Krenor Lorrie Faith. Don't get caught, fish! Problems and methods of combating phishing


Protecting your computer Yaremchuk Sergey Akimovich

Fighting phishing and pharming

Fighting phishing and pharming

First of all, it is important to understand that banks, cash settlement systems, postal and other services and organizations never ask for codes and passwords that they have issued to clients. Banking systems and technologies are reliable and use a reservation system important information, so clients should not believe statements like “something is missing” or “something needs to be checked.” Any information that something happened to the bank can damage its reputation, so the bank will hide the problem rather than talk about it. The problem will be resolved quietly as you contact support. In addition, the administrator of any service has unlimited rights, so even if the system does not show your password, in a critical situation he will be able to use it without your help, and a letter will be sent to your contact address explaining the situation, although such a case would be out of the ordinary .

Phishing emerged because obtaining data from a client is an easier option than hacking protected banking systems, so you shouldn’t fall for scammers’ tricks. Listen to the following tips.

When you receive a letter from a bank, consider whether it could really be the sender.

Never respond to or ignore emails or ICQ messages requesting personal information and financial information, even if they come from seemingly reliable sources.

If you receive a suspicious email, do not open attachments. Contact the person or organization listed in the field directly From, or service support.

Check the URL of any site that asks for identification information. Make sure that the session started with the correct website address and that there are no extra characters added to it.

Use an antivirus, firewall, data integrity monitoring systems, and other security systems discussed in previous chapters of this book. Update on time software installed on the computer.

Avoid using online banking on computers that are not under your control. Public Internet cafes are especially unsafe; it is also not recommended to use the computers of friends and acquaintances.

Always log out of web-based services using provided funds. As a rule, there is a special button for this, located in the upper right corner of the page ( Logout, Sign out or Exit). This will prevent anyone who uses the computer after you from using the browser cache to restore the session.

Some sites have signed certificates, and it only takes a few seconds to determine whether the website you are opening can be trusted. For example, in Internet Explorer to view such a certificate in the menu File you need to select an item Properties. In the properties window, click the button Certificates and check if the website has valid certificate, issued official organization. In Firefox, you can do this by running the command Tools? Page Info(Tools ? Page information) and in the window that appears, go to the tab Security(Safety). Unfortunately, most Russian resources do not use such a certificate.

If you suspect you have provided your password in response to a phishing email or entered it on a fraudulent website, change it as soon as possible. Check regularly bank statements and credit card reports: scammers often don’t take a large sum immediately, but extort money gradually, counting on “long-term cooperation.”

Does not currently exist ready-made solution, which allows you to recognize pharming and phishing using one program. To protect against phishing, the developers of the most common Internet browsers have agreed to use the same methods to inform users that they have opened a suspicious site that may belong to scammers.

Newer versions of some web browsers have this feature. For example, Microsoft's phishing filter is available in Internet Explorer 7, which is designed for Windows systems XP with Service Pack 2 installed and for Windows Vista. It scans and identifies suspicious websites and provides timely updates and reports on phishing sites found. If you did not enable the anti-phishing feature during the installation of Internet Explorer 7, you can do so at any time by running the command Service? Anti-phishing. The anti-phishing feature recognizes two types of websites:

Web sites suspected of phishing attacks: when you go to such a site, the anti-phishing function displays a yellow warning;

Sites that have been subject to phishing attacks: If you try to visit such a site, the anti-phishing feature prevents you from doing so and displays a red warning, after which you cannot enter any data on this site.

A new toolbar is available for Internet Explorer 6 or earlier users Windows Live (http://toolbar.live.com/ ), after installation of which you need to activate the function OneCare Advisor. In the future, this feature will work similar to anti-phishing in Internet Explorer 7.

For everything to work, you must have Windows XP with Service Pack 2 installed. If you are using an earlier version operating system Windows or another system like Linux, I advise you to use the built-in Netcraft Toolbar, developed by the Anti-Phishing Working Group, which combats phishing ( http://www.antiphishing.org/ ). The panel is available in two versions: for Internet Explorer and Firefox web browsers. To install it, go to: http://toolbar.netcraft.com/install and in the region Choose version Click the button corresponding to the web browser you are using - a request to install a new module will appear.

