Re: why don't banks do more against phishing?

2012-07-07 Thread Nix
Coming to this a few months late provides some... interesting
perspective.

On 24 Apr 2012, xTrade Assessory uttered the following:
 Martin Gregorie wrote:
 But back to banking? In the UK, anyway, you don't need to be either
 intelligent or have any industry qualifications to run a bank. Back in
 2007 or thereabouts a quiz master asked what was the difference
 between: 
 - the CEO who bankrupted the Northern Rock Building Society
 - the CEO who bankrupted the Royal Bank of Scotland
 - the boss of Barclays (I think - might have been the Co-OP Bank)
 - Terry Wogan, who was a well-known radio presenter at the time. 
 
 The answer was that the only one of them with any banking qualifications
 was Terry Wogan.

 media jokes certainly are not a good base for classification :)

Perhaps not. I think the near-ruination of the world economy, the
near-bankrupting of numerous rich states, and now the hilarious RBS
epic computing disaster and long-running but now-exploding LIBOR rigging
scandal put a slightly different tone on things.

It's not only a quiz show host to figured that Bob Diamond shouldn't be
running a major bank. It's the chairman of the Bank of England (oh, the
FSA too).

-- 
NULL  (void)


Re: why don't banks do more against phishing?

2012-04-25 Thread Martin Gregorie
On Wed, 2012-04-25 at 00:08 +0100, RW wrote:
 On Tue, 24 Apr 2012 15:23:28 +0100
 Martin Gregorie wrote:
 
  On Tue, 2012-04-24 at 14:25 +0100, RW wrote:
   On Mon, 23 Apr 2012 01:20:13 -0300
   xTrade Assessory wrote:
   
   
no serious bank, as any other serious company, would ever send out
emails asking for user details

the user who believes that, is or incredible ingenious or
incredible stupid, so: happy clicking
   
   I don't think it's all that stupid given that many banks and other
   companies do more or less the same thing when they phone their
   customers. 
  
  That merely shows that stupidity is extremely widespread: other
  outfits being lax about security doesn't give the banks a free pass.
 
 
 I meant that it's understandable that people fall for phishing when
 banks set a bad example by phoning customers and requiring the customer
 to provide personal information to establish his or her identity.

Point taken, but its still inexcusable of a bank to do that. 

If somebody claiming to be my bank calls me and starts asking security
questions I tell them politely but firmly that I don't believe they are
from the bank and that I'll call them. Then I put down the phone and
ring the number I have on file for that bank. 


Martin



Re: why don't banks do more against phishing?

2012-04-24 Thread RW
On Mon, 23 Apr 2012 01:20:13 -0300
xTrade Assessory wrote:


 no serious bank, as any other serious company, would ever send out
 emails asking for user details
 
 the user who believes that, is or incredible ingenious or incredible
 stupid, so: happy clicking

I don't think it's all that stupid given that many banks and other
companies do more or less the same thing when they phone their
customers. 


Re: why don't banks do more against phishing?

2012-04-24 Thread Martin Gregorie
On Tue, 2012-04-24 at 14:25 +0100, RW wrote:
 On Mon, 23 Apr 2012 01:20:13 -0300
 xTrade Assessory wrote:
 
 
  no serious bank, as any other serious company, would ever send out
  emails asking for user details
  
  the user who believes that, is or incredible ingenious or incredible
  stupid, so: happy clicking
 
 I don't think it's all that stupid given that many banks and other
 companies do more or less the same thing when they phone their
 customers. 

That merely shows that stupidity is extremely widespread: other outfits
being lax about security doesn't give the banks a free pass. And, what
about companies who confirm an account sign-up by sending a single plain
text e-mail containing the name of the company, your login name and your
password? Or the multitude that use your e-mail address as the login
name?

But back to banking? In the UK, anyway, you don't need to be either
intelligent or have any industry qualifications to run a bank. Back in
2007 or thereabouts a quiz master asked what was the difference
between: 
- the CEO who bankrupted the Northern Rock Building Society
- the CEO who bankrupted the Royal Bank of Scotland
- the boss of Barclays (I think - might have been the Co-OP Bank)
- Terry Wogan, who was a well-known radio presenter at the time. 

The answer was that the only one of them with any banking qualifications
was Terry Wogan.

