Why Phishing Works 293
h0neyp0t writes "Harvard and Berkeley have released a study that shows why phishing attacks work (pdf). When asked if a phishing site was legit or a spoof, 23% of users use only the content of the website to make the decision! The majority of users ignore the address and SSL indicators in the browser. Some users think that favicons and lock icons in HTML are more important indicators. The paper hints that the proposed IE7 security indicators and multi-colored address bar will also suffer a similar fate. This study is brought to you by the people who developed the security skins Firefox extension."
Short answer (Score:5, Insightful)
The Blind Squirrel (Score:2)
>
> Phishing works because people don't understand (nor do they want to) the basics of the technology they use (example: Jerry Taylor).
Funny you should mention him, though.
"I do not follow instructions that show up when a website that I am not familiar with appears on my computer and I do not think anyone with experience would do so either."
- Jerry Taylor [theregister.co.uk]
Even a bli
Re:The Blind Squirrel (Score:5, Funny)
Re:The Blind Squirrel (Score:5, Insightful)
I try to ask as few questions as possible. Users often don't want options, just action, and the ability to undo the action after it has happened.
Re: (Score:2)
Re:The Blind Squirrel (Score:4, Insightful)
The solution for that is to always make a "save" choice per default, and then allow the user to change the choice with a nonmodal, nonblocking dialog.
If the user does not want to change anything, no action is required.
Like in firefox
"this site requires additional addons, click here to install them" displayed on top of the page (and not in a dialog box).
Re:The Blind Squirrel (Score:5, Insightful)
When I ask why, they always respond that they're not sure what to do.
When presented with a Yes/No/Cancel with 3 sentences in it, they just press enter without reading, because it's either too complicated or because it doesn't seem important. (It's just a popup box that asks a question I don't understand... but if I hit enter it goes away and I don't have to decide).
Incidentally, I partially blame all those InstallShield things that have the front screen with 3 paragraphs of text and a next button when there's really no meaningful information on the page, and nothing to do except click next to start installing the program (or cancel if you ran the installer by mistake)
From the UI side, however, I think that while OK boxes and Yes/No boxes are great, I think that OK/Cancel and Yes/No/Cancel boxes are heavily overused... If you want to ask a question where Yes/No isn't the answer, you should probably roll your own so that the buttons can be *descriptive*
Re:The Blind Squirrel (Score:2)
Although in the case of Jerry, it's more like even a blind seal finding a club :)
One can only hope. It's amusing to note that he tried his site from 4 different computers, expecting to find different info on each(?!), and the screaming was a nice touch. The guy he found was really nice too - I would've told him to get bent.
Re:Short answer (Score:5, Insightful)
In the end, people may end up needing strong authentication tokens. When you go to the bank, you'll present your token so they know it's you. When you sign up for a new account, you'll get that account added to your token. And, when you hit a phishing web site, your token will light up and say "UNKNOWN WEB SITE".
And it could work both ways. If you use an ATM in a seedy bar, you could even ask your token to identify the legitimacy of the ATM.
The disadvantage, of course, is either a plethora of tokens (one per account) or every Tom, Dick and Harry shop wanting to use your token for marketing and tracking purposes.
Re:Short answer (Score:4, Insightful)
In the paper, one guy was very paranoid. He opened a second browser window, and typed the site name by hand, and did comparisons. Even he got one wrong. Phishing is a very, very hard problem to solve.
I think the point is that, since you can copy verbatim the HTML of a web site, it is trivial to create an identical copy of any site. So, trying to look for similarities and differences between the sites is a pointless exercise.
The real way to avoid being stung by phishing scams is to know that emails from anyone asking for personal or private information, passwords, credit card numbers etc. are almost certainly fake.
Re:Short answer (Score:2)
That said, you're right that it's never a good idea to click on a link in an unsolicited email, and that is certainly the best approach for nonexperts (and experts, really).
Re:Short answer (Score:2)
You mean your driver's license? I always have to show them mine when I go.