After restarting the browser, a new panel will appear in its window. When you go to the site, it will be checked, and the indicator Risk Rating will display the site's risk level (Fig. 7.6). If the color is green, this means that the site is known to Netcraft and has been registered for a long time (the year of registration and country will be shown next to the risk level), its location corresponds to the registration, no falsifications of this site or from this range of Internet addresses have been previously noticed and the site uses a standard port. A discrepancy between at least one of these parameters will lead to a deterioration in the resource’s rating. The color of the panel will change from yellow (attention) to red, indicating danger.

Rice. 7.6. Risk Score in Netcraft Toolbar

By the way, at the address http://www.antiphishing.org/phishing_archive.html can be found a large number of real examples phishing letters.

Kaspersky Internet Security, discussed in Chapter 5, provides protection against phishing attacks by monitoring attempts to open known phishing sites and blocking them. The list of sites is updated with addresses provided by the Anti-Phishing Working Group when threat signatures are updated.

From the book Megabit Bomb by Lem Stanislav

From the book Computerra Magazine No. 729 author Computerra Magazine

NEWS: The fight for cleanliness Author: Kiwi BirdThree stories from current IT news from different angles highlight the always relevant topic “about the dirt in our lives and the means of getting rid of it.” Story number one is about the extremely original idea of ​​​​the Sony corporation, which promised

From the book Computerra Magazine No. 37 dated October 10, 2006 author Computerra Magazine

ROOM 13: Fighting Evil Author: Ilya Shchurov Voyager There are many things that need to be done. Lots of programs to develop. Lots of discoveries to be made. Lots of books to write. Lots of films to make.

From the book PC Failures and Errors. We treat the computer ourselves. Let's start! author Tashkov Peter

From the book Protecting Your Computer author Yaremchuk Sergey Akimovich

6.2. Fighting potentially dangerous programs The rate at which Spyware is spreading is rapidly increasing. A recent report from security company McAfee states that only three in a hundred Internet users can determine how secure a

From the book PC Failures and Errors. We treat the computer ourselves author Dontsov Dmitry

Fighting dust Dust, like instability of electricity, also poses a certain threat to the operation of the computer. Why is it harmful? Firstly, dust shortens the life of any mechanical and electronic devices. How does this happen? Very simple. Let me give you an example. Dust,

From the book What Delphi books don't write about author Grigoriev A. B.

From the book In the Beginning There Was command line by Stevenson Neal

Class struggle of desktop systems Now that the third rail is firmly grasped (an idiom referring to the conductive rail of subway lines, the purpose of which is not entirely obvious to many passengers - approx. transl.), it is good to note some facts: like any public

From the book Windows Vista. Tricks and effects author Zozulya Yuri

5.2. Autostarting applications and combating it Managing applications running in the background Some programs can start automatically every time the operating system starts. Typically, such applications place their icons in the notification area and run in

From the book Meet the Laptop author Zhukov Ivan

Fighting viruses “Why do we need anti-virus programs?” - this is a rhetorical question. The most frequent action that users do on the computer both during work and during rest is access to the Internet, where there is so much harmful

From the book Linux through the eyes of a hacker author Flenov Mikhail Evgenievich

9.5.5. Fighting banners and pop-ups In the company where I worked, a new employee, and in the first week we experienced an increase in traffic. This happens to everyone, because any new Internet user starts looking at all the pages in a row. Over time, interest

From the book Anonymity and Security on the Internet. From the “teapot” to the user author Kolisnichenko Denis Nikolaevich

9.5.7. The fight against prohibited sites I recently talked with one of my friends, and I liked his definition of the Internet - the network was created and lives by pornography. I'm not sure, but it seems to me that he is right that traffic from sites with intimate content is the highest (if not

From the book Internet for Rusty Dummies author Levina Lyubov Trofimovna

From the book Computer Terrorists [ Newest technologies in the service of the underworld] author Revyako Tatyana Ivanovna

Fighting Fraud How do people fight online fraud? Yes, in fact, no way. Various information sites are just being created and articles are being written about Internet fraud. Various blacklists, etc. do not contain practically any valuable information,

From the book Linux and everything, everything, everything... Articles and columns in LinuxFormat, 2006-2013 author Fedorchuk Alexey Viktorovich

Lorrie Faith Krenor

Don't get caught, fish! Problems and methods of combating phishing

Lorrie Faith Cranor is an associate professor of computer science and technology and public policy at Carnegie Mellon University and leads the Privacy and Security Practice Lab, where she directs anti-phishing research. She also recently co-founded Wombat Security Technologies, which aims to bring products developed by her group to market. Krenor has published four books and many scientific articles about the protection of information in networks, phishing, spam, electronic voting and other subjects related to information security. She hopes that over time people will stop perceiving the expression " practical safety"like an oxymoron.

