Anti Phishing Tools


Abstract

This page aims at providing some hints on how to address the Online Identity Theft issue using home made tools.

This document aims at providing answers to two types of readers:
 •  the curious reader, who wants to make up his mind on which type of security protection may be used based on his requirements, and on which protection fields are rated as mandatory.
 •  the security aware reader, who is looking for a pragmatic analysis, as each solution is rated according to the protection level it offers, how it achieves it, the evolution of this type of solution, along with the evolution of threats against these solutions.

New security surveys are published almost on a weekly basis, and they all show an ever increasing number of phishing attacks.
Although the most commonly targeted brands have already deployed some mechanisms to secure the authentication process of their users and customers, others that have a lower visibility surface may not have taken appropriate measures yet.

Big companies can afford to purchase expensive solutions to enhance the feeeling of security to their customers. But smaller companies cannot … although thay may quickly become phishing targets. The latest security surveys and phishing analysis trends demonstrated that fraudsters already began to address smaller financial institutions or subsidiaries.


This is why I decided to publish this page with a comprehensive review of some home-made and free or open-source solutions. Some are dedicated to fighting fraud, other will only address detection …


I do not pretend to do a better job than companies that have commercial anti-phishing services.
I just want to try to help a wide range of security conscious people such as business line unit managers, CSOs/CISOs, IT staff, developers … when it comes to choosing an anti-phishing solution.

So, do not blame me if one of the solutions is not fully operational off-the-shelf, or does not fully meet your requirements.
Some of the tools mentioned below, are proof-of-concepts rather than fully functional packaged applications.

At a glance

We can classify the tools in the following array. Click a solution for details.

Interest Solution  Protection against... Detection... Ease to install
User usage
(green=easy)
    funds transfert simple phishing MITM phishing ISP pharming trojan keylogger advanced trojan before-fraud after-fraud
 
s1
s2
 
s1
s2
s1
s2
s1
s2
By user
N/A
 
 
 
 
 
 
 
 
N/A
N/A
 
 
 
 
 
 
 
 
By user
N/A
 
 
   
 
 
 
 
 
N/A
N/A
 
 
 
N/A
N/A
N/A
N/A
N/A
By Corp
N/A
 
 
PVK - Protected Virtual Keypad            
N/A
N/A
   
 
N/A
N/A
N/A
N/A
N/A
By Corp
By Corp
 
N/A
   
 
 
 
N/A
N/A
N/A
N/A
 
Corp
Home
 
N/A
N/A
N/A
N/A
N/A
N/A
By user
 
 
EPAY - Electronic Payment Application for You  
N/A
N/A
N/A
N/A
N/A
   
 
 
 
 
 
By user
N/A
 
 
 
N/A
N/A
N/A
N/A
N/A
By Corp
N/A
 
N/A
 
 
 
 
 
 
By user
N/A
 
 

Protection against fraud has been chosen as a key factor, but the reader any other one, if he rates it as being more important.

Legend


Colors refers to the following levels
GREEN
protection : good —— easyness : easy —— user usage : easy or transparent
YELLOW
protection : correct —— easyness : medium —— user usage : not so simple
ORANGE
protection : medium —— easyness : difficult —— user usage : hard
RED
protection : poor —— easyness : hard —— user usage : unapropriate
WHITE
Not applicable. Several solutions do not aim at covering all fields. So a "N/A" is used


"Corp" refers to corporate users
"Home" refers to home-users

When "s1" or "s2" are used, it means that this tool can be used in two different solutions, e.g. "solution_1" and "solution_s2"

Interest

The very first column is my own point of vue on solutions proposed. This appreciation is the result of different ratings obtained by a tool/solution melted with my own perception. The interest can be :
: a must look solution
: requires having a look
: interesting solution that can be useful
When no star is present, this doesn't mean the solution is useless, but rather than it can be quite complicated to deploy this solution.

Protection categories

Protection against funds transfert : This category applies for banks only since it focus on protecting the customer money from not being moved away from his account. Many banks will decide to rate this protection as the most important one since it's the only mandatory way of acomplishing a fraud. A bank can accept that a phisher connects to a user account as soon as he can steal nothing.

Protection against simple phishing : Here we address a protection against malicious websites reproducing part of the original banking portal. The technique the fraudsters use is quite simple : get banking pages you want, modify them a little to get back the credentials, place it on a bot (or on a server with typosquatting dns name), complete with a spam campaign and you've got it.

Protection against Man In The Middle phishing : This protection addresses a scenario which at first glance looks like the previous one. There is still a phishing site where the customer wants to connects (link in spam) but this time, the phishing is not the end-point any more, it's used as a transparent proxy. Requests arrive on the phishing proxy and it reemits them to the real server as if it was the legitimate user. This technique is used for One Time Password bypass for instance.

Protection against ISP pharming : Quite difficult nowadays, ISP pharming  means that ISP DNS servers are vulnerable to DNS cache poisonning. This can be observed  either with old DNS server versions or with a high amount of fake return request. If the first option seems to be quite scarce nowadays, the second one may still happen under certain conditions (DNS server bad configuration & botnet mass response attack)  where the birthday attack can also help.

Protection against trojan keylogger : Everyone is now accustomed with those malicious tools. Keyloggers will focus on capturing eveything you do : pressed keys, mouse click postions (possibilities go further than keyboard capture). When combined with a simple login/password access, keyloggers can have devastative effects.

Protection against advance trojan : This category is a all-in-one. Thus, many kind of advanced trojans exist : some may behave as rootkits, running stealthy and deep in you operating system, some may hook Internet Explorer when form posting or SSL warning is called. Some will also have a backdoor integrated so that an attacker can virtually seat on your desktop and use your accounts.

Detection before fraud : Sometimes it's possible to detect that a phishing site is to be used soon but since spam campaign has not been launched, it's still possible for staff to react. Tools can help to achieve this goal, but the more phishing attacks will address small companies, the more they will be undetectable. Two kinds of people can detect something strange before fraud : the user (although it's not so sure he will warn you...) and the security staff.

Detection after fraud : Most of the time, customer detects a mistake on his account or is suspicious on a mail, then he may call his hotline. In this case, fraud already took place. It's too late already. But it's still urgent to react to prevent other customer to be attracted in the fraud system. Some tools can also help identifying fraud rapidly. Two kinds  of people can detect something strange after fraud : the user (this time, he's fast to call) and the security staff.

Ease to install : All security tools require to be installed somewhere : on the user operating system, on the user browser, on an internet server, on the front portal, in backoffice systems.... Depending on the tool, it may be simple or hard to install it.

User usage : Here is an important parameter. User usage should be the driver of everything willing to be as widepread as possible ( online banking for instance). If user find it complicated, he will either find a way to go around it ( and so zeroing the added security protection) or will complain about its usage. In both case YOU lose...  Best idea is may be to find a solution which can increase the security level and giving the user 1 - a feeling of pretection from his bank and 2 - a security measure he likes. 





Code and Licence

I'm not a code writer, so many bunch of code will need to be reviewed and adapted to fit IT products and development policy.
You may find mistakes in the following examples or better way to do it. Please notify me when you detect some.

These tools are free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the
Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA


Special thanks


Olivier Caleff
Pierre Caron

(updated 2007-07-29)