phishing scams were “successful”

Winning the Battle Against Phishing
Scams (as the war rages on)
Harvard Townsend
Chief Information Security Officer
Kansas State University
[email protected]
EDUCAUSE SPC 2012
May 16, 2012
“Don’t let anybody tell ya it’s easy!”
Agenda
• History (ah, that fateful day in January
2008 when the first phishing scam arrived)
• Examples
• The statistics
• The battle plan
• What has worked for you?
First
Phishing
Scam
Received
at K-State
Jan. 2008
(yielded 4
replies)
Most Effective
Spear Phishing
Scam - resulted in
62 stolen
accounts, 53 of
which were used
to send spam from
our Webmail; can
you say “spam
block lists,”
anyone?
37 were newly
admitted freshman
who had not yet
stepped foot on
campus.
6
Most
Effective
Spear
Phishing
Scam
7
Most
Effective
Spear
Phishing
Scam
8
Another effective spear
phishing scam
This one
also tricked
62 KStaters into
giving away
their eID
password
9
Another effective spear
phishing scam
Actually did
come from a
K-State email
account…
one that was
compromised
because the
user gave
away her eID
password in
another
phishing
scam!
10
Spear phishing scam received by K-Staters in January 2010
If you clicked on the link…
11
The malicious link in the scam email took you to an exact replica
of K-State’s single sign-on web page, hosted on a server in the Netherlands,
that will steal their eID and password if they enter it and click “Sign in”.
Clicking on “Sign in” then took the user to K-State’s home page.
Note the URL – “flushandfloose.nl”, which is obviously not k-state.edu
12
Fake SSO
web page
Real SSO
web page
13
Fake SSO
web page –
site not
secure (http,
not https) and
hosted in the
Netherlands
(.nl)
Real SSO
web page –
note “https”
14
Fake SSO
web page
Real SSO
web page –
Use the eID
verification
badge to
validate
15
Result of clicking on eID verification badge on the fake SSO web site, or
any site that is not authorized to use the eID and password
16
Result of clicking
on eID
verification badge
on a legitimate KState web site
that is authorized
to use the eID
and password for
authentication
17
Real K-State Federal Credit
Union web site
Fake K-State Federal Credit
Union web site used in spear
phishing scam
18
Phun Phishing Phacts
• Significant shift in the form of phishing
since September 2010
– Before, was 60-70% “reply to this email
with your password”
– Since September 2010, 60+% are “click
on this link and fill out the form”
– 81% were form-based in 2011
– 84% YTD in 2012
• 36% of those in Google Docs
19
Typical phishing form
• Usually hosted on compromised server
• Use of PHP Form Generator very common
20
Typical phishing form
Sometimes we can get administrative access to the form
and delete or modify it, even view list of people who filled it
out in order to identify who from K-State was duped by the
phishing scam.
21
Use of Google Docs
Recent trend of using forms in spreadsheets.google.com
https://spreadsheets.google.com/viewform?formkey=dEJhZ2RwTHRpakJ0RmNJcmZhX0EyWkE6MQ
22
Even have form-based AND reply-to
method in the same phishing scam email!
23
Phishing by the Numbers
• K-State IT security Incidents in 2011
– 223 Spear phishing
– 125 Malicious code activity
– 101 Unauthorized access
– 84 Spam source
– 56 Policy violation
– 56 DMCA violation
–
6 Criminal activity/investigation
–
9 Reconnaissance activity
–
3 Denial of Service
–
2 Web/BBS defacement
–
1 Confidential data exposure
–
1 Rogue server/service
–
0 Un-patched vulnerability
–
7 No incident
24
Phishing by the Numbers
• K-State IT security Incidents in 2011
– 223 Spear phishing
– 125 Malicious code activity Mostly due to spear
– 101 Unauthorized access
phishing scams (65%)
– 84 Spam source
– 56 Policy violation
– 56 DMCA violation
–
6 Criminal activity/investigation
–
9 Reconnaissance activity
–
3 Denial of Service
–
2 Web/BBS defacement
–
1 Confidential data exposure
–
1 Rogue server/service
–
0 Un-patched vulnerability
–
7 No incident
25
Phishing by the Numbers
• K-State IT security incidents in 2010
–
–
–
–
–
–
–
–
–
–
–
–
–
–
408 Spear phishing
Mostly due to spear
355 Spam source
phishing scams
344 Unauthorized access
(74% of all incidents!!)
