02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DOClD: 4046925<br />

UNCLASSIFIEDIlIiOR OIiIiICIAL, U51i O~IL.¥<br />

browser with a fake that is so good that it's almost undetectable . Here's how <strong>the</strong><br />

attack works.<br />

~ Customer receives a forged but very legitimate-looking email from a bank or<br />

business with whom he may have a relationship (account, credit card, etc.).<br />

~ Email says customer must verify his email address and includes a link inside<br />

<strong>the</strong> email to a <strong>web</strong>site.<br />

~ User clicks on <strong>the</strong> link in <strong>the</strong> email and <strong>the</strong> browser opens what appears to be<br />

<strong>the</strong> company's <strong>web</strong>page but is in.fact a fake <strong>web</strong>site.<br />

~ The fraudulent site automatically detects <strong>the</strong> user's browser (<strong>the</strong> attack is not<br />

browser dependent) and runs custom JavaScript code that removes <strong>the</strong> real<br />

address bar and replaces it with a fake address bar at <strong>the</strong> top of <strong>the</strong> browser<br />

window. The copy is exact. It has <strong>the</strong> Address field, it displays a uri that \<br />

appears to be a secure link to <strong>the</strong> real company <strong>web</strong>site (e.g. "https:/I"), and it<br />

has <strong>the</strong> Go button on <strong>the</strong> right-hand side. Unlike earlier, less sophisticated<br />

phishing attacks that create static (fake) Address bar images, this is a live<br />

piece of JavaScript code.<br />

~ Even if <strong>the</strong> user right-clicks on <strong>the</strong> <strong>web</strong>page to View Source, <strong>the</strong> real source<br />

code is not shown; in order to see <strong>the</strong> real source code, <strong>the</strong> user must use <strong>the</strong><br />

View I (Page) Source pulldown menu at <strong>the</strong> top of <strong>the</strong> browser to see <strong>the</strong> real<br />

HTML source code.<br />

~ The active JavaScript address bar could permit what is known as a "man in<br />

<strong>the</strong> middle" attack, i.e., every subsequent <strong>web</strong>site <strong>the</strong> user visits after this one<br />

could send any information <strong>the</strong> user enters (passwords, credit card numbers,<br />

etc.) to <strong>the</strong> "phisherman" until <strong>the</strong> browser is closed.<br />

In short, <strong>the</strong>re are very few clues as to <strong>the</strong> fraudulent nature of this particularly<br />

dastardly phishing scam, but <strong>the</strong>y are important ones:<br />

~ Even though <strong>the</strong> fake page shows <strong>the</strong> "https:/I" in <strong>the</strong> address bar, <strong>the</strong>re is no<br />

corresponding Secure Sockets Layer (SSL) padlock at <strong>the</strong> bottom of <strong>the</strong><br />

browser.<br />

~ If <strong>the</strong> user types a new uri into <strong>the</strong> Address bar, <strong>the</strong> browser will continue to<br />

display <strong>the</strong> same fake "Welcome" message.<br />

~ The real uri appears very briefly while <strong>the</strong> user is redirected to <strong>the</strong> fake site.<br />

Take a look at this actual example of a fraudulent <strong>web</strong>page used in a real phishing<br />

scam. You can see how it would be hard for <strong>the</strong> user to detect this is a fake.<br />

UNCLASSIFIED""fi'O~ Ofi'fi'leIAL t1SE ONLY 551

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!