Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security The Internet

Phishing Site Using Valid SSL Certificates 368

UnderAttack writes to tell us the Washington Post SecurityFix blog has an interesting article about a new and rather sophisticated phishing scheme. The email not only used the first few digits of the users card number to look more plausible (even though the first part of the number is the same for all cards), but it also used a valid SSL certificate for its domain name."
This discussion has been archived. No new comments can be posted.

Phishing Site Using Valid SSL Certificates

Comments Filter:
  • un-possible! (Score:5, Insightful)

    by conJunk ( 779958 ) on Monday February 13, 2006 @06:44PM (#14712149)
    What? An electronic system that didn't function properly? Color me SHOCKED!!!

    /sarcasm

    Seriously. I remember in the early 90s, tv ads for banks that ended with "...and remember, our staff will never ask for your credit card number over the phone." I think people *eventually* got the message on that one. How long will it take online? Remember, unsolicited email that links to a website ready to take your credit card number is bullshit, mom.

    • by Alwin Henseler ( 640539 ) on Monday February 13, 2006 @07:27PM (#14712481)
      Seriously. I remember in the early 90s, tv ads for banks that ended with "...and remember, our staff will never ask for your credit card number over the phone." I think people *eventually* got the message on that one. How long will it take online? Remember, unsolicited email that links to a website ready to take your credit card number is bullshit, mom.

      You mean people would never give out credit card numbers, when asked over the phone? I think you place too much faith in humanity.

      Most people would agree it's stupid, and fewer people will behave stupid after an education campaign (or after being bitten in the ass). Scam artists may not bother anymore with a certain method. But not because it wouldn't work; but because they've moved onto easier methods, methods that (these days) give them more return for their effort.

      For the same reason, e-mails with attachments like "Anna Kournikova.jpg.pif" will keep getting clicked on. You may think it's silly, but there's a new sucker born every day.
    • Re:un-possible! (Score:5, Interesting)

      by mgh02114 ( 655185 ) on Monday February 13, 2006 @07:39PM (#14712562)
      Seriously. I remember in the early 90s, tv ads for banks that ended with "...and remember, our staff will never ask for your credit card number over the phone." I think people *eventually* got the message on that one.


      They do this all the time. Just last week, Discover called and left a message on my machine "This is the security department, we have a question about the activity on your account, please call 800-###-#### to ensure continued service." When I called that number, they started off saying "Please tell me your card number, your mother's maiden name, etc." all to "confirm my identity" I of course refused, hung up, and called the 800 number printed on my credit card. They were understanding, but never acknowledged that they were essentially asking me to give all my personal information to a random person who called my home phone number.
      • Re:un-possible! (Score:5, Interesting)

        by gutnor ( 872759 ) on Monday February 13, 2006 @08:54PM (#14712988)
        I got exactly the same here in the uk unless that instead of stopping immediatly I do like any joe user I called back the number, gave my credit card number, birth date but before answering for my mother maiden name, I just realised what I was saying and felt the little tickling in the belly meaning stress ...

        I asked the women on the other hand what was that about - why I need to give this info?
        She told me she need 'security check - blabla'
        I asked why they asked me to call and where I was exactly she just told me the name of the bank (thanks,easy) but she needed the security check to give the reason of the call (best excuse ever)...

        I hang up - ( I start to sweat ) - I went straight to the website to find the number I just called in the bank public phonebook but nada ... the number was not even close to any number used by the bank. I googled the number, nothing ... ( arghhhh )

        I called the bank, this time I have to give the security ID again ( after the previous experience, even if you pick the number yourself in your monthly statement, you really feel uneasy )
        I asked the girl what was this number I just called, and what I'm suppose to do know ... she took less than 2 min ( from my point of view, a very big value of 2 ) to find out that this number is not in the bank private directory either...

        Hopefuly the girl ring herself to the mysterious number and found out that it was only a number setup for the billing departement ( yeah I missed a payment :-) ) ...

        They had a valid reason to contact me, I had an urgent action to take but why in hell do they use the same trick the spammers use?
        They use an unknown number not even known from the bank employees ?
        If I did as we are told in the security leaflet given by the very same bank, I should have called the fraud departement of the bank to report the phishing attempt instead of ringing back!

    • Seriously. I remember in the early 90s, tv ads for banks that ended with "...and remember, our staff will never ask for your credit card number over the phone."

      I recently read about a credit card scam operating here at the moment. You'll get a call from the bank / card company asking to do a standard security check. The catch is they already know your card details from another source (Skimmed at a restaurant or whatever), so they'll quote you the last 4 digits of your card's number as is standard practice o
  • What? (Score:5, Insightful)

    by cosmotron ( 900510 ) on Monday February 13, 2006 @06:45PM (#14712165) Journal
    Did people honestly think that their techniques were going to get worse rather than better?
    • by Kelson ( 129150 ) * on Monday February 13, 2006 @07:10PM (#14712344) Homepage Journal
      No, but a lot of people still have the silly idea that phishing is only as sophisticated as it was 2 years ago, back when it was plaintext, full of misspellings, and sent you to an IP or a GeoCities page.