Re:Short answer (Score:3, Interesting)
Not paranoid enough, by my standards. I don't think they mentioned one single person using any tools other than web tools. The one who looked stuff up via Yahoo was a start, but just a start.
Whenever I have the least suspicion of any web site, I start probing DNS and whois. I try to make sure information I get via non-compuer channels matches what the computer tells me, and so forth.
I wonder if I'd fall for any of the sites they used. I like to think I wouldn't,
Re:Short answer (Score:2)
Re:Short answer (Score:2)
Re:Short answer (Score:2)
Re:Short answer (Score:2)
Mmmmmm...Phish 'n chips. Looks like it's lunchtime.
Re:Short answer (Score:2)
No problem if the chip can only identify the bank. There should be no private key on it, so if you lose, the phisher will be able to identify the bank, and you only need to go there and get another token.
Re:Short answer (Score:3, Insightful)
Phishers encounter an incredibly favorable ecosystem out there, with a high density of ignorant fools
Re:Short answer (Score:4, Insightful)
I'd agree on the concept, but the actual cause is different. The actual reason is because people believe that the word gullible is not in the dictionary.
Recently, there was an "employment agency" that sent out paper forms to applicants which were to be filled out and mailed in with a $20 cheque for a processing fee. The forms included sections for the Social Insurance Number, Driver's License number, DOB, mother's Maiden name, and other information not normally used by employers.
Their intent was to obtain credit cards from banks with the applicant's personal information - hence, they used four different company names. The good news was that they were raided.
Re:Short answer (Score:2)
Too true
But back on-topic, that's what's most amazing to me, that more people don't know what information a type of institution should have. Or that more people
Re:Short answer (Score:3, Insightful)
Way OT now, but when I was in high school, an A was 86%, and in math and most sciences, homework counted for 10% of my grade. I was so cocky I was able to still get an A without doing any homework.
Fucked me up in University though haha...
Re:Short answer (Score:2, Funny)
Critical thinking and Reading skills (Score:2)
In defense of the clueless (Score:2, Informative)
Few have a clue about its tumblers and other doodads and geegaws.
How many understand how a car works? "Yeah, I know how it works, you put the key in and turn it, then you drive away."
A certified Ford mechanic knows about the car's crankshaft, cylinders, pistons, fuel injectors, all the other components and how they're put together as well a
Re:In defense of the clueless (Score:2, Insightful)
General Motors doesn't have a "help line" for people who don't know how to drive, because people don't buy cars like they buy computers -- but imagine if they did . .
HELPLINE: "General Motors Helpline, how can I help you?"
CUSTOMER: "I got in my car and closed the door, and nothing happened!"
HELPLINE: "Did you put the key in the ignition slot and turn it?"
CUSTOMER: "What's an ignition?"
HELPLINE: "It's a starter motor that draws current from your battery and
Re:Short answer (Score:2)
That's too complicated. Sad, but true. I've tried to explain to my parents time and again regarding similar security tactics, and I'm only met with blind stares. My mom looks at anything "bad" as a virus, and that's as far as she is willing to learn. No matter how often I reply to everyone in a mass forward regarding the stupidity of whatever "virus" warning they're sending their entire address book, the next one comes straight to me again.
You cannot convince people what is the "
Re:Short answer (Score:2)
Social engineering anyone? (Score:5, Insightful)
And this might be optimistic (Score:5, Insightful)
Humanity is doomed.
Re:And this might be optimistic (Score:2)
Re:And this might be optimistic (Score:5, Funny)
A common formula for the IQ of a group is to take the IQ of the highest member of the group, and divide by the number of people in the group.
The highest IQ is the US is that of Marilyn Vos Savant, estimated at 228. (That's the high estimate. Might as well give the benifit of the doubt.)
The population of the US is 295,734,134, according to the CIA world factbook.
That means the IQ of the US is 7.70962746×10^-7.
Re:And this might be optimistic (Score:2)
Mr. Savant's household has a higher collective IQ than his town. His town has a greater IQ than his state...
