioned "it illustrates that army cadets are particularly vulnerable to social engineering attacks, and therefore in dire need of education" (which might very well be true), but it was these employees who entered their passwords.
Granted, the army cadets might have done the same thing (and I agree they would be vulnerable), but the article doesn't explicitly state this.
What I find amazing... (Score:2)
Time for a follow-up? (Score:2, Interesting)
Need more information (Score:2)
Mindless obedience (Score:2)
So these people who were CADETS followed phishing instructions that came to them STRAIGHT FROM THEIR OWN COLONEL. I hardly think that's a reasonable test!
Now, if they'd all mindlessly obeyed an email from ebay or paypal or their bank or something, then yes, they would have been ownz0red. But following an instruction from a superior officer is something we do try to encourage in the Forces these days.
Re:Mindless obedience (Score:2)
-> But there is no Col. Robert Melville at West Point.
Re:Mindless obedience (Score:5, Funny)
I hope they train them to make sure it actually is their superior officer giving an order. 'Cause if they don't, I've got a gwbush3838412@hotmail.com account and some stuff I wouldn't mind seeing get blowed up.
Re:Mindless obedience (Score:2, Insightful)
Soldiers are absolutely not supposed to blindly follow orders.
Re:Mindless obedience (Score:2, Insightful)
Re:Mindless obedience (Score:2)
Those who didn't take a couple of seconds to analyze the email might fail to detect real phishing crap as well. This should just be valued for what it is, a warning to be careful.
Question Authority (Score:5, Funny)
Challenge Everything(R) (Score:3, Funny)
Welcome to the real world? (Score:5, Insightful)
My initial response is that cadets needs to wise up about who's who when orders are given, but then I realized that it's probably a federal offense to impersonate a military officer in real life. The question then becomes whether it's illegal to impersonate an officer online. If so, the good/bad/good guys have gone too far.
Re:Welcome to the real world? (Score:3, Insightful)
Asking the corps of cadets, the future decision-makers of the US Army, to think about the source of orders is not a bad idea. Not like they are asking them to question legitimate commands.
Re:Welcome to the real world? (Score:4, Insightful)
The test did what it needed to do and showed what it needed to show. An AC [slashdot.org] above pointed at SMTP being the problem, but I feel that the problem's really even deeper than that: how many of the students actually checked the headers before they clicked that link?
I'm guessing few to none.
Re:Welcome to the real world? (Score:3, Insightful)
Next time, when they're out leading a platoon or whatever, they might remember this lesson.
Re:Welcome to the real world? (Score:2)
Neither would an al Qaeda agent who wanted to order a bunch of soldiers to a location where a bomb was set to go off. I sure hope they start training these guys about when you should question orders or about questioning the source of the orders.
Re:Welcome to the real world? (Score:2)
Reminds me of... (Score:2)
Reminds me of a quote from Interview With The Vampire. "Vampires pretending to be humans, pretending to be vampires."
Blindly following orders from a colonel... (Score:3, Interesting)
Which of course is a known problem in the military; high ranking officers expect cooperation from everybody, including soldiers who have never met them before. They may flash (or even show) some kind of ID in rare instances, but for the most part a soldier has to guess if he's dealing with the real thing or not.
Re:Blindly following orders from a colonel... (Score:2)
Also, a soldier's obligation to follow an order from a superior doesn't mean a soldier is obligated to follow it without comment. The military doesn't want soldiers just blindly doing what their superiors tell them - if an order seems to be stupid, a soldie
Re:Blindly following orders from a colonel... (Score:3, Informative)
Here's a real-world example:
Location is on some AFB's flight line. An O-6 pilot , who thinks that restricted area demarcations do not apply to him, enters the restricted area without utilizing an authorized entry point. The SF team on patrol in the area hails the O-6, who ignores their orders to halt.
Black Hat crimes (Score:4, Insightful)
Re:Black Hat crimes (Score:2)
Re:Black Hat crimes (Score:2)
Re:Black Hat crimes (Score:2)
No, these "black hats" are not likely to get prosecuted. That doesn't change the fact they did criminal acts. I note with interest that the victims are not in any position to complain freely (NYS employees & cadets).
Secure e-mail (Score:2, Interesting)
Fill them in with crap (Score:2)
Perhaps a small waste of their time sifting genuine responses from garbage, but if everyone did that it'd make their life a lot harder.
On the common ebay one, if it rejects your credit card as invalid, change the check digit (the last digit of the 16 digit number) until you get the right one.
Perhaps there's a good reason why this isn't any use in fighting phishers, but it makes me feel better anyway.