      Back then, it was hard to imagine people getting fooled by the crude "Send me yore passwerd" level of "attacks" -- and yet people fell victim to it just the same. These days, they're polished enough that you basically have to assume any email that claims to be from your bank is forged, then examine it and try to prove otherwise.
      • by kampit ( 48398 ) on Monday February 13, 2006 @07:23PM (#14712453)
        Easiest thing to do is just not to trust any email you receive that deals with important matters such as a bank account, say you do your online banking with YourBank and receive an email that claims to be from them, if you can't immediately tell it's fake.. just go to your browser and manually type in the url for the bank (or use a bookmark), if there's no notification of whatever problem is described in the email, it's definitely fake.
      • by glwtta ( 532858 ) on Monday February 13, 2006 @11:14PM (#14713607) Homepage
        These days, they're polished enough that you basically have to assume any email that claims to be from your bank is forged, then examine it and try to prove otherwise.

        Well, yeah, why wouldn't you assume that? In fact, there's no need to examine it to try to prove otherwise, just go to your online banking site (which, it doesn't take a genius to bookmark when you sign up for it), if the bank wanted to tell you something, you'll be notified there too.

        What, are you saying I should also assume that the letters I get telling me I won 10 million dollars are not real either?

  • by Anonymous Coward on Monday February 13, 2006 @06:46PM (#14712168)
    If you get scammed on the intarweb, your intarweb license should be revoked.
  • From TFA: Mp> Geotrust has a rigorous process in place to check for phishy certificate requests that relies on algorithms which check cert requests for certain words, misspellings or phrases that may indicate a phisher is involved. In this case, she said, the technology did not flag the request because there was nothing in the Internet address to indicate the site was at all related to a financial institution.

    If they rely on misspellings, they'll only catch the dumb phishers. They're generally the ones that don't catch a lot of people anyway, or at least not anybody who doesn't deserve to be scammed.

    • by AndyBassTbn ( 789174 ) on Monday February 13, 2006 @07:52PM (#14712642) Homepage
      They're generally the ones that don't catch a lot of people anyway, or at least not anybody who doesn't deserve to be scammed.

      You know, I hate hearing that anybody deserves the financial ruin that results from falling for one of these scams.

      Remember, the more that geeks put on the "you're stupid so you deserve what you get" attitude, the fewer folks who are less-computer-savvy will buy computers for fear of being taken for a ride (and knowing no one will help them.)

      This, in turn, results in less money floating around in the tech sector, which, in turn, results in less money being invested to develop convieniences upon which we have come to rely - such as online banking.

      Which, of course, results in less money in the pocket of the geeks that were so callous to begin with. Remember - we NEED the end user just as much as the end user needs us.
    • I think when it says "misspellings", it doesn't mean the "I trenslated this miself" kind of misspelling in the email body, but rather the "this looks almost like a legitimate URL, unless you notice that it's not spelled correctly" kind of mispelling, which is usually spelled correctly in the link text. Like, for instance, <a href="www.citybank.com">www.citibank.com</a> (as a hypothetical example).

      This is why TFA goes on to say "[...] the technology did not flag the request because there was
    • by The-Bus ( 138060 ) on Monday February 13, 2006 @08:03PM (#14712699)
      Take Commerce Bank [commerceonline.com]. They have CommerceOnline.com for their main domain and CommerceOnlineBanking.com for their online banking. But why not CommerceBankHome.com as GoDaddy suggest? Or CommerceBanking.com? Or CommerceBankingOnline.com?

      Unfortunately their domain names are a soup of common names and it's impossible to remember. With common names, a small alteration of the site and that's all you need to confuse some folks.

      The best phishing URL I've ever seen was one that was www.amazon.com.exec-obidos.com. If anyone remembers, previously Amazon URLs always had an exec-obidos in their path when the link lead to a product. Even I had to blink a few times before I realized it was a phishing scam. (All the links went to a working Amazon section).
  • by Spazmania ( 174582 ) on Monday February 13, 2006 @06:47PM (#14712182) Homepage
    Proving once again the relative lack of worth of requiring SSL certificates to be signed. All it does is make a few companies rich.
    • Proving once again the relative lack of worth of requiring SSL certificates to be signed. All it does is make a few companies rich.

      Well, I guess there is a market for a more trusted group of people that issue identities on the internet. These are the DNS registrars and the certificate authorities.

      Think about paying for a DNS server that did not resolve any illegal hosts? I would, and recommend anybody else to do the same.

    • So what is the alternative? Self signing? I can see obvious holes in that approach. *Someone* has to do the due diligence to identify legit from illegit. And that due diligence has some cost associated with it so nobody is going to do it for free(1). So who does it? And who pays for it?

      While not perfect, I'd argue that the current system works pretty darn well. Obviously, improvements in due diligence are needed but on the whole, I'd wager there is fairly low SSL cert fraud out there. I say that
      • by rekoil ( 168689 ) on Monday February 13, 2006 @07:31PM (#14712502)
        I say that because this is the first incident ever being reported where an SSL cert was obtained illegitimately.

        Um, no. [infoworld.com]
      • So what is the alternative?

        Do nothing. Let folks use the normal societal methods for authenticating identity. Use SSL for what its good for, end to end encryption with a party you haven't talked to before. Skip the rest of it or reduce it so something like domain name-only authentication where SSL is understood to only authenticate that you really are talking to the server with that name.

        I say that because this is the first incident ever being reported where an SSL cert was obtained illegitimately.

        Wow. Wha
      • by clymere ( 605769 ) on Monday February 13, 2006 @08:51PM (#14712964) Homepage
        One can at least mitigate the money issue. http://cacert.org/ [cacert.org] is an alternate "open" root cert authority. They're working hard to gain the acceptance of the likes of verisign. I've had converstions with a few of them, and its arguable that their verification procedures are _more_ rigorous than those conducted by the the CA's that are charging high prices.