103 Malicious code activity
93 Policy violation
83 DMCA violation
23 Criminal activity/investigation
10 Web/BBS defacement
8 Reconnaissance activity
3 Confidential data exposure
1 Rogue server/service
0 Un-patched vulnerability
0 Denial of Service
82 No incident
}
26
A good change in the last year (55% reduction)
largely due to reduced phishing-related incidents.
Note the 3.0 incidents per day in 2010.
27
0.5 incidents per day (in 2011) instead of 3.0 –
we could manage the load w/o phishing scams!
28
First phishing scam detected at K-State on January 31, 2008
Data at the end of 2011:
• 1,215 compromised eIDs since then and,
• 1,145 different phishing scams… that we know of
• 68% reduction in compromised eIDs in 2011
• 45% reduction in phishing scams
29
If extrapolate year-to-date statistics for 2012, it’s even more
apparent that the users are getting the message.
As of May 11, 2012:
• 47 compromised eIDs
• 186 unique phishing scams
30
Criminals on vacation
in March? Spring Break!
47 compromised eIDs used
to send spam on July 9;
hackers accumulated stolen
credentials and used them
all on the same day
We’re doing
something
right!
Are people more susceptible
at the start of each semester?
31
Demographics of Phishing
Scam Replies in 2011
• 125 Students (85% of total eIDs that replied to scams)
–
–
–
–
–
–
–
–
2 Newly admitted, have not attended yet
15 Freshmen
22 Sophomore
22 Junior
28 Senior
They should
33 Graduate (22 Master’s, 11 PhD)
know better!
1 Vet Med
2 non-degree
}
•
2 Alumni
• 11 Staff (8 current, 3 retired)
•
8 Faculty (5 current, 1 adjunct, 1 Instructor, 1 emeritus/retired)
•
1 Post-Doc
•
1 Senior administrator
•
1 repeat offender (faculty member who has now given away his
password 5 times over the last 3 years)
32
Demographics of Phishing
Scam Replies in 2010
• 390 Students (87% of total eIDs that replied to scams)
•
•
•
•
•
•
•
–
–
–
–
–
–
–
–
–
95 Newly admitted, have not attended yet
89 Freshmen
55 Sophomore
35 Junior
54 Senior
43 Graduate (31 Master’s, 12 PhD)
6 Vet Med
10 Alumni
9 non-degree
}
They should
know better!
26 Staff (24 current, 2 retired)
16 Faculty (6 current, 3 adjunct, 2 Instructor, 5 emeritus/retired)
1 Post-Doc
0 Senior administrators
0 Other (like a sorority house mom)
231 employees (i.e., lots of student employees duped)
13 Repeat offenders (retired HUMEC faculty wins the prize for
replying 5 times; barely beat retired music faculty @ 4 replies)
33
Demographics of Phishing Scam
Replies in 2011
• Gender
• Female: 83 (56%)
• Male:
65 (44%)
• (58/42 in 2010)
34
Demographics of Phishing Scam
Replies in 2011
• Students by academic college:
–
–
–
–
–
–
–
–
–
–
–
45 – Arts & Sciences
20 – Human Ecology
14 – Business
13 – Agriculture
9 – Education
8 – Engineering
4 – Architecture
4 – Technology & Aviation /Salina
2 – Non-degree students
1 – Veterinary Medicine
5 – Undecided/Unknown
35
Demographics of Phishing Scam
Replies in 2011*
* From the department of meaningless statistics
36
More Phun Phishing
Phacts
• In 2009, 79 of the 296 (27%)
phishing scams were “successful”
(i.e., got replies with passwords)
• Given this success rate, it’s no wonder
the hackers don’t stop!!
37
Our Phishing Defense Strategy!?
The Greatest Threat?!
