Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Spotting Phish and Phighting Back

    Written by

    Larry Seltzer
    Published August 2, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      It was only a matter of time before the authors of phishing attacks became more clever. Ive always been disappointed, in a perverse way, by the lack of creativity they have shown. But in a way it doesnt matter how clever they are since you can protect yourself with a healthy dose of skepticism and a little bit of scrutiny. If you can read some HTML source, you should be able to pick out even a well-designed attack.

      Your bread-and-butter phishing e-mail is fairly predictable. It appears as a request of some kind from eBay or PayPal or some bank, probably asking you to “reverify” your account information. By now this is so tired a modus operandi that you can pretty much ignore it without any scrutiny. But its not just the familiar attacks you need to watch out for.

      A colleague of mine just received one of the more interesting phishing messages Ive ever seen. Its a clone of a Kerry-Edwards campaign contribution solicitation, this one an appeal from Kerrys brother Cam. I dont know if Kerry actually has a brother named Cam, but thats the angle the message takes.

      For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      This one is professionally done and uses several of the classic phishing techniques. Ironically, because of those techniques, it was easy for the Kerry-Edwards Web administrators to “phight back.”

      Within about 24 hours the same e-mail replaced the picture of Cam with a graphic that said “WARNING! If this e-mail is from any address that includes @JohnKerrys.com it is not an official e-mail from Kerry-Edwards, 2004, Inc. Do not donate using any link in this e-mail.”

      Since the graphic link was to the actual JohnKerry.com site the Webmaster could make this change. The downside is that they had to change one of their actual graphics, but I guess its lucky for the campaign that the phishers used Cam and not John.

      Like my colleague, my first look at the message set my Phishing Alert Level at Red (Severe).

      Would the Kerry campaign actually spam me with a donation request? Well, maybe, maybe not, but it was certainly suspicious.

      I also noticed the From: address in the message, [email protected]. What does “voteuz” mean? And I know the actual campaign domain is johnkerry.com.

      The next obvious step is to view the source on the message. Aha! It all falls into line. Most of the graphics in the message come from johnkerry.com, but the actual “donate” form links go to http://testhost.yahoogoogle.biz/JohnKerry/contribute.html, a page which, unsurprisingly, is now down.

      Hmmm. Who is this yahoogoogle.biz company? A quick trip to the home page (I wont dignify them with a link) finds one of those shyster outfits that guarantees you a Top 10 search result in Google and Yahoo. It surprises me that any of these creeps fly under the radar at all, but I suspect this particular company is in trouble, especially if the election goes the wrong way for them.

      Next page: The donation process.

      The donation process

      I actually clicked on the Donate link, which is usually safe if youre all patched up and have anti-virus software, but its still a bit scary. Since the page is down you cant verify any of this anymore, but there were a bunch of other red flags on it.

      First, the links in the e-mail had said that it would take me to “Make a secure donation,” but the page it took me to was HTTP, not HTTP Secure. Funny how most phishers dont want to get an actual digital certificate.

      There were also “contribute by mail” and “contribute by phone” links on the page, but they were dead. Gosh, I wonder why?

      The Web site JohnKerrys.com—the From: domain—is even more interesting. The ownership records are incomplete, but the domain is for sale. The address and phone number, if you want to buy it, are in Cape Verde, an island off Senegal in the north Atlantic Ocean.

      I didnt go through with the payment process so I dont know how well-done it is, but certainly nobody with a modicum of sophistication about the Web should be fooled. Of course, the Web isnt supposed to require a modicum of sophistication in order to be used. So whats the solution?

      First, the owner of yahoogoogle.biz (its registered to someone in India) should get in big and conspicuous trouble. Actually, just in case its unclear that they are responsible, it should be even easier to track who the credit card payments would have gone to. I want everyone to see this person carried away in chains.

      /zimages/3/28571.gif

      Another part of the answer is SMTP authentication. This particular message may actually have come from the mail domain it claims to have come from, but the vast majority of the ones Ive seen have appeared to come from “ebay.com” or “citibank.com” and so on, and they can do that because SMTP is unauthenticated. All these attacks lose some credibility when the mail spoofing aspect of them is gone, and that also makes it a little easier to track down the senders, too.

      A survey by MailFrontier shows a series of e-mails and asks whether you think they are real or phishing attacks. MailFrontier actually eliminated the message sender information and changed all the Web links in the messages to point to them, so in fact as a practical matter the survey is useless (and arguably dishonest). Your best tool is taken away. But look at the survey anyway and approach it as a test of how you would judge the messages if you didnt know how to look at a Web link and figure out that it isnt what it should be. Its not easy to tell.

      Blithely proclaiming that “education is the answer” is a cop-out in this situation because normal users shouldnt have to learn what theyd need to learn to tell the difference—and they wont. The solution will have to come elsewhere, probably from technology.

      The beginning is the adoption of MARID or some standard like it, and the next step will be anti-fraud systems based on accreditation and reputation. In that sense, phishing is part of the same exact spam problem that will kill off e-mail unless we stop it.

      /zimages/3/28571.gifTo read Larry Seltzers in-depth analysis of MARID, the Internet Engineering Task Forces attempt to standardize SMTP authentication, click here.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      /zimages/3/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis.
      Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page: http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo2.gif

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×