        Nevermind the fact that if noone is buying certs, theres no finanical pressure to cause them to make any compromises for those willing to pay the right price.
    • Indeed. Signing is only important to those who already have the sense to check they are using something from the proper source. To normal people it's just a false sense of security - it's signed so it must be good, right? That of course assumes normal people know what signing is and won't just click OK to everything before reading.

      This fits here too, but was originally my argument about a recent announcement that Windows Vista will require all x64 drivers to be signed, which will cost small time devel
    • by jd ( 1658 )
      The signature is only as good as the checks placed on the certificate being signed, the checks on the entity being who they say they are, the security on the private key of the signer and the strength of the key and hashing function used. Any of those points can become weakspots if a single signature on a certificate is used.

      (If someone is using a weak algorithm and a weak key, especially if the key is not random but based on knowable information, then it may be possible for someone with sufficient computin


    • Proving once again the relative lack of worth of requiring SSL certificates to be signed.


      Well, I think relative is the key word here. What a signed SSL cert does protect against is a man-in-the-middle attack. That is, when I connect to https://secure.newegg.com/ [newegg.com] and negotiate an encryption session, and don't get a "this certificate not recognized" error, I can be assured that I've actually negotiated with newegg.com, and not some other guy that's sitting in between me and newegg.com and has given me HIS ce
      • Because of the way IE checks, if the SSL cert is signed by a cert that was signed by the CA, it will show up fine. So if there's DNS poisoning, you could still be talking to another server. This bug may have been fixed, I'm not sure off the top of my head.
  • by the_humeister ( 922869 ) on Monday February 13, 2006 @06:48PM (#14712188)
    ...and also why I hate html email and use pine as my mail client. Unfortunately, most people don't know enough to not click html links sent to their email account. As a result, this is especially worrisome because it looks legit.
    • ...and also why I hate html email and use pine as my mail client...

      I know exactly what you mean. Your situation is perfectly analogous to my eating habits -- I really don't like fish, therefore I only eat italian food.
    • by Ctrl+Alt+De1337 ( 837964 ) on Monday February 13, 2006 @06:59PM (#14712274) Homepage
      I hate html email and use pine as my mail client

      I hate to break it to you, but the vast majority of computer users would not be willing to use a terminal-based email system. Most are afraid of using terminals period. I'm glad that you found something that works for you and can score you cool points on Slashdot, but I hope you weren't stating that as a recommendation. Links in email aren't necessarily A Bad Thing so rather than do away with them completely, it's better to fight the phishers instead of the links.
      • I hate to break it to you, but the vast majority of computer users would not be willing to use a terminal-based email system.

        You know, that's a bunch of bull... users are capable of doing it if they weren't ignorant. 10 years ago when GUI mail readers barely existed, I knew dozens of fellow students that would telnet into a UNIX box and read their mail with pine or elm (and later mutt) without any problem at all. Usually their history would show them alternating between pine and logging into a MUD to g

        • You know, that's a bunch of bull... users are capable of doing it if they weren't ignorant. 10 years ago when GUI mail readers barely existed, I knew dozens of fellow students that would telnet into a UNIX box and read their mail with pine or elm (and later mutt) without any problem at all.

          Okay, what YOU say is a bunch of bull. 10 years ago you would have used Mosaic to browse the web. Maybe Netscape 1. You would have been using a 150 mHz (tops) computer from a dial up modem.

          You were perfectly capable of de
          • So why should we be stuck with a CLI-based mail client just because people are capable of using it?

            Er...uh...well...maybe, because we're not, and the OP never said we should be. The OP was only listing his own preferred newsclient, and not insisting that anybody else in the world use it. Just because you think GUI mail clients that parse html, automatically open attachments and run executables are the greatest thing since punched cards doesn't mean everybody else has to use them.

        • by 93 Escort Wagon ( 326346 ) on Monday February 13, 2006 @08:52PM (#14712975)
          "...users are capable of doing it if they weren't ignorant. 10 years ago when GUI mail readers barely existed... Windows is to blame for dumbing down our computer users to the point of being completely incompetent when it comes to dealing with a non-clicky-clicky interface."

          Congratulations! You've earned extra Slashdot Coolness Points for 1) slamming Windows; 2) insulting the average user; and 3) being blissfully unaware that most normal people actually prefer a GUI interface!

          • by value_added ( 719364 ) on Monday February 13, 2006 @11:23PM (#14713648)
            ...users are capable of doing it if they weren't ignorant. 10 years ago when GUI mail readers barely existed... Windows is to blame for dumbing down our computer users to the point of being completely incompetent when it comes to dealing with a non-clicky-clicky interface."

            Congratulations! You've earned extra Slashdot Coolness Points for 1) slamming Windows; 2) insulting the average user; and 3) being blissfully unaware that most normal people actually prefer a GUI interface!

            Perhaps, but more importantly, he offered a reminder that 1) the "Ease of Use" design of Windows and many Windows-based apps does encourage stupidity; 2) GUI apps, despite their added features, can often be inferior to terminal-based programs (in this particular case, even dangerous); and 3) terminal-based programs need not be difficult to use as ordinary people were once perfectly happy typing cryptic-looking commands on a bare screen.

            I'd say each of those is reminders is valuable, and the distinctions made are important.