Basic provisions


Phishing is a type of online crime that involves defrauding people of confidential or classified information. It already costs victims billions of dollars a year, and its threat is growing. Since phishing is based on human weaknesses, studying the factors that determine people's propensity to take the bait will help educate users and improve anti-fraud technologies. To combat phishing, we need to join forces law enforcement, information security specialists and ordinary users.

Behind last week I received a ton of emails: warnings from several banks about blocking my credit cards, a reminder from eBay to change my password, a notification from Apple about unpaid bills for downloaded music, an airline offering to make a quick $50 by filling out a survey, and a request from the Red Cross to donate money to a fund to help those affected by the earthquake in China. On the face of it, this correspondence did not arouse any suspicion. However, all the letters, except for the message from eBay, were fakes, known as "phish" (a distorted version of the English word fish - "fish").

Fraudsters masterfully compose messages on behalf of respected organizations and usually call for urgent actions to avoid unwanted events or to earn something. The goal is to induce a person to go to a certain website or call a certain number and give out their personal information to scammers. Sometimes all you have to do is click on a link or open a file attached to an email for your computer to become infected with malware that allows a phisher to extract necessary information or control the victim's computer to carry out further attacks. Each phishing attack has its own characteristics, but the result is usually the same: thousands of careless victims provide criminals with information that is then used to steal money from bank accounts or obtain sensitive information.

An international consortium of online fraud organizations monitors phishing activity. In 2007 total number Phishing sites detected each month reached 55,643. About two hundred company names or logos were used each month to deceive victims into believing they were dealing with reputable organizations. According to the consulting company Gartner, in 2007, 3.6 million Americans were caught in the fittings, whose total losses exceeded $3.2 billion.

The stakes are high, and experts information security They are developing increasingly sophisticated filters for email clients and web browsers that can detect and register phishing attempts. Although such programs help stop many attacks, phishers are constantly changing tactics, trying to stay one step ahead of security technologies. Phishing is based on exploiting human weaknesses, and for the attack to be successful, the victim must succumb to temptation and take action. certain actions, so the problem is not just technology. So my group at Carnegie Mellon University is looking for the best ways training people to recognize and protect themselves from phishing attempts. We also educate people on how anti-phishing programs work so that users can use them correctly. Since the human factor is key to the success of phishing attacks, we have come to the conclusion that it can also become an important weapon in the fight against phishing.

When we first tried to understand why people get scammed in 2004, my colleagues Mandy Holbrook and Julie Downs conducted a survey on the streets of Pittsburgh. It turns out that most people don't know anything about phishing. Some have heard of email scams using titles financial organizations, but did not realize that messages purporting to be from merchants could be fraudulent. Few people can detect a fake message: the reliability of emails is usually assessed by external signs, such as the presence of a logo and professional text style. Many users do not understand the meaning of warnings issued by web browsers and do not know how to use clues contained in web addresses and messages to check the authenticity of the messages.

When the need to educate Internet users about phishing became apparent, we began reviewing current efforts in this area to understand why we were not seeing results. We found a wide variety of anti-phishing websites created by companies, government agencies, and industry associations. Some of them were overloaded with technical jargon and contained more information than the average user could understand without technical education. Few sites provided a good basis for raising people's awareness of the dangers of phishing, and they did little to help people protect themselves from it. Laboratory studies have shown that some of the materials that best explain the dangers of phishing make people overly suspicious of legitimate websites.

Even worse, warnings about phishing attacks that companies send to their employees and customers often go unheeded. During the experiments, volunteers read phishing emails much more willingly than messages about information security. Research has shown that abstract awareness of phishing does not automatically translate into protection.

Based on the insights received, my group members Ponnurangam Kumaruguru, Alessandro Aquisti, and others developed the PhishGuru training system, which provides anti-phishing information after a user falls for a fake phishing email. The program contains a set short messages, indicating necessary actions and presented in cartoon form, where a character named FisfiGuru explains to potential victims how to protect themselves. People who watched these cartoons after falling for simulated phishing messages were much less likely to become victims of real attacks in the future.