My bank says up front and in writing that they will never ask for
account or login details by e-mail. I suggest moving your account away
from any bank that doesn't have the same policy and stick to it. Make
sure you tell them why you're leaving, though.


Martin




Re: why don't banks do more against phishing?

2012-04-24 Thread Ned Slider

On 24/04/12 15:23, Martin Gregorie wrote:


My bank says up front and in writing that they will never ask for
account or login details by e-mail. I suggest moving your account away
from any bank that doesn't have the same policy and stick to it. Make
sure you tell them why you're leaving, though.




In addition to helping customers in this way, it would be really nice if 
they would similarly help mail admins to by also having a well defined 
email policy, clearly stating which addresses they will send email from 
and publishing accurate SPF records for those domains.


That would make it trivial for all mail admins to detect and block bank 
phishing attempts.


It's not rocket science!



Re: why don't banks do more against phishing?

2012-04-24 Thread xTrade Assessory
Martin Gregorie wrote:
 On Tue, 2012-04-24 at 14:25 +0100, RW wrote:
 On Mon, 23 Apr 2012 01:20:13 -0300
 xTrade Assessory wrote:


 no serious bank, as any other serious company, would ever send out
 emails asking for user details

 the user who believes that, is or incredible ingenious or incredible
 stupid, so: happy clicking

 I don't think it's all that stupid given that many banks and other
 companies do more or less the same thing when they phone their
 customers. 

 That merely shows that stupidity is extremely widespread: other outfits
 being lax about security doesn't give the banks a free pass. And, what
 about companies who confirm an account sign-up by sending a single plain
 text e-mail containing the name of the company, your login name and your
 password? Or the multitude that use your e-mail address as the login
 name?
 
 But back to banking? In the UK, anyway, you don't need to be either
 intelligent or have any industry qualifications to run a bank. Back in
 2007 or thereabouts a quiz master asked what was the difference
 between: 
 - the CEO who bankrupted the Northern Rock Building Society
 - the CEO who bankrupted the Royal Bank of Scotland
 - the boss of Barclays (I think - might have been the Co-OP Bank)
 - Terry Wogan, who was a well-known radio presenter at the time. 
 
 The answer was that the only one of them with any banking qualifications
 was Terry Wogan.

media jokes certainly are not a good base for classification :)

 
 My bank says up front and in writing that they will never ask for
 account or login details by e-mail. I suggest moving your account away
 from any bank that doesn't have the same policy and stick to it. Make
 sure you tell them why you're leaving, though.
 

I'm getting really curious because some of you insist

I can not believe that there is somewhere a bank passing/asking
credentials by email, I never saw it and I know about internal bank
policies which do not permit *any* kind of email contact with clients



Hans


-- 
XTrade Assessory
International Facilitator
BR - US - CA - DE - GB - RU - UK
+55 (11) 4249.
http://xtrade.matik.com.br


Re: why don't banks do more against phishing?

2012-04-24 Thread RW
On Tue, 24 Apr 2012 15:23:28 +0100
Martin Gregorie wrote:

 On Tue, 2012-04-24 at 14:25 +0100, RW wrote:
  On Mon, 23 Apr 2012 01:20:13 -0300
  xTrade Assessory wrote:
  
  
   no serious bank, as any other serious company, would ever send out
   emails asking for user details
   
   the user who believes that, is or incredible ingenious or
   incredible stupid, so: happy clicking
  
  I don't think it's all that stupid given that many banks and other
  companies do more or less the same thing when they phone their
  customers. 
 
 That merely shows that stupidity is extremely widespread: other
 outfits being lax about security doesn't give the banks a free pass.


I meant that it's understandable that people fall for phishing when
banks set a bad example by phoning customers and requiring the customer
to provide personal information to establish his or her identity.


Re: why don't banks do more against phishing?

2012-04-23 Thread Dave Warren


On 4/22/2012 8:31 PM, haman...@t-online.de wrote:

a) phishers would probably move to hosting their own copies of the logos


Yup. However, spammers haven't completely adapted to greylisting, and 
still spam from SBL/ZEN listed IPs, so perhaps this would catch some of 
the long-hanging fruit?



b) some users of image resizers would see the warning sign reduced
(I recently had someone complain about an error on our google maps our office is 
here
page, and it turned out the visitor was using a smartphone via an image resize 
service)


Were you tripping on a lack of referrer, or was an image resizing 
service actually returning a completely incorrect referrer? When 
attacking phishing websites who are abusing legitimately hosted images, 
you should be able to return the correct image for requests that are 
completely missing a referrer, it's only when you get a third-party site 
in the referrer that you should return the This is a phishing site! image.