            This isn't so different than refering to Windows-based viruses as worms as "computer viruses." Put another way, if everyone does indeed want clicky programs and text/html email as another poster suggested, it's perfectly appropriate that they have a clear understanding that any problems they encounter are mostly the result of their preferences. A few comparisons and a little background are always useful.
    • But clicking HTML links is compltely irrelevant to this particular case. The problem was they used a similar domain name and got an SSL cert in the name of the target institution.

      This phish could've been pulled off just as easily in plaintext.
    • Exactly, the problem has to be addressed at the source (the phishing e-mail), not somewhere inbetween by some technique that has never been designed to combat phishing (SSL). Unfortunately neither your government nor your bank understand this matter. If people would simply block all HTML message this show would be over in no time. Earlier this evening I posted an example, and promply someone called it "off topic". Well, this is /. and you just cannot educate everybody, I guess.

      http://it.slashdot.org/comment [slashdot.org]
  • by spicyjeff ( 6305 ) on Monday February 13, 2006 @06:48PM (#14712191) Homepage
    Couldn't the SSL Certificate issuer just revoke the certificate of anyone using said certificate for malicious or illegal purposes? That would at least give some warning to uses with a bad or unknown certificate message.
    • Re:Revoke SSL cert? (Score:4, Interesting)

      by EvilMonkeySlayer ( 826044 ) on Monday February 13, 2006 @06:53PM (#14712230) Journal
      The problem with that is, in order for the revocation to take effect the user needs to download the root certs update which will be provided by their browser vendor (which in this case will more than likely mean MS) and lets face facts the majority of users never even bother updating, the fickle masses that they are.

      A revoked cert isn't the solution, the solution is fixing the process by which people can get SSL certificates in the first place. There need to be more checks and balances. The current process is essentially; give us your money please, ok here's your certificate.. Enjoy!
      • Re:Revoke SSL cert? (Score:3, Interesting)

        by hackstraw ( 262471 ) *
        The problem with that is, in order for the revocation to take effect the user needs to download the root certs update which will be provided by their browser vendor (which in this case will more than likely mean MS) and lets face facts the majority of users never even bother updating, the fickle masses that they are.

        A revoked cert isn't the solution, the solution is fixing the process by which people can get SSL certificates in the first place. There need to be more checks and balances. The current process
        • Re:Revoke SSL cert? (Score:3, Interesting)

          by croddy ( 659025 )
          Perhaps the solution is for people not to equate a secured network transport layer with the legitimacy of the business on the other end of said transport.

          Sure, you may be speaking with a scumbag using strong encryption, but he's still a scumbag.

      • Re:Revoke SSL cert? (Score:5, Informative)

        by afidel ( 530433 ) on Monday February 13, 2006 @07:12PM (#14712365)
        Actually all you have to do is go into Tools, Internet Options, Advanced, and under Security select Check for server certificate revocation which tells IE to check the OCSP of the publisher before accepting a certificate (Tools, options, advanced, security, verification under Firefox). I'm not sure why other than speed that these options aren't enabled by default but you are right that better controlls on certificate issuance would be nice.
      • Re:Revoke SSL cert? (Score:3, Informative)

        by squidguy ( 846256 )
        The problem with that is, in order for the revocation to take effect the user needs to download the root certs update which will be provided by their browser vendor/

        Err...sort of. The user would need a root update if the SSL vendor's root isn't already contained in the user's browser cache. If they didn't have the correct root, then the "valid" SSL cert would appear invalid to the browser because the cert couldn't be traced back down the chain.
        To check for certificate revocation, you have to have you
      • by Anonymous Coward
        A revoked cert isn't the solution, the solution is fixing the process by which people can get SSL certificates in the first place. There need to be more checks and balances. The current process is essentially; give us your money please, ok here's your certificate.. Enjoy!

        For some of the bargain basement certificate authorities this may be true however for the better known companies (Thawte and Verisign for instance) the opposite is sometimes true.

        I work for an ecommerce company and the number of hoops we ha
      • Re:Revoke SSL cert? (Score:4, Interesting)

        by Vellmont ( 569020 ) on Monday February 13, 2006 @07:28PM (#14712484) Homepage

        the solution is fixing the process by which people can get SSL certificates in the first place. There need to be more checks and balances. The current process is essentially; give us your money please, ok here's your certificate.. Enjoy!


        How is any cert provider going to know that a phisher is going to use a cert for a similarly named website? If I go and buy the domain mountain-america.com, setup a website that looks like I'm going to sell vacations to the mountains on that URL, get my signed cert, then turn around the next day and make it look like the mtnamerica.org website, how is the cert issuer going to read my mind and know that?

        No, the answer is that banks need to be issueing some kind of security device that does all the verification. I'm fairly certain all of this is technically possible via everyday encryption.
  • by UnderAttack ( 311872 ) * on Monday February 13, 2006 @06:54PM (#14712238) Homepage
    A better link, with more screenshots:

    Phollow the Phlopping Phish [sans.org]
    • these people are the source of this entire story. the link to their post should be included in the summary of the main entry
    • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Monday February 13, 2006 @08:09PM (#14712731)
      Finally, banks and credit unions that send out email with clickable links teach their customers incredibly dangerous habits. Financial institutions that use multiple domain names are setting their customers up for disaster. And, of course, any financial institution that isn't checking their referrer logs for odd and unknown sites is a time bomb waiting to explode.
      All any bank would have to do to end phishing is to PUBLICLY state that they will NEVER use email to communicate with ANY of their clients.

      They have your phone number.
      They have your address.

