11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

370 phishing <strong>and</strong> spo<strong>of</strong>ing“Phishing” messages such as this fake IRS e-mail try to trick usersinto clicking on links to equally bogus Web sites that can steal personalinformation or infect computers with viruses.This all-too-common scenario is called “phishing,”alluding to “fishing” for unwary users with various sorts <strong>of</strong>bait, with the f changed to ph in keeping with traditionalhacker practice. Phishing is similar to other techniques formanipulating people through deception, fear, or greed thathackers <strong>of</strong>ten refer to as “social engineering.” Unlike oneon-oneapproaches, however, phishing relies on the abilityto send large quantities <strong>of</strong> e-mail at virtually no cost (seespam), the availability <strong>of</strong> simple techniques for disguisingboth e-mail addresses <strong>and</strong> Web addresses (URLs), <strong>and</strong> theease with which the appearance <strong>of</strong> a Web site can be convincinglyreplicated.Although e-mail is the most common “hook” for phishing,any form <strong>of</strong> communication, including text or instantmessages, can be used. Recently sites such as MySpace havebecome targets for automated phishing expeditions thatchanged links on pages to point to fraudulent sites (seesocial networking).Defenses <strong>and</strong> CountermeasuresWary users have a number <strong>of</strong> ways to reduce their chance <strong>of</strong>being “phished.” Some signs <strong>of</strong> bogus messages include:• The message is addressed generically (“dear PayPaluser”) or to the user’s e-mail address rather than theaccount name.• The text <strong>of</strong> the message contains spelling errors orpoor grammar.• The URL shown for a link in the message (perhaps viaa “tool tip”) does not match the institution’s real Webaddress.There are even interactive games such as “Anti-PhishingPhil” that users can play to test their ability to detect phishingattempts.Unfortunately, modern phishers are becoming increasinglysophisticated. Some phishing messages can be personalized,using the target’s actual name. URLs can bedisguised so that discrepancies do not appear. When indoubt, the safest thing to do is always to access the institutionby typing (not copying) its name directly in the Webbrowser rather than clicking on a link in e-mail. (In a practicecalled “pharming,” a legitimate Web site can in effectbe hijacked so that normal user accesses will be divertedto the fraudulent site. Users have no real defense againstpharming; this is a matter for security pr<strong>of</strong>essionals at therelevant Web sites.)Fortunately there are ways in which s<strong>of</strong>tware can helpdetect <strong>and</strong> block most phishing attempts. A good spam filteris the first line <strong>of</strong> defense <strong>and</strong> can block many phishing messagesfrom getting to the user in the first place. Anti-phishingfeatures are also increasingly included in Web browsers,or available as plug-ins. Thus “blacklists” <strong>of</strong> known phishingsites can be checked in real time <strong>and</strong> warnings given, orthe site’s address can be blocked from access by the system.Web sites can also introduce an added layer <strong>of</strong> security:Bank <strong>of</strong> America, for example, asks users to select <strong>and</strong> labelone <strong>of</strong> several images <strong>of</strong>fered by the bank. The image <strong>and</strong>label are subsequent displayed as part <strong>of</strong> the log-in process.If the user does not see the image <strong>and</strong> the user’s label, thenthe site is presumably not the real bank site.Legislative ResponsePhishing has been one <strong>of</strong> the fastest-growing types <strong>of</strong> onlinecrime in recent years (see computer crime <strong>and</strong> security<strong>and</strong> online frauds <strong>and</strong> scams). By mid-2007 the Anti-Phishing Working Group (an association <strong>of</strong> financial institutions<strong>and</strong> businesses) was reporting the appearance <strong>of</strong>more than 30,000 new phishing sites per month (the largestnumber operating from China), though a site typically staysonline for only a few days. Phishing contributed significantlyto the $49 billion cost <strong>of</strong> identity theft in 2006 as estimatedby Javelin Research. Further, industry surveys havesuggested that phishing has aroused considerable consumerconcern, slowing down the adoption or continued use <strong>of</strong>some financial services (see banking <strong>and</strong> computers).In response to this growing concern, the U.S. FederalTrade Commission filed its first civil suit against a suspectedphisher in 2004. The United States <strong>and</strong> other countrieshave also arrested phishing suspects, generally undersome form <strong>of</strong> wire fraud statute. Starting in 2004, antiphishingbills have been introduced in Congress, thoughnone had passed as <strong>of</strong> 2007. However, the CAN-SPAM Act<strong>of</strong> 2003 was used in 2007 to convict a defendant accused<strong>of</strong> sending thous<strong>and</strong>s <strong>of</strong> phishing e-mails purporting to befrom America Online (AOL). Many states have also introducedanti-phishing legislation.Further ReadingAnti-Phishing Working Group. Available online. URL: http://www.antiphishing.org/. Accessed November 6, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!