首页> 外文会议>eCrime Researchers Summit >Discovering phishing dropboxes using email metadata
【24h】

Discovering phishing dropboxes using email metadata

机译:使用电子邮件元数据发现网络钓鱼保管箱

获取原文
获取外文期刊封面目录资料

摘要

The criminals who operate phishing scams often deliver harvested credentials to email accounts under their control - but it is difficult, in the general case, to identify these so-called ‘dropboxes’. We devise three techniques to identify dropboxes and associated phishing websites by leveraging lists of known phishing websites and metadata maintained by email providers. We demonstrate the techniques' effectiveness using data held by anti-phishing organizations and an email provider. To directly identify dropboxes, we posted fake but distinctive credentials into 170 PayPal phishing pages and inspected an email provider's anti-spam metadata. This metadata recorded the presence of our credentials matching 28 of the phishing pages sending credentials to 17 distinct dropboxes at this particular email provider. We indirectly identified 24 additional dropboxes by searching for email subjects similar to previously-uncovered dropboxes. Based on these findings, we estimate an upper bound of 120 – 160 criminals ran phishing attacks against PayPal in July 2012, a smaller figure than might be expected from the 26 900 PayPal distinct phishing URLs they are known to have employed, spread across 13 018 different hostnames. Finally, in some cases we could extend our metadata processing by running an ‘intersection attack’. Whenever victims receive the same URLs as other victims, it is likely that the common URL is for a phishing page. Preliminary evidence suggests that the false positive rate for intersection attacks is low. Furthermore, it can be used to notify impersonated brands immediately after victims disclose their credentials and identify more phishing sites faster than traditional methods currently achieve.
机译:进行网络钓鱼诈骗的犯罪分子通常会将收集到的凭据传递到受其控制的电子邮件帐户中,但是在一般情况下,很难识别这些所谓的“投递箱”。我们设计了三种技术,以利用电子邮件提供商所维护的已知网络钓鱼网站列表和元数据来识别保管箱和相关的网络钓鱼网站。我们使用反网络钓鱼组织和电子邮件提供商所拥有的数据来证明该技术的有效性。为了直接识别保管箱,我们在170个PayPal网络钓鱼页面中张贴了伪造但与众不同的凭据,并检查了电子邮件提供商的反垃圾邮件元数据。此元数据记录了我们的凭据的匹配情况,该凭据与28个网络钓鱼页面相匹配,从而将凭据发送到该特定电子邮件提供商的17个不同的保管箱。我们通过搜索类似于以前未发现的保管箱的电子邮件主题间接地确定了24个其他保管箱。根据这些发现,我们估计2012年7月有120-160名犯罪分子对PayPal进行网络钓鱼攻击,该数字比已知的26900 PayPal不同的网络钓鱼URL的预期要小,分布在13018个不同的主机名。最后,在某些情况下,我们可以通过运行“交叉攻击”来扩展元数据处理。每当受害者收到与其他受害者相同的URL时,公共URL很有可能用于网络钓鱼页面。初步证据表明,相交攻击的误报率很低。此外,它可以用来在受害者披露其凭据后立即通知假冒品牌,并比目前的传统方法更快地识别出更多的网络钓鱼站点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号