      They can send you a letter, they can call your phone. And their phishing rate would drop to almost zero.
  • Geez... (Score:4, Funny)

    by razzamatazm ( 953915 ) on Monday February 13, 2006 @06:54PM (#14712241)
    Soon all the good ideas will be taken and I'll be stuck selling penis pills again. Ugh...
  • by Kelson ( 129150 ) * on Monday February 13, 2006 @06:56PM (#14712251) Homepage Journal
    The Internet Storm Center did a write-up on this case [sans.org] inclusing a hypothetical tale of Joe Sixpack trying to verify the phish, doing (almost) everything right -- typing in the address instead of clicking on the link, checking for an SSL certificate, checking who the cert is registered to, etc, and still getting caught.

    The fatal flaw in the hypothetical course of action is trusting the non-standard domain name...but you can hardly blame Joe Sixpack for that one when so many financial institutions actually use one-off domains or partner sites. I was working on some phishing rules last year and counted something like 5 domains that Citibank used alone.

    • The fatal flaw in the hypothetical course of action is trusting the non-standard domain name...but you can hardly blame Joe Sixpack for that one when so many financial institutions actually use one-off domains or partner sites. I was working on some phishing rules last year and counted something like 5 domains that Citibank used alone.


      I think you're absolutely right. The natural inclination of a lot of Slashdot users is to blame the idiot users. To a small degree that's true, but largely I think the banks
    • The fatal flaw (Score:3, Interesting)

      by Sloppy ( 14984 )

      The fatal flaw in the hypothetical course of action is trusting..

      ..Equifax.

      I have nothing against Equifax, but I don't know them either. I don't know their policies, I don't know how they protect their signing key, and I don't know how they verify identities. Neither do you (well, ok, you know a little about their stated policies, because you RTFA). Neither does Joe Sixpack.

      People are farming trust out to faceless strangers that they have never met. It's pretty insane when you think about it.

      Who t

  • If I were the phisher, I'd ask for my money back - no-one cares about SSL certificates, so it probably won't make the phishing attempt any more successful!
  • by Jorkapp ( 684095 ) <jorkapp@h[ ]ail.com ['otm' in gap]> on Monday February 13, 2006 @07:00PM (#14712284)
    These phishers are getting more and more sophisticated, but it's only a matter of time before they're caught. To get more sophisticated requires better services and equipment, which requires the phishers to either:
    a) Give out their true information - name, address, etc, making for easier law enforcement tracking
    b) Give out flase information - which may buy them some time, but will only cause the bite taken out of their ass by law enforcement to be that much bigger.

    Even still, Valid SSL certificates and whatnot don't mean shit against a true savvy user who knows better. Any user who actually reads the warnings by their banks/credit card companies/etc will know that said companies will never send emails asking for credit card information.
    • >a) Give out their true information - name, address, etc, making for easier law enforcement tracking
      >b) Give out flase information - which may buy them some time, but will only cause the bite taken out of their ass by law enforcement to be that much bigger.

      c) Locate their operations in a country where they can form an under$tanding with the police. (If they haven't already).
  • by Vellmont ( 569020 ) on Monday February 13, 2006 @07:03PM (#14712298) Homepage
    Beyond the cert saying the business was in Salt Lake City Utah, I don't really see how there was some big confidence broken here. The SSL cert was issued for "www.mountain-america.net". The bank in question is "www.mtnamerica.org". Whoever thinks that a signed SSL certificate is supposed to verify anything other than the person/entity asking for the cert is the same person who owns the domain is assuming waaaay to much.

    In essense signed certs are only supposed to protect from a man-in-the-middle attack, not someone being fooled into going to a similarly named website. Why shouldn't I be able to get a signed cert for mountain-america.net if I own it? There's plenty of similarly named legit businesses that all have certs issued to them.
    • > Beyond the cert saying the business was in Salt Lake City Utah, I don't really see how there was some big confidence broken here. The SSL cert was issued for "www.mountain-america.net". The bank in question is "www.mtnamerica.org". Whoever thinks that a signed SSL certificate is supposed to verify anything other than the person/entity asking for the cert is the same person who owns the domain is assuming waaaay to much.

      Of course, the whole idea of phishing is to take advantage of the human tendency to

      • Of course, the whole idea of phishing is to take advantage of the human tendency to assume waaaay too much.


        Oh I agree completely. It's just the article seems to assume there's something wrong with the SSL cert issuer, and I really see litle fault from them. The fault is with banks who're letting people do transactions across the internet without people being able to verify that the bank is who they say they are.
        • It's just the article seems to assume there's something wrong with the SSL cert issuer, and I really see litle fault from them.

          Really? I think they can be legitimately criticized for being willing to assist in lending an air of credibility to the scam by issuing certs to a site with no legitimate purposes at all, merely because the scuzzbags who run the site are willing to cut them a cheque.
          • Really? I think they can be legitimately criticized for being willing to assist in lending an air of credibility to the scam by issuing certs to a site with no legitimate purposes at all, merely because the scuzzbags who run the site are willing to cut them a cheque

            So you would support having to share your business plan to get a cert, with certs costing thousands of $CUR just to pay for all of the investigation they would require? After all, in 15 minutes you could register mountain-america.net, set up a r

            • So you would support having to share your business plan to get a cert, with certs costing thousands of $CUR just to pay for all of the investigation they would require? After all, in 15 minutes you could register mountain-america.net, set up a really crappy (but no worse than many) looking coffee-shop website, and say that you were going to sell coffee over the internet.