I have another theory (Score:4, Interesting)
Re:I have another theory (Score:3, Funny)
Simply because .... (Score:5, Funny)
That is all
Not surprising (Score:5, Insightful)
It's like P.T. Barnum said, (Score:5, Insightful)
Don't get me wrong, I applaud these researchers and all other approaches to making the web a safer place, but in the end, at some point you have to trust that the user is going to take resposibility for their actions. The best we can do is bring the percentages down. The problem is it is so cheap to set up a phishing web site, that even if only one in several thousand potential targets fall for it, that's usually enough to ensure a profit.
Re:It's like P.T. Barnum said, (Score:3, Interesting)
stop blaming The User (Score:2)
Listen, we can put an evil Devil's face on the browser, along with flashing neon lights and big signs that say "WARNING: This site is suspicious", and a gloved hand that comes out of the monitor and slaps the user silly, and you know what? People will still fall for these scams!
From the article summary: Some users think that favicons and lock icons in HTML are more important indicators.
Want to take a guess why they think that "lock icon" is so important? Because for years they've been told by "toolt
stop blaming users (Score:3)
Listen, we can put an evil Devil's face on the browser, along with flashing neon lights and big signs that say "WARNING: This site is suspicious", and a gloved hand that comes out of the monitor and slaps the user silly, and you know what? People will still fall for these scams!
From the article summary: Some users think that favicons and lock icons in HTML are more important indicators.
As some other posters pointed out, "these were above average users, we're doomed". Not exactly the world's best paral
I don't know which upsets me more... (Score:3, Insightful)
Re:You do (Score:2)
common sense, people! (Score:2, Insightful)
Re:common sense, people! (Score:2)
I've almost been duped (Score:2)
They sent me an html email with a link that looked like it was going to my bank but actually went to an ip address in taiwan. The webpage they loaded created a popup window asking for login information and then used meta-refresh to load https://www.mybank.co.uk./ [mybank.co.uk]
Their login popup was presented in a look and feel that was completely consistent with my bank, and behind it was my real bank
It's Always Going to Work (Score:5, Insightful)
To disrupt or completely stop this from happening is currently an impossible Herculean task.
Even netting one person can result in thousands of dollars worth of damages. If one in every one million phishing works, of course they'll keep doing it.
Re: (Score:2)
Re:It's Always Going to Work (Score:5, Informative)
supposedly reputable financial institutions.
For example I received an email purporting to be from American Express,
one of the links in it was of the form that showed
https://www.americanexpress.com/messagecenter [americanexpress.com],
however it actually pointed to
http://www65.americanexpress.com/clicktrk/Trackin
i.e It purported to be a secure link, but actually was not.
It piped the request through another (insecure) URL.
I sent it on to the American Expresses Phishing people, and got only an
automatic reply.
Finally I phoned American Express Customer service who assured me that it was real,
on the basis that they did actually send out emails like that. (!!!!)
It showed all the hallmarks of a phishing email, and yet ultimately was genuine.
How I am ever going to explain to Aunt Mary what signs to look out for
in phishing emails, while the real financial institutions send out
stuff like this, I don't know.
You're right, it is a Herculean task.
Re:It's Always Going to Work (Score:2)
At first blush it might seem like a good idea. But consider that such a tool could just as easily be turned against legitimate businesses/sites. Like a gun, it can't be made smart enough to just target bad pe
It's all about sight, sound, and experience (Score:2)
People believe what they hear, even when it shouldn't be there.
And people's experience shows that 99 percent of everything they see on the Internet must be true, or it wouldn't be written down, like for example the obvious Fact that not only is the Moon made of Yellow Cheese, but it's quite tasty.
Get ready for on-line voting? (Score:2, Funny)
"Dauh, I thought I voted for the other guy when I clicked his picture in the e-mail reminding me to vote!"
DRTFA (Score:5, Interesting)
People fall for phishing because:
Re:DRTFA (Score:5, Interesting)
Dude you seriousally underestimate the stupidity of the average human.
I have seen people at the ATM intentionally swipe their card through a "card cleaner" stuck to the wall that was a reader.