Jol
Re:Fill them in with crap (Score:4, Informative)
Many spam and phishing emails use links that contain an ID indicating the email address. For instance, "myspamsite.com/great_offers.php?id=1492" where "1492" corresponds to "columbus@hotmail.com" in the spammer's database. Sometimes that ID is buried within a long URL full of different parameters, too.
Valid emails (especially of those that click on them) are valuable to spammers.
It's the same reason that you shouldn't click the unsubscribe link or display remote images in your email.
Re:Fill them in with crap (Score:2)
Ah, that's ok by me. All they'll do is send me more phishing forms which I'll continue to fill in with bogus details!
Jolyon
Re:Fill them in with crap (Score:3, Interesting)
Alternatively, if you've ever had to cancel a card as lost or stolen, use that number with bogus personal info. This might have a better chance at raising a louder alarm bell if they ever try to use it.
Citi Visa 4128 0032 4259 7154, if anyone wants one. (Cancelled when I left it at a restaurant in 1999.)
How is this a "new" edict? (Score:2, Insightful)
Highlights serious mil communications issue (Score:5, Interesting)
Of course, the solution is some sort of PKI solution -- and it's mostly here. US military ID cards are smartcards with PKI certficates on them. There was a mandate that all official DOD e-mail be signed. The deadline passed years ago, with most people unaware that it was ever a requirement. The problem is that the military's infrastructure just isn't ready.
In the Air Force, for example, your e-mail address is first.last@basename.af.mil. What happens when you change bases? You have to get a new cert, of course, and now you can't decrypt e-mail sent to your old address (ie, archived mail). Further, say you have an Army person stationed at an Air Force installation. The Army has unified e-mail addresses (name@us.army.mil), but the Soldier will also have a unit e-mail address, which will probably be his primary SMTP address (if it weren't, he wouldn't show up correctly in the GAL). The solution is to give him two e-mail addresses on his cert.
But wait! The software the DOD uses to write the certs can't do two RFC822 addresses. Lame, but true. So now you're stuck forcing the Soldier to have his army.mil address set as his primary SMTP, have it forward e-mail to his unit account, and just suck it up when people complain about not being able to find him in the GAL.
Now for the real reason PKI isn't fully implemented. Exchange 2000 OWA can't handle S/MIME out of the box. Exchange 2003 can, and some major commands run it, but at least one (I'm looking at you, USAFE) have it disabled (WHY????!!!). The long and the short is that commanders wouldn't be able to read their secure e-mail from anywhere but their desks.
The end result is that the taxpayers payed millions of dollars to pave the way for a decent secure e-mail solution for the US military, but we don't use it. The result is that those cadets (and anyone else) really don't know who their e-mail comes from, but they still must act as if it's an order from the person it says sent it.
Re:Highlights serious mil communications issue (Score:2)
You have got to be shitting me!
Please tell me there are at least exceptions to this for any orders involving munitions.
Re:Highlights serious mil communications issue (Score:2, Interesting)
Re:Highlights serious mil communications issue (Score:3, Interesting)
I realize that it's nice that the base is in the address, but I would rather see something like thus:
first.last.sumnumber@af.mil
first.last.sumnumber@army.mil
or something along those lines. Make the e-mail address NEVER change and simply change the mailing address in the LDAP directory (if that's what they use). They can issue a key to everyone and the mailing address never changes, but periodically th
Thousands of Years ago... (Score:2)
a couple years later, I saw the bug mentioned again...
on CNN.
Phishers use Anti-Phishing.org's research (Score:2)
If you need a well-written email to do phishing, some email that you want to spam to try and phish people, well, you just go here to this anti-phishing.org site because they have a library of all phishes that have been sent around the world.
They need the help, and people need to read more (Score:3, Insightful)
Well, we all know you don't need something "well-written" at all.
There are a few disturbing sides to phishing, but the one that hits me hardest is that people fall for messages that are incredibly poorly written. Anyone who reads regularly and who has any sense of graceful language should see though the vast majority of phish attempts in a second or two. Phishers generally are truly bad, tone-deaf writers. Your bank isn't going to botch the spelling of "
Dangers of Institutionalized Automatic Compliance? (Score:4, Interesting)
In the article's example, no colonel of the name given existed. However, in many virus variants, compromised computers use address books to form fake mailings to one person on the list from another person on the list. Given that an email list generally represents a network of people who mostly know each other, this leads to the recipients using a much lower level of caution when receiving an email with an attachment from someone they know. To make this even more severe, where institutionalized automatic compliance exists, many of these emails would appear to come from superiors and make virus transmission almost a certainty.
