What can be done to prevent context aware attacks?
August 6th, 2005More and more people recognize the increasing threat of identity theft, where high-volume Internet based attacks (referred to as phishing) are the most commonly seen threat.
In contrast to what much of the current media coverage tells us, phishing is not only a threat to individuals and their personal savings, but also to society as a whole. One reason is that organized crime can use large number of accounts to perform money laundry — be it for drugs or to fund terrorism — simply by performing small payments to and from such accounts. Namely, if a criminal credits and debits accounts he controls by transferring money between them, he can move large sums of money in a way that is very hard to trace. More in particular, if each account has the same in-flow as out-flow of money (although not necessarily the same number of in and out transfers) then the account owners would not be financially affected by the attack, and may in fact not even notice that it takes place. However, as is well understood in theoretical computer science, the actual source and destination of funds would be very hard to trace, at least of several “hops” of payments are made, and a large number of accounts are involved.
Phishing is prominent today because of the low costs of performing it, the slim chances of detection, and the reasonable number of consumers that fall for the scams. However, it is commonly held that phishing will become an increasing problem if attacks become more convincing — by using information specific to the intended victims. One way would be to use supposedly private information in the emails — such as mother’s maiden names. In a recent study, it was shown that mother’s maiden names can be inferred from public databases with a very high success rate. (http://www.informatics.indiana.edu/markus/papers/mmn.pdf). Another approach is to infer personal relations and use these to target individuals — perhaps to download programs that appear to be innocuous screen savers, but which in reality log keystrokes. (A related experiment is described at http://www.indiana.edu/~phishing/social-network-experiment). As yet another example of this type of “context aware” attack, phishers would rarely be successful if sending consumers email notices appearing to come from banking institutions that the victims in question are not doing business with. The success rate would balloon if phishers could target victims better. As we show here, this is not difficult at all. All in all, context aware phishing (a term first coined in http://www.informatics.indiana.edu/markus/papers/phishing_jakobsson.pdf ) pose a serious threat.
It is important to understand these threats in order to better protect ourselves against them. While it is unlikely that there is any one protection technique (apart from unplugging one’s computer!) there may be a collection of these that, in coordination with each other, builds a better protection. Such techniques may involve a lesser reliance of “semi-secret” information; better technical constructions for alerting users of threats; stronger privacy laws; and a more unified defense by technology providers, corporations in general, and government agencies.
In a series of studies performed at Indiana University, we are investigating next-generation phishing threats, and developing countermeasures where applicable. If you are interested in learning more about either of these efforts. please contact us at phishing@indiana.edu. Please remember to specify what your background is, and how we best can help you.
Markus Jakobsson
Associate Professor of Informatics at IUB
Associate Director of CACR