Building on this approach, my graduate student Steve Sheng developed an educational game, Anti-Phishing Phil, that teaches people how to identify suspicious sites and demonstrates how people get scammed. Players take on the role of Phil, a young fish who must study the addresses associated with the worms he knows and determine which ones are safe to eat. If Phil tries to grab a worm with a fraudulent address, he is hooked and snatched out of the water. Then an older, wiser fish appears on the scene and explains where Phil went wrong. Through laboratory and field testing, we have shown that this game significantly improves people's ability to identify fake websites. A comparison of user behavior before and after training showed a significant reduction in the number of times phishing sites were mistaken for legitimate sites and legitimate sites were mistaken for phishing sites. Those who completed this game were superior in these indicators to those test participants who were trained from manuals or materials from other sources.

Although we have shown that we can train users to protect themselves from phishers, even trained users should remain vigilant and should periodically repeat the training to stay on top of new phishing tricks. In 2008, the number of programs and sites designed to steal passwords increased sharply. Another growing threat is spear-phishing (“hunting with a spear”), i.e. attacks tailored to specific potential victims. Such an attack could take the form of an email message to a company employee from the company's manager, which is intended to inspire confidence and encourage the employee to open the attachment. Information available on corporate websites and online community sites can help attackers compose such targeted messages.

Since phishers never sleep, you can’t expect users to be able to protect themselves. Our group is developing automatic filters that can recognize phishing attacks. However, the effectiveness of such filters seriously depends on the correct reaction of people.

Comprehensive protection
Many browsers already have built-in security filters and can work in conjunction with other programs to identify suspicious sites. But even though anti-phishing software will detect phishing sites, it will be of little use if users ignore its warnings. To understand why users don't pay attention to warnings, my graduate student Serge Egelman sent phishing emails to volunteers participating in our research. If recipients were fooled and clicked on the link, a warning message appeared on their screen. Egelman discovered that browser users Mozilla Firefox 2 heeded these warnings, but those using the Microsoft Internet Explorer 7 (I-E7) browser often ignored them. As we found out, so a big difference in the reactions of the two groups of participants was due to the fact that IE7 browser users either did not notice the warnings or confused them with warnings about less serious dangers.

Microsoft has learned its lesson, and in the next version of the browser (IE8) the warning texts are made clearer, similar to the corresponding warnings in the Firefox browser.

Another important factor, which determines user confidence in automatic filter warnings, is their accuracy. The high probability of a false alarm, when a genuine site is mistakenly identified as fraudulent, can undermine confidence in the filter: after some time, the user will simply stop paying attention to the warnings. The anti-phishing filters we tested use several approaches to identify phishing messages and sites. Most commercial tools use constantly updated blacklists of phishing sites. Some tools also have a whitelist of genuine sites.

However, most filters go beyond lists. Some analyze every site a user visits and use a set of heuristic algorithms to evaluate its authenticity. In this case, the target becomes the same characteristics that we talk about in anti-phishing courses, for example, addresses starting with four numbers or similar to addresses of well-known brands. The filters also take into account other features that humans don't notice, such as the age of the site, since phishing sites usually only exist for a very short time, remaining active for only a few hours to a few days.

In the case of filters whose operation is based primarily on the use of blacklists, the effectiveness depends on time. We recently tested eight custom anti-phishing programs by providing them with the addresses of new phishing sites. It turned out that within a few minutes of receiving these addresses, most of these programs detect less than 20% of phishing sites, and after five hours - about 60%. Filters that used a combination of blacklisting and heuristic algorithms performed much better, detecting almost 90% of phishing attacks from the start of the test.

Our group is developing programs that use learning machine technology to detect phishing emails. It is widely used to detect spam, but spam detectors are not very accurate when it comes to phishing emails that usually appear to be genuine. Norman Sadeh from our group is working on creating a tool to analyze email messages for a number of characteristics that may indicate phishing. For example, phishing emails may contain text with hyperlinks in the form of addresses of known sites that actually lead to the phisher's site. Additionally, addresses in phishing emails often contain five or more dots and point to recently registered domain names. However, not all phishing messages have these features, and vice versa, sometimes these features can be contained in genuine email messages. So the researchers train the PhishPatrol program by feeding it a large collection of legitimate and phishing emails so it can analyze them and determine which combination of features with most likely may appear in phishing emails. In our recent experiments, PhishPatrol was able to detect more than 95% of phishing messages. The probability of a false alarm did not exceed 0.1%.