• 96.5% of the security incidents at
K-State in 2010 attributed to user behavior
• Every one of the 1,262 stolen eIDs could
have been prevented by informed users
• In other words, we have to “thin the bozone!”
(bozone = “The substance surrounding stupid
people that prevents good ideas from
penetrating”)
• User awareness and training a major part of
our anti-phishing strategy
“There’s no patch for the stupid user”
• Started mandatory annual security training
for all employees in 2011
– Focused on phishing scams and
password management
– Developed in-house with K-State-specific info
and examples
– Refresher training in 2012 includes
more on phishing
– Had some positive effect in spite
of venomous push-back
Communicate! Communicate! Communicate!
•
•
•
•
•
•
•
•
•
•
•
Email
•
Web site
•
Blog
•
Twitter
•
RSS
•
Policies/procedures/guidelines/st
andards
•
Weekly IT newsletter articles
•
K-State Today news
•
Student newspaper articles
•
Advertisements
Video
Seminars
Online training
Face-to-face training
Monthly IT security roundtables
Annual day-long security
workshop
New student orientation
Notices on enterprise systems
IT employee email footer (“KState will never ask for...”)
Personal visits to committees,
councils, departments
And something new in fall 2011...
National Cyber Security
Awareness Month
Technical Defenses
• Leverage Procera PacketLogic 8720
(primary purpose is P2P filtering) installed
at campus border
– Block known malicious IPs since Oct. 2010
– Use Python API with web app to block
malicious links to phishing forms in scam
emails
Help from Trend Micro
• K-State uses Trend Micro OfficeScan
(TMOS) for endpoint security (AV, firewall,
host IDS)
• Includes Web Reputation Services (WRS)
– Blocks access to known disreputable sites,
including those used in phishing scams
– Enabled in both Windows and Mac versions
– K-State IT security team regularly reports new
malicious links to Trend to add to the block list,
especially those found in phishing scams
– Will soon be able to add malicious URLs to our
own “blacklist” in WRS so they’re blocked sooner
(feature in TMOS 10.5)
45
Technical Defenses
• Merit Network, Inc. hosts our Zimbra Collaboration
Suite (email, calendar, etc.)
• Addition of IronPort in Sept. 2010
– Reduced # of phishing scams received (although
many undetected since they come from reputable
sources – compromised accts at other edu
institutions)
– More placed in user Junk folders (but still have users
responding from there)
– If user forwards their ksu.edu email to an external
account, like Hotmail, Merit’s spam tagging is not
recognized, so the scam still appears in their inbox
– Only filters inbound email at this time
Technical Defenses
• Quick detection of compromised accounts
• Merit monitors for changes in user preferences,
identities, and signatures
– Changes made from known suspicious IP (41.0.0.0/8!)
– Spam-like keywords or domains (“barrister,” “lottery,”
“claimsdept,” 9.cn, yahoo.com.hk, live.hk, etc.)
– Email addresses in the anti-phishing-email-reply list
– Many sequential addresses added to Contact
List/AddressBook
• Patterns in sent mail
– First 3 letters of each recipient; sort; look for close
sequences ([email protected], [email protected], etc.)
– Large adds to “Emailed Contacts”
• And, of course, respond to external complaints
Technical Defenses
• Lock accounts that trigger any of these criteria
– Merit staff alerted of any faculty/staff acct, then manually
inspects it before locking
– Student accounts automatically locked during nonbusiness hours (also manually inspected during business
hours)
– Generates a notification email to K-State
• Security team verifies compromise by inspecting the account
preferences, signature block, INBOX, Sent folder
• Resets password so eID cannot be used for any services
• Creates a trouble-ticket (Service-Now) and assigns it to the IT
Help Desk
• Help Desk contacts user or waits until they call; assists with
changing their password; provides opportunistic “training”
• The user changing their password removes the Zimbra lock
Fillet-o-Phish
• Processing phishing scam emails to limit
the threat
– Growing number of users trained to submit
phishing scams to [email protected] – with full
headers!