99% of the masses do not understand any of the technology they use daily in any way. They do not understand basic safety (Driving 4 feet from someone at 90mph is unsafe and stupid) and to top it off, they have to be told not to insert curling irons into a bodily orfice, and other things. Humans are too stupid to use most products safely which is why everything has a damned disclaimer on it.
I will bet you that someone in Manhattan right now is getting a bridge sold to them, and they are seriousally considering it!
Obligatory (Score:2)
Light a fire, and the man stays warm till it is put off, set him on fire, and he stays warm for his lifetime.
Re:Obligatory (Score:2)
Re:Obligatory (Score:2)
Need I say more?
I thought I did once... (Score:5, Interesting)
I got an email saying that my student loan company needed some more information to give me the loan. I had to log into thier website to check out what exactly it was and what I needed to send in.
I just clicked the link in the email and typed my login information (of which the username is my SSN) and got a message to the effect of 'password incorrect, please try again.'
I did this two or three times with some of the different passwords that I usually use...and then I thought about it.
Oh fuck! The address bar said 'www.terri.org' and my bank was Chase. I freaked out, thinking that I'd fallen for it...
Turns out terri is the company that processes the loan or whatever and I had just mistyped the password. But I reminded myself to not be so trusting on the internet, and always re-type the site in for things like that...
Re:I thought I did once... (Score:5, Insightful)
It's a complete failure of the financial institution to realize they are creating situations where it is incredibly easy to teach bad habits.
They should not be sending emails with links in them at all. (Better yet, no emails not already contained in the online banking web site where the user is already logged in.)
So a HUGE portion of this problem is there _are_ legit emails that go out where there should be NONE.
It's a little like teaching your cute little 14 year old girl with the budding boobies that all guys really do love and respect them and are all christians and tell the truth especially if they are 40 or older and have their own van. Yeah it may be true most of the time but the concequences sure are high.
A little paranoia is a GOOD THING.
A bank expecting the average user to differentiate between good emails and bad emails is just stupid, stupid, stupid. They should KNOW better. There should be flat laws against it and the problem would go away overnight.
409 scams still work so why not phishing? (Score:5, Interesting)
Even after the guy knew it was a scam and promised his son he wouldn't send any more money, he still did it anyway!
Maybe a bit different than a phishing scam but along the same lines.
This just in. (Score:2)
Other amazing developments include discovery water is wet, fire is hot, the sky is blue.
Film at 11!
People get surprisingly confused (Score:2)
The problem goes right down to the SSL layer (Score:5, Insightful)
For Anti-Phishing to work it needs a UI with support right down into the SSL layer.
Currently it's next to impossible to diferentiate things on the web. It's the great equalizer, and as we are finding, it makes things *too* equal. You are on equal footing with a bank when trying to convince people to enter finantial information. We need a bit more structure, a few more checks and balances.
Re:The problem goes right down to the SSL layer (Score:2)
Nonsense (Score:2)
Instead one should teach to make people learn the indicators: Creditcard companies should mail out phishing spam out themselves, an block every cardnumber they harvest. Lather, rinse, repeat. Only after they show in some test that they have the required knowledge should their cards be reinstated/reissued. Repeat offenders pay a pretty high reissue fee.
Nonsense (Score:2, Insightful)
Con-artists are older than recorded time. Snake-oil salesmen, crooked used-car lots, (snail) mail scams and their ilk are likely at least as prevalent even in our quasi-"Information Age".
How many educated people have bought a lemon? I've known otherwise educated, extremely intelligent college-educated (students and grads alike) who've done this. Perhaps everyone should be fully educated about the hazards of auto-buying, phishing web-sites and maybe get a medical degree for proper evaluation of physicians
Re:Nonsense (Score:3, Insightful)
Phishing is a whole new level. Crooks have instant access to *millions* of targets. Email is free.
I'll admit it... (Score:2)
An email was sent out that looked exactly like an official email and was linked to a page that looked exactly like the employee intranet page.
I let my guard down just a tiny bit and got snagged.
Phishing works because people are sometimes stupid and frequently lazy.