To identify phishing sites, we also used combinations of some of the features used by the PhishPatrol program with other approaches. Jason Hong leads our team in developing a tool called CANTINA, which analyzes the content of a web page in combination with other heuristics to determine whether the page is part of a phishing site. CANTINA first uses a well-known crawling algorithm to identify five keywords that are specific to a given web page but rarely appear on the Internet as a whole. For example, on the eBay new user registration page, such a lexical signature might look like eBay, user, sign, help, Jorgot. If you search for these five words on Google, a genuine eBay registration page will be among the first search results. Phishing sites that replicate this eBay registration page are unlikely to appear there, since one of the criteria for ranking web pages in Google's algorithm is the number of links to a given page from other pages, so genuine sites are most likely to end up at the top of the list. However, this approach does not guarantee freedom from errors, especially in the case of recently created genuine sites, so it is only one of several criteria considered by the CANTINA system when assessing a website.

To be effective, anti-phishing filters must employ criteria that are flexible enough to remain applicable to the ever-evolving tactics of phishers. A filter created by the author's group to recognize phishing sites in laboratory tests showed 95% effectiveness. In addition to using the usual heuristic procedures, the filter extracts a “lexical signature” of the keywords on the page and runs a Google search for genuine sites containing those words.

ELEMENTS and SIGNS OF POSSIBLE PHISHING

Domain age: does not exceed 12 months
Famous Images: There is a famous logo on the page, but it does not belong to the domain of the owner of that logo
Suspicious address: the address contains an @ sign, a minus sign, an IP address, or more than five dots
Suspicious links: The page link contains an @ or minus sign
Forms: page contains text input fields
The address does not match the address of the genuine site.

Evolving threat
In the information security community, we are not alone in constantly striving to improve technology. As security improves, phishers change their tactics accordingly. Phishing emails are now sent via ICQ and SMS. Phishers use online games like World of Warcraft and online communities like MySpace and Facebook to lure potential victims. Phishing attacks also use the creation of Wi-Fi access points in in public places and imitation of registration pages of real providers. The goal of these attacks is to determine the victims' passwords and infect their computers with malware.

Organized groups of phishers use thousands of hacked computers as starting points for their attacks. In particular, the Rock Phish gang from Eastern Europe uses hacked computers to transmit messages to phishing sites. This makes it possible to present files as being transferred from these computers and hide the true address of the phishing site, thus making it difficult for law enforcement agencies to find true source attacks. Another evasion tactic used by this group is a system that security experts call "fast flux." It lies in constant change/P-addresses of phishing sites on domain name servers (DNS).

Of course, the profitability of phishing is determined by the ability of phishers to convert numbers credit cards and others secret information in cash. Therefore, phishers usually attract “donkeys”: they offer people home work or make friends with them, convincing them that they need their help. Donkeys often end up being unsuspecting victims themselves, believing that they have been hired to do a legitimate job. However, the real task of the “donkeys” is to transfer the stolen money, and it is they who end up behind bars if anything happens.

Continuously improving anti-phishing filters and educating users about new types of phishing attacks will help reduce the number of phishing victims. Coordinating international law enforcement efforts and finding ways to make phishing less profitable would also help. However, the fight against phishing remains something of an arms race, and it cannot be completely defeated without uprooting it. Therefore, users need everything possible types protection.

Translation: I.E. Satsevich

"In the world of science", No. 2, 2009

ADDITIONAL LITERATURE

Phishing Exposed. Lance James Syngress, 2005.
Phishing and Countermeasures. Edited by Markus Jakobsson and Steven Myers. Wiley, 2007.
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. Steve Shengetal. in Proceedings of the 2007 Symposium on Usable Privacy and Security; July 18-20, 2007.
Behavioral Response to Phishing Risk. Julie S. Downs, Mandy Holbrook and Lorrie Faith Cranor in Proceedings of the 2nd Annual eCrime Researchers Summit, pages 37-44; October 4-5, 2007.
Information about laboratory research Lorrie Faith Krenor and links are available on the Supporting Trust Decisions website:

One of the types computer fraud got such an interesting name as Phishing. In English it means fishing, fishing. Only the criminals are hooked not on fish, but on the user’s confidential data. All this is done through cunning and deceptive actions.

