PhishEye: Live Monitoring of Sandboxed Phishing Kits

被引:68
作者
Han, Xiao [1 ,2 ]
Kheir, Nizar [1 ]
Balzarotti, Davide [2 ]
机构
[1] Orange Labs, Paris, France
[2] Eurecom, Biot, France
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
D O I
10.1145/2976749.2978330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is a form of online identity theft that deceives unaware users into disclosing their confidential information. While significant effort has been devoted to the mitigation of phishing attacks, much less is known about the entire life-cycle of these attacks in the wild, which constitutes, however, a main step toward devising comprehensive antiphishing techniques. In this paper, we present a novel approach to sandbox live phishing kits that completely protects the privacy of victims. By using this technique, we perform a comprehensive real-world assessment of phishing attacks, their mechanisms, and the behavior of the criminals, their victims, and the security community involved in the process based on data collected over a period of five months. Our infrastructure allowed us to draw the first comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last interaction with real victims and with security researchers. Our study presents accurate measurements of the duration and effectiveness of this popular threat, and discusses many new and interesting aspects we observed by monitoring hundreds of phishing campaigns.
引用
收藏
页码:1402 / 1413
页数:12
相关论文
共 44 条
[1]  
Aaron G., APWG GLOBAL PHISHING
[2]  
Aaron G., APWG PHISHING ACTIVI
[3]  
[Anonymous], DETECTION INTRUSIONS
[4]  
[Anonymous], SIGCHI C HUM FACT CO
[5]  
Bursztein E., 2014, INT MEAS C IMC
[6]  
Canali D, 2013, ANN NETW DISTR SYST
[7]  
Chou N., 2004, ANN NETW DISTR SYST
[8]  
Clayton R., 2015, WORKSH EC INF SEC
[9]  
Cova M., 2008, WORKSH OFF TECHN WOO
[10]  
Dhamija R., 2006, SIGCHI C HUM FACT CO