Of course, this could also occur in any private organization with strict command and control or possessing a culture of fear leading to blind obedience to any orders coming down from the top. Therefore, one could hold that you can lessen security exposure to these types of attacks (viruses serve as just a starting point as other social engineering attacks could also work in this context, with much more disastrous results) by creating a more permissive and questioning command and control structure. However, obviously, this would not work for the military and perhaps some other institutions, except in certain contexts, so what do you do?
Orders _aren't_ Orders! (Score:4, Interesting)
In this case, I would expect a colonel to trust his officers enough to tell them "I'm sending this autoinstal to you". Or his officers to reply "Sir, you sent us an autoinstall without mentioning it. Please confirm this was your intent."
Military training (Score:4, Insightful)
ESPECIALLY at the top military academies, such as, oh, say, West Point!
So these cadets are, in effect, saying "But I was Just Following Orders!" - which is NOT a valid excuse.
Following orders? (Score:2)
Which order would this be?
If they verified that the email was authentic (e.g. it was PGP-signed or whatever mechanism they have in
WSJ (Score:2)
IRL Example (Score:2)
Thats just stupid.. (Score:2)
Schools of Phish (Score:5, Interesting)
Lots of the abuse we see coming from Guantanamo and Abu Ghraib (and elsewhere) could have stopped before it started, if soldiers had questioned the orders or directions given them to execute inhuman acts on prisoners. The more humane soldiers will question such orders anyway, even when they are legit. So it's extremely important that they learn how to quickly, consistently, and effectively question and execute orders during training. Instead of facing that awkward learning curve on a battlefield, or just in a prison where they can't afford to lose face before a prisoner.
Re:Schools of Phish (Score:3, Informative)
Meanwhile (Score:2)
I've complained that they should include text alerting people to never click on links in email, and not include any links. When the 'good' email trains people to be careful, the 'bad' email will be less successful.
Take it one step further (Score:3, Interesting)
In other words, I'm really a phisher opperating under the guise of one of these people trying to "help" others.
On every successful "catch" for something like, say, bank information or ssn, I have a script automatically check the victims bank account balance or credit score. If they're low, I automatically send them a "gotcha!" letter saying "look at what you just gave to me? It's a good thing I'm a responsible citizen and let you know!"
If the values are high, I sell them at a premium to other criminals (who will come to know that *my* information always contaians the personal information of someone with means).
If I ever get caught, I simply can point to the large number of emails I sent off warning people. "Hey, that some other guy robbed them blind isn't my fault; just because I deal with people who are prone to fall for this stuff doesn't mean I exploit them. Heck, I help them, and here's all my (doctored) logs to proove it. Don't believe me? Go interview the countless number of people I saved!
In the end, the profit wouldn't be huge, but it'd sure add another layer of safety to the fraud.
Re:Sir, No, Sir... (Score:3, Insightful)
To me, it's pretty scary that someone would just commit an action just because that someone was trained to follow instructions only, and to never question.
That's why I never joined.
And because you 'never joined', it is understandable why you have little clue how the military actually works.
Re:Sir, No, Sir... (Score:2)
"Sir yes sir!" is not actually what the civilian world thinks it means. Even the meaning of the word "orders" is quite often taken wrong outside of the military.
Re:Sir, No, Sir... (Score:2, Interesting)
Sir, uh, sir... (Score:3, Insightful)
He's the one saying that he'll never kill anybody, while you're the one claiming that under certain circumstances we can call it "true compassion for humanity". So that'd be a "relativism" point for you, surely, not him.
Re:Sir, No, Sir... (Score:4, Insightful)
To me, it's pretty scary that someone would just commit an action just because that someone was trained to follow instructions only, and to never question.
Military members are obligated to follow lawful orders from those above them. They have to ask themselves "is this legal? Does it mesh with the Uniform Code of Military Justice? Rules of engagement? Geneva Conventions?" Something tells me that inputting personal information because of an email does not necessarily qualify as an unlawful order.
Re:Sir, No, Sir... (Score:3, Insightful)
It was prima facie unlawful because it came from someone who was impersonating an non-existant officer. I hope soldiers are trained to verify the identity and authority of officers who are completely unknown to them. Even limited to the phishing realm, the implications are much more serious than for your average joe. Next time, the phishing could come from the intelligence arm of the
Orders should NOT be sent by email (Score:3, Informative)
For even a new cadet to confuse a phish email with a legit order is a terrible thing to happen.