--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren




Re: why don't banks do more against phishing?

2012-04-23 Thread hamann . w
Dave Warren wrote:

 b) some users of image resizers would see the warning sign reduced
 (I recently had someone complain about an error on our google maps our 
 office is here
 page, and it turned out the visitor was using a smartphone via an image 
 resize service)

Were you tripping on a lack of referrer, or was an image resizing 
service actually returning a completely incorrect referrer? When 

Hi Dave,

all I know is that someone told about a broken cid:something image on the
phone for Google maps
I recently tried a wrong google key and noticed that I would see the correct
map for a second, until a javascript shows an error message.
So my conclusion was that the resizing image loaded the original image
(from google server), replaced it by a cid: url, and then the Google
javascript would somehow fail.

Now thinking about the bank situation: the bank's webserver would see a request
from the resizing service, but it is up to the resizer to behave like a
real browser, or a proper http proxy

Wolfgang


Re: why don't banks do more against phishing?

2012-04-23 Thread Dave Warren

On 4/23/2012 4:41 AM, haman...@t-online.de wrote:

Now thinking about the bank situation: the bank's webserver would see a request
from the resizing service, but it is up to the resizer to behave like a
real browser, or a proper http proxy


That's basically what I'm thinking. If the service fails to send a 
referrer at all, you can generally serve images reasonably safely. Email 
phishes can still use images, but given how few email clients actually 
load HTTP images anyway, it's a minor part of the problem.


It's only when there's an incorrect referrer that you can assume the 
request isn't legitimate and you should return something different. 
Whether you do this immediately or have someone review before making the 
decision is a business decision, for banks that can't confine themselves 
to a single domain then a manual review might be needed, but such is life.


--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren





Re: why don't banks do more against phishing?

2012-04-23 Thread Benny Pedersen

Den 2012-04-24 03:46, Dave Warren skrev:


It's only when there's an incorrect referrer that you can assume the
request isn't legitimate and you should return something different.


or banks care to send the image over https protocol not just http


Whether you do this immediately or have someone review before making
the decision is a business decision,


bah


for banks that can't confine
themselves to a single domain then a manual review might be needed,
but such is life.


yep it would be more funn to see the first bank that works in links 
text mode webbrowser, and only display graphics if started with links 
-g, any other browser is unsecure :=)






why don't banks do more against phishing?

2012-04-22 Thread Jason Haar
OT but related

I just got a bunch of phishing attacks against a bank come through.
Following the link leads me to some owned website with the fake bank
frontend - and it had a feature that I've seen time and time again:
images and links from the real banksite

Why don't banks rub two braincells together and start monitoring the
referrers on their primary webpages (eg logos, terms and conditions) and
return a RUN AWAY!!! IT'S A TRAP!!! page whenever someone views the
phishing sites? The Referrer header would allow that instantly

They really don't give a damn do they...

-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +1 408 481 8171
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1



Re: why don't banks do more against phishing?

2012-04-22 Thread Noel Butler
On Mon, 2012-04-23 at 14:40 +1200, Jason Haar wrote:

 OT but related
 
 I just got a bunch of phishing attacks against a bank come through.
 Following the link leads me to some owned website with the fake bank
 frontend - and it had a feature that I've seen time and time again:
 images and links from the real banksite
 


My personal banks phishing scams ended a couple years ago, when they
introduced SPF,
the oppositions still arrive in my inbox or spam folders every so often.



 Why don't banks rub two braincells together and start monitoring the


because that means their IT dept needs to employ someone with a clue
about DNS.



 They really don't give a damn do they...
 

some certainly don't



signature.asc
Description: This is a digitally signed message part


Re: why don't banks do more against phishing?