Re:I'll admit it... (Score:2)
Re:I'll admit it... (Score:2)
I actually had a similar experience to what you described in my fore-mentioned folly. It asked for my SecurID code which the normal intranet site didn't. It was at the end of a long day and my brain was too toasted to raise a red flag.
There's a sucker born... (Score:2)
On a related topic, I was trying to pay my Bank of America bill online yesterday and they had some new security system (called "SiteKey", I think. Probably (r)(tm) and whatever) where it gives me some picture and also had me provide 3 answers to 3 questions (like lost password questions). Now, I kind of went through it quickly, but I was under the impression that whenever I login, it was supposed to show me the picture (my Site Key) and told me not to use the s
I never thought my family was this stupid.... (Score:2)
A few months ago, my sister freaked out when someone broke into her PayPal account.
I didn't find out until just a week or two ago that this was the direct result of her falling for a phishing attack - and that my mom fell for it too! They're lucky I live 12 hours away so I could smack them both upside the head. I'm not exactly shocked that my mom fel
Favicons (Score:2)
this just in! people are stupid! film at 11! (Score:2)
Re:this just in! people are stupid! film at 11! (Score:2)
I am going to notify the FBI, CIA, SEC, DEA, HLS, and sue you for copyright and DMCA violations!
I will be rich, rich I say!
Doesn't seem likely. (Score:2, Funny)
While I don't mind taking a swipe at M$ft from time to time, I find it difficult to imagine how a brightly colored red address bar (even one outside the focus of attention) with "Phishing Website" written on it will be ignored.
The only thing (and I am keeping in mind users that are not extremely tech savvy) that would be more obvious would be
While ISPs learn to block... (Score:5, Informative)
As bosses would say "It's a win-win!"
URL? (Score:2)
I've had support calls here at the *hospital* from *doctors* who are trying to 'log in' to their computer in the Address Bar of IE.
Phishing has the highest job security rating on the planet.
like Nigerian letters work too (Score:2)
Judging by the fact I still get several of these emails a week, and used to get US mail paper letters in the 1980s; they perputrators are getting results from less than one per million emails. But someone is still making money.
Plug: my own anti-phishing Firefox extension (Score:2)
http://www.maryanovsky.com/sasha/smokedsalmon/ [maryanovsky.com]
You have to admit it has the best name :-)
Clueless Companies (Score:2, Interesting)
I am a registered at the BBC Shop. I have allowed them to send me email and they have been sending some offers. Lately the links in the email seem to go to http://bbcshop.msgfocus.com/ [msgfocus.com] with some unique id added. Even to the point that a link that has a text "bbcshop@bbc.co.uk" and looks like an email link is actually a link to a http request at the bbcshop
Three reasons (Score:2)
The three reasons phishing works:
1) People are stupid
2) More people have computers than should have them
3) People are too lazy to learn how to properly use anything they own
Computers should require an access card for use. An "I'm smart enough to use a computer" card. Initially getting the card should require a few months of testing and certification. What you are t
Why Phishing Works: Users are dumb (Score:2)
SLASHDOT ERROR (Score:2)
Phishing works, no argument but... (Score:2, Informative)
However, with regard to TFA, I have some doubts about their data. First, they use *only* 22 participants, which is a horribly low number. They give no background information of how they chose them. It could have just been 22 of their friends that they could con into playing with some web pages.
Also, there are no controls wi
Maybe it's genetic (Score:3, Interesting)
I recall hearing about a study wherein monkeys were given the option of pressing one of two buttons at mealtime. Button A would always produce normal food. Button B would infrequently produce a treat, and usually produce nothing. The monkeys always pressed Button B.
(I know, you can't let monkeys starve to death in an experiment, so it wasn't perfect perhaps, but it makes my point.)
Shifting gears just a bit -- I have wondered for a long time myself how humanity has accomplished all that it has when such a large proportion of humans (those in charge of things as well as not) are complete morons. It seems to defy logic.
Let's presume that the results of that experiment are correct. (If anyone has a link to substantiate my claim, I would appreciate it.) Monkeys gamble; they try to get something for nothing instead of going for the sure steady payoff. The inference, of course, is that humans do the same thing.