For example, you receive an email with some tempting offer. Then, following the link, you are asked to enter your login and password, for example from your email. Often, attackers use brands of popular services (Mail, Google, any social networks) in such letters, changing only one letter in the address. Letters may contain text such as your account is blocked and you need to recheck authorization. On a fake site, you enter your data and thereby scammers gain access to your email account. And we often store passwords from other services in our mail.

Currently, the main goal of phishers is to obtain data from clients of banks and electronic payment systems. Carrying out certain rules, you can confidently protect your data from online theft.

Methods to combat phishing attacks

  • Do not click on dubious links or enter your data there. Check the sender's address
  • use an antivirus program that can block navigation to phishing sites
  • Use browsers that warn you about phishing threats. These include GoogleChrome, MozillaFirefox, Opera, Yandex.Browser
  • check yours constantly bank accounts for unnecessary operations
  • do not use the same password for different services
  • regularly update computer security software

Alexey Komarov

The threats that emerged with the advent of phishing required the implementation of adequate protection measures. Within the framework of this article, both already widespread methods of countering phishing and new ones will be considered. effective methods. This division is very arbitrary: we will classify as traditional methods well-known (including to the attackers themselves) methods of countering phishing and analyze their effectiveness in the first part of this article. According to the APWG report, 47,324 phishing sites were identified during the first half of 2008. The same report also shows the average losses of users and companies as a result of a phishing site - they amount to at least $300 per hour. Simple multiplications allow us to conclude that this type of black business is highly profitable.

Modern phishing

The word "phishing" is derived from English words password – password and ёshing – fishing, fishing. The purpose of this type of Internet fraud is to deceive the user into a fake site in order to subsequently steal his personal information or, for example, infect the computer of the user redirected to the fake site with a Trojan. An infected computer can be actively used in botnet networks to send spam, organize DDOS attacks, and also to collect user data and send it to an attacker. The range of applications of information “extracted” from the user is quite wide.

Phishing mechanisms

The main vector of a phishing attack is aimed at the weakest link of any modern security system - the person. The bank client does not always know exactly which address is correct: mybank.account. com or account.mybank. com? Attackers can also exploit the fact that in some fonts, lowercase i and uppercase L look the same (I = l). Such methods allow you to deceive a person using a link similar to a real one. email, and even hovering the mouse over such a link (in order to see the real address) does not help. Attackers also have other means in their arsenal: from banal substitution of a real address in the local IP address database with a fake one (in Windows XP, for example, for this it is enough to edit hosts file) before farming. Another type of fraud is replacing a Web page locally, “on the fly.” A special Trojan that has infected a user’s computer can add additional fields to the site displayed by the browser that are not on the original page. For example, a credit card number. Of course, to successfully carry out such an attack you need to know the bank or payment system, which the victim uses. That is why thematic databases email addresses They are very popular and are a liquid commodity on the black market. Phishers who do not want to incur additional costs simply direct their attacks to the most popular services - auctions, payment systems, large banks - in the hope that the random recipient of the spam email will have account. Unfortunately, the hopes of attackers are often justified.

Traditional methods of countering phishing attacks

Unique website design The essence of this method is this: a client, for example, of a bank, when concluding an agreement, selects one of the proposed images. In the future, when entering the bank’s website, this image will be shown to him. If the user does not see it or sees something else, he must leave the fake site and immediately report it to the security service. It is assumed that attackers who were not present when the contract was signed will a priori not be able to guess the correct image and deceive the client. However, in practice this method does not stand up to criticism. Firstly, in order to show the user his picture, he must first be identified, for example, by the login that he entered on the first page of the bank’s website. It is not difficult for an attacker to prepare a fake website to find out this information, and for the user to emulate a communication error. Now all you have to do is go to the real server, enter the stolen login and peek at the correct image.

Another option is to give the client a fake warning about the expiration of their image and ask them to choose a new one...

One-time passwords

Classic passwords are reusable: the user enters the same password every time they go through the authentication procedure, sometimes without changing it for years. Once intercepted by an attacker, this password can be used repeatedly without the owner's knowledge.