2012-04-22 Thread Jim Popovitch
On Sun, Apr 22, 2012 at 10:40 PM, Jason Haar jason_h...@trimble.com wrote:
 OT but related

 I just got a bunch of phishing attacks against a bank come through.
 Following the link leads me to some owned website with the fake bank
 frontend - and it had a feature that I've seen time and time again:
 images and links from the real banksite

 Why don't banks rub two braincells together and start monitoring the
 referrers on their primary webpages (eg logos, terms and conditions) and
 return a RUN AWAY!!! IT'S A TRAP!!! page whenever someone views the
 phishing sites? The Referrer header would allow that instantly

 They really don't give a damn do they...

Bingo!

I presented that very idea to a big bank (you would recognize the
name) approx 8 years ago.  I suggested they monitor the referrers
(with the security product we were installing) and automatically
increase situational awareness accordingly, and at some point move to
replacing images that didn't match certain referrers.  I was ignored,
almost scoffed at.

-Jim P.

-Jim P.


Re: why don't banks do more against phishing?

2012-04-22 Thread hamann . w
 OT but related
 
 I just got a bunch of phishing attacks against a bank come through.
 Following the link leads me to some owned website with the fake bank
 frontend - and it had a feature that I've seen time and time again:
 images and links from the real banksite
 
 Why don't banks rub two braincells together and start monitoring the
 referrers on their primary webpages (eg logos, terms and conditions) and
 return a RUN AWAY!!! IT'S A TRAP!!! page whenever someone views the
 phishing sites? The Referrer header would allow that instantly
 
 They really don't give a damn do they...
 

Hi Jason,

a) phishers would probably move to hosting their own copies of the logos
b) some users of image resizers would see the warning sign reduced
(I recently had someone complain about an error on our google maps our office 
is here
page, and it turned out the visitor was using a smartphone via an image resize 
service)

Regards
Wolfgang



Re: why don't banks do more against phishing?

2012-04-22 Thread Mahmoud Khonji
On 04/23/2012 06:40 AM, Jason Haar wrote:
 OT but related
 
 I just got a bunch of phishing attacks against a bank come through.
 Following the link leads me to some owned website with the fake bank
 frontend - and it had a feature that I've seen time and time again:
 images and links from the real banksite
 
 Why don't banks rub two braincells together and start monitoring the
 referrers on their primary webpages (eg logos, terms and conditions) and
 return a RUN AWAY!!! IT'S A TRAP!!! page whenever someone views the
 phishing sites? The Referrer header would allow that instantly
 
 They really don't give a damn do they...

Seems OK for existing clients who type the domain manually (or via a
bookmark). However, newly visiting clients might find the link via a
search engine, or (say) a site that contains a ranked list of the banks.
In the latter case, the referrer's domain name will not be that of the
bank's, and will likely trigger a false positive.

Boils down to risk management -- money to lose by being a victim, versus
that of turning new customers away due to the false positives.

-- 
Regards,
Mahmoud Khonji
PGP Key: 0x92584ECA


Re: why don't banks do more against phishing?

2012-04-22 Thread xTrade Assessory
Jason Haar wrote:
 OT but related
 
 I just got a bunch of phishing attacks against a bank come through.
 Following the link leads me to some owned website with the fake bank
 frontend - and it had a feature that I've seen time and time again:
 images and links from the real banksite
 
 Why don't banks rub two braincells together and start monitoring the
 referrers on their primary webpages (eg logos, terms and conditions) and
 return a RUN AWAY!!! IT'S A TRAP!!! page whenever someone views the
 phishing sites? The Referrer header would allow that instantly
 
 They really don't give a damn do they...
 


well, this is completely nonsense, not only your opinion but also your
technical suggestion

in first place phishing is not targeting the bank nor it is the victim

phishing deals with the stupidity of the clickers

no serious bank, as any other serious company, would ever send out
emails asking for user details

the user who believes that, is or incredible ingenious or incredible
stupid, so: happy clicking

it is honorable that developers and technicians care and try to find
counter measurements, but it is not their responsibility, either the bank's

who clicks on a phishing attempt, I'd say, well done, hopefully he types
in name and passwd, so that would be then a real learning lesson, one
more saved :)

what you're asking for is making the police pay for a stolen car ...


if you target a culprit you should go after all this irresponsible
webhosting companies which do not review the content and web admins who
do not have a clew about what they are doing


Hans






-- 
XTrade Assessory
International Facilitator
BR - US - CA - DE - GB - RU - UK
+55 (11) 4249.
http://xtrade.matik.com.br


Re: More on phishing

2006-03-09 Thread Philip Prindeville
Philip Prindeville wrote:
 What about flagging HTML that has:
 
 a href=.* onMouseOver=window.status
 
 I.e. any links that attempt to intercept onMouseOver events and override
 the status window should be flagged as suspect...
 