              Exactly. Certs have never implied a legitimate business, and really can't do that.
          • Certificates prove only that you're talking to the website you think you're talking to. That's it. End of story. People who think they prove something else are suckers. Granted, they also provide you a method to relatively reliably encrypt something so that no one else but them can read it, but one of the problems with cryptography is that it's awfully hard to be sure no one has come up with a way to decrypt 'em without the proper key.
    • The SSL cert was issued for "www.mountain-america.net". The bank in question is "www.mtnamerica.org".

      If ever there was a good case for launching a cyber-squatting suit, I think this would be it.. I don't know who applied for mtnamerica.org, but mountain-america.net seems like a far better domain name. If you'd shown me both domain names, and I had no other infor, I would have guessed that mountain-america.net was the legitimate address.

      Hopefully, this case would be a slam-dunk for the credit un

      • What if I have a website for mountain climbers to discuss their American tours? Wouldn't mountain-america.net be a valid name? Shouldn't I be allowed to purchase an SSL certificate to secure logins to my fourms?

        I fear the day that commercial entities own the namespace of the internet, all for name recognition and protecting users from themselves. Trademark law worked great for localized commerce, but with global environments (like the internet), how can one guarantee and protect unique naming without out
    • by iabervon ( 1971 ) on Monday February 13, 2006 @08:23PM (#14712807) Homepage Journal
      Browsers are designed to make people assume that CA-signed SSL certificates actually mean something they care about. The only thing this stops is somebody who manages to take control of a site's DNS or TCP traffic but somehow fails to use this control to get a certificate issued. But browsers treat self-signed certificates as really suspicious and CA-signed certificates as perfectly secure. The user isn't given any useful information, and has to make the decision based on information which, as you say, is not actually relevant. (Actually, CA-signed certificates are less trustworthy in many cases than self-signed ones, because the browser doesn't report that a CA-signed certificate is unfamiliar, while a self-signed one is saved, so it's obvious when it's not the same.)

      What would prevent this sort of scam is if people were told that any certificate your browser doesn't already have saved is suspicious, and shown what can be demonstrated about the certificate. If you have a prior relationship with this site, check that this string: (fingerprint of certificate) appears in the information you received. If not, decide whether you believe one of these organizations (signers of certificate, using PKI, based on certificates which come with the system) to make the operation you are doing today safe. In either case, choose a description of the site, which will be displayed when you return to this site in the future. Ideally, the user would be asked to choose whether they recognize the site before they are told more about the certificate, so they don't just look for a reasonable-looking signer.

      That way, people click the link, get the real certificate for something that isn't their bank, and they notice that the window doesn't say "Secure connection to: My Bank" (if they've done this before), or notice that the fingerprint doesn't match the fingerprint on their bank statement, and then they know that, whoever this is, it's nobody they've got an existing business relationship with, and the claim about an existing account is clearly bogus.

      (Last detail: the certificate with the fingerprint in question should be a self-generated CA certificate, not the actual SSL certificate in use, so the bank can change domain name while keeping the same saved info. The CA cert should be signed by the FDIC and other banking-related organizations, who wouldn't be tempted to possibly sign a sporting-goods store certificate, but that's only at all relevant to people trying to choose a bank online, because the instructions will clearly state that this is not the user's current bank.)
  • SSL Certs (Score:5, Informative)

    by thomble ( 642879 ) on Monday February 13, 2006 @07:05PM (#14712308) Homepage
    Most people don't understand the function of SSL certificates, nor do they understand how EASY and INEXPENSIVE it is to get one from a reputable company.

    1. Register the domain JFBVB.COM
    2. On your own DNS servers create a record for EBAY.JFBVB.COM
    3. Purchase a legit SSL certificate from RapidSSL [rapidssl.com] on that domain for $69
    4. Create your phishing site
    5. (Illegally) profit!

    Many people think that an SSL certificate somehow guarantees a trustful vendor. On the contrary, it simply guarantees that no one will view the information en route. The vendor can do whatever he wants with the information you send.

    • Re:SSL Certs (Score:3, Informative)

      by Kelson ( 129150 ) *
      Many people think that an SSL certificate somehow guarantees a trustful vendor.

      This is the result of years of advertising by cert authorities, Verisign in particular.

      Admittedly, Verisign used to make a much greater effort to verify their clients than GeoTrust or Thawte. (This may or may not have changed.) I remember having to provide Verisign with business IDs, wait a month for them to verify things, go back and forth with address corrections, etc.

      These days you can have an SSL cert up and running in less

      • This is the result of years of advertising by cert authorities, Verisign in particular.


        Exactly. When I first heard of signed certs, I assumed this too from all the marketing by Verisign. Foolish on my part in retrospect, but hey, SSL was new and what did I know?
    • SSL certs are not sold for domain names, just host names. They only work for ONE host. You can't buy a SSL cert for *.JFBVB.COM and setup EBAY.JFBVB.COM latter. You can only buy a cert for one host, say WWW.JFBVB.COM.
  • by Goyuix ( 698012 ) on Monday February 13, 2006 @07:16PM (#14712406) Homepage
    You have never truly had fun with the support staff at your bank/credit union/credit card/whatever until you have called and asked them to verify the thumbprint/fingerprint of their SSL cert for you.

