Mobile users more vulnerable to phishing attacks
Posted on 04 January 2011.
Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users accessed the websites, when they visited them, whether they submitted their login information, and what devices they used to access the website.

Below are a few interesting findings from these logs.

Mobile users are the first to arrive

As soon as a phishing website is broadcast through fraudulent email messages the first systems to visit it are typically mobile devices.

This makes sense since mobile users are "always on" and are most likely to read email messages as soon as they arrive. Meanwhile, desktop users only read messages when they have access to their computer.

Also most fraudulent emails call for immediate action. For example, they usually claim that suspicious activity has been detected in the user’s account and that immediate action is required. Most victims who fall for this ploy will visit the phishing site quickly.

The first couple of hours in a phishing attack are critical. After that many attacks are blocked by phishing filters or taken down. Hence Mobile users are more likely to be hit by Phishing just because they're "always on".

Mobile users accessing phishing websites are three times more likely to submit their login info than desktop users

Most users who access phishing websites do not submit their personal information. Some submit fake information. However, compared with desktop users, mobile users are three times more likely to submit private information once they access a phishing website. Why do mobile users trust phishing websites more?

One explanation could be that it's harder to spot a phishing website on a mobile device than on a computer. As a research experiment, Trusteer compared the user experience of accessing a phishing website on a Blackberry and an iPhone.

BlackBerry: It's very difficult to tell whether an email is fraudulent since the “From” field doesn't include the sender's address but rather the name of the sender (such as ACME Bank). Some users could interpret that the device "trusts" the sender more because it is just shows the name and not the full address. Although email addresses can be spoofed, if the entire address is visible and appears “phishy”, certain users will not click through the link in the message.

In HTML mail (the most common format for fraudulent messages) when a link is embedded, hovering over the link will not reveal the actual address. When the user clicks on the link the BlackBerry device presents the following message: "Continue to" with the real address appended. Due to the limited screen size, if the URL is long enough and well crafted it is hard to detect that the URL is not legitimate.

Once the BlackBerry switches to the browser and starts loading the phishing website the top bar shows the website name created by the fraudster (e.g. Welcome to ACME Bank) and the real address is not presented. If the phishing website is a good clone of the authentic bank’s website (and most are) there is no easy way of determining that the website is fraudulent.

iPhone: The experience on this device is similar to the BlackBerry until the user clicks on a link. iPhone devices don't ask the user if they want to open the URL. They automatically load the page. Unlike the BlackBerry, the iPhone does have an address bar. However, due to size limitations only the beginning of the URL is shown. Here again, if the URL is well crafted it's hard to detect that the URL is not legitimate.

According to Trusteer, it's equally difficult to spot phishing websites on BlackBerry and iPhone devices.

Eight times more iPhone users accessed these phishing websites than Blackberry users.

According to Comscore's October 2010 U.S Mobile Subscriber Market Share report, BlackBerry devices are still the market share leader in the US with almost 36% compared to iPhones with 26%.

Then why are more iPhone users accessing phishing websites? One explanation could be that Blackberry users, many of which are issued their device by a business, are more educated about Phishing threats and thus less likely to click these links, and have better protection on their mail servers. Although we don’t have any data to validate this theory, if in fact the iPhone is more commonly used in the private sector then this is a very plausible reason for these findings.

Also, the message that Blackberry devices present when a user clicks on the link in a Phishing email may discourage a certain percentage of victims from proceeding to the phishing website. Another possibility is that the Comscore market share numbers are inaccurate, and the iPhone has a greater market share than currently documented.





Spotlight

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //