Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for...

23
Presenter: Dr. Xiaojiang (James) Du 03/21/22 MobiFish: A Lightweight Anti- Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA, 19122, USA

Transcript of Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for...

Page 1: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Presenter: Dr. Xiaojiang (James) Du

04/18/23

MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones

1

Longfei Wu, Xiaojiang Du, and Jie WuDepartment of Computer and Information SciencesTemple University, Philadelphia, PA, 19122, USA

Page 2: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Phishing Attacks

Phishing attacks aim to steal private information such as usernames, passwords, and credit card details by impersonating a legitimate entity.

Although security researchers have proposed many anti-phishing schemes, phishing attacks’ threat has not been well mitigated: Phishing sites expire and revive rapidly (Avg. 4.5 days). Attackers keep improving their techniques to circumvent

existing anti-phishing tools. Mobile users are accustomed to being requested and

providing credentials without checking the website.

04/18/23

2

Page 3: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Phishing Attacks

Most targeted Industry Sectors

04/18/23

3

Page 4: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Phishing Attacks Cont.

Almost all phishing attacks on PC are in the form of bogus websites. Current browsers on PC are embedded with anti-phishing tools that can achieve a detection rate of over 90%.

However, during the adaptation to hardware-constrained mobile platforms, browsers abandoned or truncated many features and useful functions (like anti-phishing).

4

Open the same phishing site with Chrome on PC and Chrome for Android

Page 5: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Mobile Phishing Attacks

Mobile Web Phishing Mobile phishing is an emerging threat targeting at mobile users of financial

institutions, online shopping and social networking companies.

Mobile App Phishing Some attackers develop fake applications (Apps) or repackage legitimate

Apps, then upload these phishing Apps to unofficial app markets. It is harder to detect Phishing Apps than Phishing on mobile web pages.

(Information can be retrieved from Html source code in webpages).

The trend of launching phishing attacks on mobile devices can be attributed to hardware limitations such as small screen size, and the inconvenience of user input and application switching.

04/18/23

5

Page 6: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Existing Phishing Detection Schemes

Current web phishing detection schemes can be roughly divided into two categories: heuristics-based schemes and blacklist-based schemes. Blacklist-based schemes can only detect phishing sites that are

in the blacklist but can not detect zero-day phishing attacks. Heuristics-based schemes largely depend on features extracted

from URL and HTML source code, and other techniques like machine learning are used to determine the validity. However, we find that features extracted from HTML source code could

be inaccurate and phishing sites can circumvent those heuristics.

There is no off-the-shelf tool to detect phishing Apps on mobile platform.

04/18/23

6

Page 7: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Our Solutions and Contributions

We propose MobiFish, a novel automated lightweight anti-phishing scheme for mobile phones. It is able to defend against both phishing webpages and Apps.

Find the weakness of previous heuristics-based security schemes for webpage phishing, and develop a lightweight solution that utilizes optical character recognition (OCR) without reliance on HTML source code, search engine or machine

learning techniques.

Implement MobiFish on Google Nexus 4 smartphone running Android 4.2 operating system.

Evaluate MobiFish with 100 phishing URLs and corresponding legitimate URLs, as well as “Facebook” phishing Apps.

04/18/23

7

Page 8: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Mobile Webpage Phishing Attacks

Mobile user interface increases the vulnerability to mobile phishing attacks. Due to the small display size of phone screens, most

mobile browsers have to remove the status bar and hide the URL bar once the web page finishes loading.

Even during the loading process, long URLs are truncated to fit the browser frame.

Since the ability to read and verify URLs is crucial in detecting phishing attacks, partial URL or even URL displayed with partial domain name would certainly increase the risk of being spoofed by phishing attacks.

04/18/23

8

Page 9: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Mobile Application Phishing Attacks

Application-oriented phishing attacks can be categorized into two types based on the way they launch: Some phishing apps attempt to hijack existing legitimate targets.

They keep performing task polling, and launch themselves as long as they detect the launch of target apps.

As the result, the fake login interface covers on top of the real one, and the phishing app pretends to be the target app.

Another type of phishing apps directly appears as the target app. This may occur when user downloads fake apps from unofficial app

markets.

The mobile App phishing attack ends with transmission of credentials to the attacker. Hence, blocking the transmission can effectively defend the

attack.

04/18/23

9

Page 10: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Overview of MobiFish Scheme

Phishing attackers apply fancy tactics to direct victims to their phishing sites or applications, which masquerade as trustworthy entities.

The key to solve phishing problem is to find the discrepancy between the identity it claims and the actual identity.

MobiFish consists of two independent components designed for mobile webpages and mobile applications WebFish and AppFish.

04/18/23

10

Page 11: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of WebFish

04/18/23

11

We find that information extracted from HTML source code may not reflect the webpage displayed to users, since attackers can add texts, images and links into HTML

source code while making any “undesirable” content invisible, by simply changing their size or covering them with other

images. Hence, features like word frequency, brand name and

company logo could be easily manipulated. The claimed identity should be extracted from the screen

presented to a user. The actual identity can be obtained from the web address

(or network connection).

Page 12: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Identity Extraction

04/18/23

12

The claimed identity is extracted from a screenshot. Most login interfaces of legitimate mobile sites and apps are very

simple. The entire login page or the majority of page can be captured in one screenshot.

To obtain claimed identity from a screenshot, OCR technique is utilized to convert image into text.

We use Tesseract, one of the most accurate open source OCR engines.

The actual identity is obtained from the web address. Most enterprises use brand name as the second-level domain name

(SLD) of their official websites. In cases that brand names are not exactly the same as SLD (e.g.

brand name “AT&T” and SLD “att”), we build a whitelist that records common pairs of inconsistent brand name and SLD.

brand name “AT&T” is directly mapped to SLD “att”, and vice versa.

Page 13: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Identity Extraction Cont.

04/18/23

13

OCR Experiments Our testing uses a Thinkpad T420 laptop (2.40GHz, 4GB RAM)

with pixel density of 131 dpi and a Google Nexus 4 smartphone (1.5GHz, 2GB RAM) with 320 dpi pixel density.

We open the Ebay mobile login page in both mobile and PC browsers, each captures a screenshot. Then, Tesseract is used to extract text from phone screenshot while Microsoft Office Document Imaging (MODI) is used for the screenshot on PC.

Tesseract only takes 1.6 seconds while MODI uses 4.5 seconds.

Tesseract

MODI

Page 14: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of WebFish Cont.

04/18/23

14

Finally, WebFish compare the claimed identity with the actual identity.

Page 15: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of WebFish Cont.

04/18/23

15

The key idea of WebFish to detect a phishing URL is that the SLD is not among the text extracted from the screenshot of the login page.

As far as we know, no phishing site uses common terms in login pages like “sign”, “username”, “password” or “welcome” as SLD.

It is not likely for well constructed and maintained legitimate web pages to have strange words.

If the actual domain name of a phishing site appears in the login page of fake websites, users can easily spot it and check the URL to verify the validity of the webpage.

If the attacker includes the phishing domain name in the screen in a tiny font size, then OCR is not able to recognize it either and WebFish will still mark it as a phishing site.

Page 16: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of AppFish

04/18/23

16

AppFish maintains a database called suspicious app set (SAS), which contains profiles of untrusted apps including user ID (Uid), launching time and screenshot text.

These apps should be: Specified for one company. This is to ensure that the app only

connects to the company’s official sites or affiliated (partners) servers.

The domain name of collaborators are pre-checked and added to the SAS profile in advance. (e.g. Facebook and its content delivery networks)

Have user login. There are lots of apps that do not need users to login, in which App phishing attacks would not happen at all. (e.g. apps for news, games, music or map)

Page 17: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of AppFish Cont.

Phishing apps are not able to load valid following pages. Users will suspect their validity in a short time. Hence, a phishing app can only send out user credentials during a short

period (denoted as T) after user clicks the phishing page.

AppFish monitors the possible paths that allow a phishing app to transmit data to outside, which include socket, HttpGet/HttpPost, SMS, email (email is based on

socket), etc.

AppFish rules: The SLD name of the Http connection destination has to be in the text

or affiliated domain names stored in SAS profile. Socket and SMS function could be blocked for a period of time, which

should be long enough for user to notice (and uninstall) the phishing app.

04/18/23

17

Page 18: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Design of AppFish Cont.

The AppFish defense scheme works in two phases: launching phase and authentication phase.

04/18/23

18

Page 19: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Performance Evaluation

We implement MobiFish on a Nexus 4 smartphone. We modify the source code of Android 4.2 system so that it is able to support MobiFish.

Experiments with WebFish We randomly pick up 100 phishing URLs from PhishTank.com. Most of them are highly similar to their legitimate counterparts. The input forms in phishing login pages are often surrounded by

brand names or company logos as the legitimate login pages. When loading a large conventional web page, mobile browsers often

display the area that contains the input form instead of displaying an overview of the entire web page.

04/18/23

19

Page 20: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Performance Evaluation Cont.

WebFish is able to detect all the phishing webpages and achieves 100% verification rate of legitimate URLs

04/18/23

20

Page 21: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Performance Evaluation Cont.

Experiments with AppFish There are only a few reported phishing apps and none of them is

available online. To test the effectiveness of AppFish, we develop two sample

phishing apps: one can hijack real Facebook app and the other appears as “Facebook”.

After user clicks the “Log in” button,

the fake apps send the credentials

to our server by HttpGet, HttpPost,

socket, SMS, and email, respectively. AppFish can block all the connections

and warn users about the phishing

attempts.

04/18/23

21

Page 22: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Conclusion

04/18/23

22

We proposed MobiFish, a novel lightweight mobile phishing defense scheme.

MobiFish uses OCR, which can accurately extract text from the screenshot of mobile login interface so that the claimed identity is obtained. Mobile phones have higher dpi than PC.

Compared to existing OCR-based anti-phishing schemes (designed for PC only), Mobifish is lightweight and it works without using external search engines or machine learning algorithms.

We implemented MobiFish on a Google Nexus 4 smartphone, and conduct experiments, which show that MobiFish and AppFish can effectively detect and defend against mobile phishing attacks.

Page 23: Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Thank You!

Prof. Xiaojiang (James) Du

Dept. of Computer and Information Sciences

Temple University

Philadelphia, PA, 19122, USA

Email: [email protected]

Web: www.cis.temple.edu/~xjdu

04/18/23

23