    Unfortunately, it looks like Geotrust lost this round, and it probably would be considered good practice to actually do that from time to time. For the truly paranoid, remove all root certificates, and only after verifying the thumbprint proceed to install that cert into your cache. No more trust hierarchy.
  • by Triumph The Insult C ( 586706 ) on Monday February 13, 2006 @07:17PM (#14712407) Homepage Journal
    the ssl cert companies don't verify who you are, just who you say you are

    they're in it for the buck. why would they go that extra mile when it just cuts into their bottom line?
  • by ave19 ( 149657 ) on Monday February 13, 2006 @07:22PM (#14712444)

    You know, if that SSL certificate traces back to a valid human, then you can arrest him/her for phishing and they've provided all your evidence for you.

    It's like leaving your digitally signed confession at the scene of the crime. No CSI team needed. Only the crooks know the corresponding private key.

    If you can't trace that certificate it back to a valid human, than the CA needs to be beaten with a large stick.

  • by Anonymous Coward on Monday February 13, 2006 @07:23PM (#14712450)
    It amazes me that people forget that a banks job is to protect your money.

    The phisher in the end shouldn't be able to get any money from this.

    The banks should have in place a system that secures your money much better than this. It reminds me of the wild west where banks were robbed all the time.

    Like, why do the retailers have to protect the banks? Why do they have to ask for ID when you already presented a valid banking card to them? Is this system insecure? Yes, and that's why they ask for ID. WTF?

    People should consider this the same as a bank getting robbed over and over. If the banks got enough bad press from this then maybe they would do something about it.

    But never forget, this is not money, it's currency backed by nothing of value and could become wortless in a day. People have been trying to tell you this for years, but you people won't read any simple banker history, it's too booring.

    http://www.apfn.net/Doc-100_bankruptcy13.htm [apfn.net]
    http://www.federal-reserve.net/ [federal-reserve.net]
    http://www.converge.org.nz/pirm/fr_paul.htm [converge.org.nz]
    http://batr.org/verity/id6.html [batr.org]
  • by Stephen Samuel ( 106962 ) <samuel AT bcgreen DOT com> on Monday February 13, 2006 @07:30PM (#14712496) Homepage Journal
    My question is: Did these dogs give equifax enough information for the cops to have some hope of tracking them down? I'm guessing that at least some of this information is faked, but if there's nothing here that the cops can use, then the identity information in SSL certificates is less than worthless.
  • Tom Liston, a handler at SANS ISC well known for his various [sans.org] takes [sans.org] on [sans.org] Malware [sans.org] problems [sans.org] has a good take on this entitled Phollow the Phlopping Phish [sans.org] on the ISC Handler diary. [sans.org] Covers what it looks like to a user, and why it all falls down.
  • by Douglas Simmons ( 628988 ) on Monday February 13, 2006 @07:40PM (#14712566) Homepage
    I am very impressed that in spite of all the money there is to be made and all the money that gets lost as a result of loose security, and all the time that has passed for people to cash in on this huge demand for iron clad software, that the AOHellers out there keep coming up with ways to steal cards by getting around new deterrents. I mean, great security is something credit card companies and online services have been marketing themselves upon, spending lots of cash-money for these campaigns... they might as well come through with security a la openbsd [openbsd.org].

    To add to this craziness, the culprits behind these accomplishments, in this case certificate hacking of all things, are brilliant enough to get ultra-high paying jobs and hire a nude secretary [craigslist.org]. With this new age of cyber-terrorism threats, I gotta side with the pro-hacker mantras claiming that they help the world by exposing threats with mostly benign things like pbrushing a hitler mustache on Bush before the real bad guys, the ones who have similar high levels of expertise [though in bombs], figure out the holes. High five, 31337-speakers.

  • From the article: arrives in an HTML-based e-mail. When will people learn to REJECT HTML-based e-mail messages without exception? How many of these schemes do we need until everybody understands that there is something badly wrong with HTML-encoded mail messages?
  • by psyclone ( 187154 ) on Monday February 13, 2006 @07:56PM (#14712659)
    SSL doesn't prevent phishing. A signed SSL cert from a trusted Certificate Authority only assures the user that the information passing between the user and the domain is encrypted. SSL can't tell you if a site is "real" or not.
  • by Sloppy ( 14984 ) on Monday February 13, 2006 @08:36PM (#14712881) Homepage Journal
    The all-or-nothing system used by the whole X.509/SSL system sucks. What should happen after this instance, is that everyone realizes, "Oh, Equifax certifies without actually checking identities," and then they go into their database and delete Equifax.

    But if they do that, then a whole bunch of certs immediately become untrusted, because those certs only have one signature: Equifax.

    OpenPGP is better. In a world ruled by OpenPGP instead of X.509, people would go into their databases and set their "how much I trust Equifax" to a lower setting. Then if someone's identity was only certified by Equifax, they'd start to look iffy, but if someone has been certified by many CAs (in addition to Equifax), they'd still look ok.

  • by miller60 ( 554835 ) on Monday February 13, 2006 @08:45PM (#14712932) Homepage
    Phishing scams have been using SSL in attacks since 2004. Last year Netcraft identified more than 450 phishing attacks that used SSL certificates [netcraft.com] in one form or another. However, the tactics seen in the Mountain America attack are more sophisticated than previous attempts. In many previous attacks the phishing crews have used an https URL with an SSL cert they know will trigger a browser alert, banking on the likelihood that many users will trust the padlock and ignore the certificate. This one is designed to fool more sophisticated users who actually check the certificate.
  • How to stop it (Score:3, Insightful)

    by jonwil ( 467024 ) on Monday February 13, 2006 @08:55PM (#14712994)
    Basicly, the email addresses attatched to these phishing scams are one of 3 things:
    1.An address comming from a domain name owned by target (i.e. bank etc)
    2.An address comming from a domain name that looks like its owned by the target (e.g. www.paypalsupport.com)
    or 3.Something totally unrelated to the bank

    If everyone (both the pishing targets and the email providers) implemented GOOD SPF record checking, it should stop point 1
    Point 2 can be stopped by enforcing the trademark and forcing the domain name to be handed over to the trademark owner (who can then enforce SPF on it)

    It wont stop all phishing scams (i.e. those that come from or something like that) but it will certainly help.