– Is a priority to process them asap
Processing Phishing Scams
• Malicious URL in Procera
PacketLogic (campus
border only)
• Malicious URL in Trend
Micro Web Reputation
Services (all endpoints,
independent of location)
• Reply-to addr not blocked
Block
Notify
•
•
•
•
Origin of email
Host of web form
Host of Reply-to email address
Anti-phishing-email-reply list
• Post scam email to IT Security Threats
Blog
(automatically sends it via email, RSS,
or Twitter)
• threats.itsecurity.ksu.edu
• Provides examples from which users
can learn
• Users can check to see if we already
know about a phishing email
Inform
Log
• Incident ticket in Service-Now (resolved)
Processing Phishing Scams
Notify
• Malicious URL in Procera PacketLogic
(campus border only)
• Malicious URL in Trend Micro Web
Reputation Services (all endpoints,
independent of location)
• Reply-to addr not blocked
Block
• Origin of email
• Host of web form
• Host of Reply-to
email address
• Anti-phishing-emailreply list
• Post scam email to IT Security Threats
Blog
(automatically sends it via email, RSS, or
Twitter)
• threats.itsecurity.ksu.edu
• Provides examples from which users can
learn
• Users can check to see if we already
know about a phishing email
Inform
Log
• Incident ticket in Service-Now (resolved)
Processing Phishing Scams
• Malicious URL in Procera
PacketLogic (campus border
only)
• Malicious URL in Trend Micro
Web Reputation Services (all
endpoints, independent of
location)
• Reply-to addr not blocked
Block
Notify
•
•
•
•
Origin of email
Host of web form
Host of Reply-to email address
Anti-phishing-email-reply list
• Post scam email to IT
Security Threats Blog
(automatically sends it via
email, RSS, or Twitter)
• threats.itsecurity.ksu.edu
• Provides examples from
which users can learn
• Users can check to see if
we already know about a
phishing email
Inform
Log
• Incident ticket in Service-Now
(resolved)
Processing Phishing Scams
Log
• Malicious URL in Procera PacketLogic
(campus border only)
• Malicious URL in Trend Micro Web
Reputation Services (all endpoints,
independent of location)
• Reply-to addr not blocked
Block
Notify
•
•
•
•
Origin of email
Host of web form
Host of Reply-to email address
Anti-phishing-email-reply list
• Post scam email to IT Security Threats
Blog
(automatically sends it via email, RSS, or
Twitter)
• threats.itsecurity.ksu.edu
• Provides examples from which users can
learn
• Users can check to see if we already know
about a phishing email
Inform
• Create incident ticket in
Service-Now
(status=resolved)
Summary
• Combination of factors made us a less attractive target
– Focused user awareness and training
• Mandatory annual IT security training started in 2011
• Wide variety of communication
– More aggressive spam filtering (IronPort)
• More scams rejected from being delivered
• Those that get through put in Junk folders
– Quick processing of phishing scams
• Users trained to send us scams as they arrive
• Quickly block access to phishing forms
– Early detection/locking of compromised accounts
• Often lock the account before it’s used to send spam
• 148 compromised eIDs in 2011 still too many;
probably time to re-evaluate our strategy
Dealing with spam block lists
• Serious problem since so many people forward
their @ksu.edu email to external accounts
– 25% of current students forward
– 31,506 former students forward (!)
– 15,507 former employees forward
• Merit has to request removal; have had mixed
results
• Paid for subscription to RBLmon (rblmon.com,
$10/month) and MxWatch (mxtoolbox.com,
$20/month) to alert us when we’re added to a
block list
Other Strategies
• To PhishMe or not to PhishMe...
• Require annual IT security training for students
• Check logs for access to other enterprise systems by
compromised eIDs
– Submit bogus credentials to see how they’re used
•
•
•
•
•
•
•
Outbound spam filtering
Outbound mail rate limiting
Use IDS or SIEM to alert us of a spam run
DNS sinkhole malicious domains
SPF and DKIM validation
Remove scams from inboxes after delivery
What has worked for you?
Q&R – Question & Response
(i.e., I don’t have all the answers!)
What’s on your mind?
?
? ?
?
?
?
? ?
? ?