Unlike the classic one, a one-time password is used only once, that is, with each request for access, the user enters a new password. For this purpose, in particular, special plastic cards with a protective layer are used. Each time the bank client erases another strip and enters the required one-time password. Total per card standard size holds about 100 passwords, which, with intensive use of telebanking services, requires regular replacement of the media. More convenient, but also expensive, are special devices - one-time password generators. Basically, two types of generation are distinguished: by time, when the current one-time password is displayed on the screen and changes periodically (for example, once every two minutes); by event, when a new value is generated each time the user presses a device button.

While more secure than classic password authentication, this method nevertheless leaves the attacker certain chances of success. For example, authentication using one-time passwords is not secure against man-in-the-middle attacks. Its essence is to “intervene” in the information exchange between the user and the server, when the attacker “introduces himself” to the user as the server, and vice versa. All information from the user is transferred to the server, including the one-time password he entered, but on behalf of the attacker. The server, having received the correct password, allows access to sensitive information. Without arousing suspicion, an attacker can allow the user to work, for example, with his account, sending him all the information from the server and back, but when the user ends his work session, do not break the connection with the server, but carry out the necessary transactions supposedly on behalf of the user.

To avoid wasting time waiting for a user session to end, an attacker can simply fake a communication error and prevent a legitimate user from accessing their account. Depending on the generation method used, the intercepted one-time password will be valid either for a short time or only for the first communication session, but in any case, this gives the attacker the opportunity to successfully steal the user's data or money.

In practice, authentication using one-time passwords itself is rarely used; to increase security, establishing a secure connection before authentication is used, for example, using the SSL protocol.

One-way authentication

Using the SSL (Secure Sockets Layer) secure connection protocol ensures secure data exchange between the Web server and users. Despite the fact that the protocol allows you to authenticate not only the server, but also the user, in practice only one-way authentication is most often used. To establish an SSL connection, the server must have a digital certificate used for authentication. A certificate is usually issued and certified by a trusted third party, which is a certification authority (CA) or certification authority (in Western terminology). The role of the CA is to confirm the authenticity of Web sites of various companies, allowing users, by “trusting” one single certification authority, to automatically be able to verify the authenticity of those sites whose owners accessed the same CA.

The list of trusted certification authorities is usually stored in the operating system registry or browser settings. It is these lists that are attacked by an attacker. Indeed, by issuing a certificate from a fake certification authority to a phishing site and adding this CA to the trusted ones, you can successfully carry out an attack without arousing any suspicion from the user.

Of course, this method will require more actions from the phisher and, accordingly, costs, but users, unfortunately, often help steal their data themselves, not wanting to understand the intricacies and features of use digital certificates. Due to habit or incompetence, we often click the “Yes” button without paying much attention to the browser messages about the lack of trust in the organization that issued the certificate.

By the way, some SSL traffic control tools use a very similar method. The point is that in Lately Cases have become more frequent when sites infected with Trojan programs and the Trojans themselves use the SSL protocol in order to bypass gateway traffic filtering systems - after all, neither the anti-virus engine nor the data leakage protection system is able to check encrypted information. Wedging in the exchange between the Web server and the user's computer allows such solutions to replace the Web server's certificate with one issued, for example, by a corporate CA and, without visible changes in the user's experience, scan the user's traffic when using the SSL protocol.

URL filtering

IN corporate environment site filtering is used to limit misuse Internet employees and as protection against phishing attacks. In many antivirus protection products this method combating fake sites is generally the only thing.

Editor's Choice
Most often, housewives throw away orange zest; they can sometimes use it to make candied fruits. But it's a thoughtless waste...

Homemade caramel syrup recipe. To make excellent caramel syrup at home you need very little...

Literacy is one of the main requirements for written work performed by schoolchildren throughout the entire period of study. Level...

An important event is coming up and it’s worth thinking ahead to decorate the festive table, come up with original dishes and surprise...
Have you tried baking a meat pie in the oven? The smell of homemade baking always brings back memories of childhood, guests, grandmother and...
Pike is a freshwater predator with a long flattened head, a large mouth and an elongated body. It contains a whole treasure trove of vitamins...
Why do you dream of worms Miller's Dream Book Seeing worms in a dream means that you will be depressed by the base intrigues of dishonest people. If a young woman...
Chicken, corn and Korean carrot salad has already become a part of our lives. The recipe can be changed in any way, creating new variations from...
Binge drinking is a serious disease that requires immediate treatment. Delay is fraught with negative consequences...