    Unfortunatly, even the biggest phishing targets like amazon, ebay, paypal etc dont implement proper SPF records that say "These machines are the only machines to send email for this domain" (they implement a default "permit all" and not a default "deny all" unfortunatly)

    Also, banks need to actually implement better security, if banks had decent security, phishing would be useless.
    Here is a security model that would be very difficult for a phisher to defeat:
    You open the webpage of your bank and go to the login page. The banks computers then calculate a random number and store it along with the IP address that made the request. The login webpage displays a box for the username, a box for the password and another box for a hash. You enter the random number the bank computer generated into a little calculator like device that contains another random number generated by the bank and stored in the banks computers as well as the device. Then, the device uses a hash algorithim (one designed so that there is no value of that will result in an output value of or that if one exists, it is different for each value of ) to combine the login page number and the stored number.
    The result is entered into the login page along with the username and password.

    The bank then pulls the secret device number from its database and checks that the hash matches. Also, if the IP address of the machine making the requests to the banks webpages doesnt match with the IP stored alongside the session ID, it will assume its fake and terminate.

    Now, when you want to transfer money to someone not on your "approved payee" list or add someone to your "approved payee" list, you get another random hash which you have to enter into the little calculator. To prevent the phisher from simply tricking you into typing this second hash in (i.e. transfering all your money to them instead of transfering the amount you wanted to transfer to who you wanted to transfer it to), you would have to enter the amount being transfered into the calculator device too with it being used as part of the hash.

    Anyone who is dumb enough to press "Funds Transfer" then then doesnt deserve to be using a computer, much less the internet.

    A big education campaign by the banks would help too For example, include a phamphlet with the next bank statement or other junk mail that gives a clear warning about phishing scams and to never ever trust any email pretending to be from the bank no matter what. Also it would tell you to change your password or contact your bank if you think you have been hacked or phished.
    If the phamphlet said in big bold letters something like "Warning: Your money could be at risk from hackers, read this to find out how to prevent it" and was sent out to every bank customer (or every bank customer with online banking enabled on their account), people would probobly read it.
  • by Nicopa ( 87617 ) <nico.lichtmaier@gma i l . com> on Monday February 13, 2006 @09:12PM (#14713082)
    1. Open the preferences and go to "Advanced".
    2. Then click on "Security".
    3. Push the certificates button and then choose the "authorities" tab.
    4. Find equifax.
    5. Select all those entries.
    6. Push "edit", uncheck the checkboxes for each certificate.
    Done, you no longer trust these folks.
  • by Animats ( 122034 ) on Monday February 13, 2006 @11:00PM (#14713556) Homepage
    Check it out. [geotrust.com] Still listed. Doesn't even seem to be in the certification revocation database.

    Let's quote what Geotrust says about relying on certificates: [financialc...graphy.com]

    GeoTrust's solution is that the browser should display ... "The name and logo of the CA who issued the certificate. Consumers will soon learn from news reports which CAs to trust and which CAs use sloppy procedures and should not be trusted."

    We should take Geotrust at their word. Now that we're certain that their procedures are sloppy and they can't be trusted, their certs should be pulled from all browers. New releases of Firefox should not contain root certs for Geotrust. They had their chance, and they blew it.

  • Netcraft Toolbar (Score:3, Informative)

    by OneFix ( 18661 ) on Monday February 13, 2006 @11:33PM (#14713695)
    This is why everyone should install the Netcraft Anti-Phishing Toolbar [netcraft.com]...unless they really know what they are doing (read IT professional)...

    All of your users/customers should have this installed...besides rating the risk of the site based on previous reports, it would also have shown how long the site was registered...which even on this phishing site was probably a matter of days...as a matter of fact, I can see this as a good feature to include within Firefox...whenever you view the SSL certificate, show the domain registration info...

    Looking at some of the domain registration info [netcraft.com], it's obvious that including the DNS Admin, Organization, and Nameserver Organization, you would have easily identified a fake...

    Even better yet, why not have a certification process for banks and such that could opt to have their ISP verify their identity...then when you visit their SSL site, your browser could display the verification info beside the "security lock"...

    Of course, if you want to change the way the "Security Lock" works in browsers, in the US you could set something up with the FDIC that would use a DNS lookup similar to the way DNS Block Lists operate...only this one would tell you if the site was a valid banking site...I guess the "Lock" could change to a "$" or something if it was verified as a banking site...web sites could simply request the check in some way (HTTP header or something)...the header value could represent the type of site (US Banking Site...check with FDIC...)
  • by nuxx ( 10153 ) on Monday February 13, 2006 @11:54PM (#14713769) Homepage
    This weekend I got a very, very impressive eBay phishing message which appeared to ask if I accepted PayPal. I was so impressed by the continuity of the fake site that I took some screenshots of it:

Beware the new TTY code!

Working...