Perhaps, over the long term (and I'm talking generations long), the "gambles" that individual human beings take pay off to the benefit of humanity as a whole. Think of the vast numbers of people, in attempts to invent fireworks, who must have blown their fingers or hands or heads off. People still do it. That's individual stupidity.
But we've gone to the moon, we've sent probes to far-off planets, we have a world-girdling network of communications satellites. None of that would have been possible without the moronic work of tens of thousands of individual idiots.
So, my hypothesis is as follows:
The sum of individual stupidity is communal success.
It's not tools, or language or brain size that sets humans apart from the beasts. We are more successful as a species because we are stupider as individuals.
Oh You mean like this eBay Login Page. (Score:3, Interesting)
Three words: "Outlook" and "HTML email" (Score:3, Interesting)
Chances are, if the user had to copy and paste the bank's URL out of the email, it would be a lot harder to hide the fact that the URL directs to some non-official site (bankofthevvest is a counter-example, but it would still help). Most likely, people would type in the banks URL and create a bookmark. Then when they got the email they would open their browser and click the bookmark and log in. Problem eliminated.
This isn't an IE/Outlook problem only, I admit. There are a lot of mail clients that provide this same "helpful" behavior. But as with auto-executing scripts in the OUtlook preview pane, it would be better (IMO) if they didn't.
Re:I would think its obvious why (Score:2)
I think anyone who uses outlook to schedule meetings should know this, especially if they are in a global org.
-nB
Re:OT: Timezones (Score:2)
Just turn the phone off and back on and it should say something like "timezone changed, time updated"
Re:Why phishing works (Score:3, Insightful)
It works because a lot of people are idiots.
Not idiots, but ignorant people who don't care and don't want to know how the technology works that they use.
Tux2000
Re:Why phishing works (Score:2)
The monkey is far more likely to be entertaining. It may throw its own feces at you.
Re:Why phishing works (Score:3, Insightful)
Otherwise known as "idiots."
I mean, really. If you fall into that category, what distinguishes you from a monkey pressing a lever?
On a long enough timeline of exposure to different situations in life we are all idiots by your criteria, instead of just being ignorant of a particular situation. Idiot has a connotation of being mentally retarded and unable to improve where being ignorant is a lack of education or knowledge.
I would not call you an idiot for being unable to descern the two terms; just ignoran
Re:Why phishing works (Score:2)
Hey, at least they got some grant money to do a study of the obvious. That shows a fair amount of smarts right there.
Re:Why phishing works (Score:2)
That's consultancy for you.
Never underestimate the amount of money to be made stating the obvious.
-ed
Re:Why phishing works (Score:2)
Okay, this is just a stupid statement.
First, this study actually provided specific reasons why phishing works. Even if you concede the reason is because people are idiots, there's a lot of different ways they can be idiots.
Second, and more generally, if we never tested anything that appeared obvious we would never have figured out that light travels, that neglecting air resistance things of different weights fall at the same speed, and that goin
Re:I'd Probably Get Phished.... (Score:2)
I always chuckle a little when I get mail on my FreeBSD-ports account purporting to be from ebay, or Paypal going to great lengths (searching for the contact address on some software I wrote) to notify me about account p
Re:Sender Policy Framework...?? (Score:2, Interesting)
If people published it. I've been getting chase.com phishing mails. I check SPF at the mail server, but chase has ~all, so it's a soft fail if someone sends from another server, next to useless. Same for hsbc.com, paypal.com et al.
So if the banks won't publish decent SPF records when SPF is 2+ years old now, what hope do you have of them adopting something new?
Re:"Why Phishing Works" (Score:2)
Exactly. People are way too dumb to detect all but the cheesiest phishing e-mails and Web sites. How are people supposed to be masters of the technical knowledge required to detect a phishing attempt? Most of them are way too clueless about computers overall. IT security is ridiculously obscure to the average user; don't even get me started on things like phishing! engagebot said it best when he stated this in his response to this article:
I've had support calls here at the *hospital* from *doctors*
Re:You Password Information is Incorrect (Score:2)