 -Philip


Actually, this seems to work:

rawbody L_PHISH /[aA] [hH][rR][eE][fF]=.* 
(onMouseOver|onMouseMouse)=window\.status=/
describe L_PHISHTest for PHISH overwrites the status bar
score L_PHISH   6.0


I suppose I could beef it up with a test to see if __CTYPE_HTML was
set at the same time...

Not sure how case-sensitive JavaScript is to whether onmouseover is the
same as onMouseOver...  I'm not a JS-head.

-Philip


Re: More on phishing

2006-03-09 Thread Kelson

Philip Prindeville wrote:

Actually, this seems to work:

rawbody L_PHISH /[aA] [hH][rR][eE][fF]=.* 
(onMouseOver|onMouseMouse)=window\.status=/
describe L_PHISHTest for PHISH overwrites the status bar
score L_PHISH   6.0

I suppose I could beef it up with a test to see if __CTYPE_HTML was
set at the same time...

Not sure how case-sensitive JavaScript is to whether onmouseover is the
same as onMouseOver...  I'm not a JS-head.


JavaScript is case sensitive, but HTML is not.  (XHTML, however, is -- 
at least in theory.)


In this syntax, onMouseOver is actually an HTML attribute of the A tag. 
 The value of that attribute, however, contains JavaScript.  So 
onMouseOver, ONMOUSEOVER, onmouseover are all equivalent, but 
window.status has to be in all lower case.


Incidentally, I've never heard of onMouseMouse. Should that be onMouseMove?

--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: More on phishing

2006-03-09 Thread Philip Prindeville
Kelson wrote:
 Philip Prindeville wrote:
 
Actually, this seems to work:

rawbody L_PHISH /[aA] [hH][rR][eE][fF]=.* 
(onMouseOver|onMouseMouse)=window\.status=/
describe L_PHISHTest for PHISH overwrites the status bar
score L_PHISH   6.0

I suppose I could beef it up with a test to see if __CTYPE_HTML was
set at the same time...

Not sure how case-sensitive JavaScript is to whether onmouseover is the
same as onMouseOver...  I'm not a JS-head.
 
 
 JavaScript is case sensitive, but HTML is not.  (XHTML, however, is -- 
 at least in theory.)
 
 In this syntax, onMouseOver is actually an HTML attribute of the A tag. 
   The value of that attribute, however, contains JavaScript.  So 
 onMouseOver, ONMOUSEOVER, onmouseover are all equivalent, but 
 window.status has to be in all lower case.
 
 Incidentally, I've never heard of onMouseMouse. Should that be onMouseMove?
 

Gah...  Fat fingers.  Yes, onMouseOver or onMouseMove.

Although I've not seen spam containing onMouseMove, but looking at:

http://www.w3.org/TR/html4/interact/scripts.html

it would seem to be useful to protect against both.

-Philip


Re: More on phishing

2006-03-09 Thread Loren Wilton
 What about flagging HTML that has:

 a href=.* onMouseOver=window.status

 I.e. any links that attempt to intercept onMouseOver events and override
 the status window should be flagged as suspect...

That would be nice, but spammers learned long ago (after I wrote rules for
those things) that all you need to do is break the html over two lines and
SA can't catch it, because rawbody can only work on one line at a time.

Loren



Re: More on phishing

2006-03-09 Thread Theo Van Dinter
On Thu, Mar 09, 2006 at 09:38:57PM -0800, Loren Wilton wrote:
 That would be nice, but spammers learned long ago (after I wrote rules for
 those things) that all you need to do is break the html over two lines and
 SA can't catch it, because rawbody can only work on one line at a time.

Just to cancel the misinformation a bit.  SA *can* catch any of this
stuff, it just may not be as easy as writing a RE rule.  It's also worth
noting that rawbody works differently in 3.2 so writing RE rules for
this stuff will be possible/easier when it's released.

-- 
Randomly Generated Tagline:
If you take the plunge, return it by Tuesday.


pgpM3IM6usaDw.pgp
Description: PGP signature