What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites

被引:35
作者
Peng, Peng [1 ]
Xu, Chao [1 ]
Quinn, Luke [1 ]
Hu, Hang [1 ]
Viswanath, Bimal [1 ]
Wang, Gang [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
来源
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) | 2019年
关键词
Phishing; Measurement; Honey Account;
D O I
10.1145/3321705.3329818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing has been a big concern due to its active roles in recent data breaches and state-sponsored attacks. While existing works have extensively analyzed phishing websites and their operations, there is still a limited understanding of the information sharing flows throughout the end-to-end phishing process. In this paper, we perform an empirical measurement on the transmission and sharing of stolen login credentials. Over 5 months, our measurement covers more than 179,000 phishing URLs (47,000 live phishing sites). First, we build a measurement tool to feed fake credentials to live phishing sites. The goal is to monitor how the credential information is shared with the phishing server and potentially third-party collectors on the client side. Second, we obtain phishing kits from a subset of phishing sites to analyze how credentials are sent to attackers and third-parties on the server side. Third, we set up honey accounts to monitor the post-phishing exploitation activities from attackers. Our study reveals the key mechanisms for information sharing during phishing, particularly with third-parties. We also discuss the implications of our results for phishing defenses.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 42 条
[1]  
Afroz Sadia, 2011, P ICSC 11
[2]  
Akhawe Devdatta, 2013, P USENIX SEC 13
[3]  
[Anonymous], P NDSS 14
[4]  
[Anonymous], 2016, JOHN PODESTAS EMAILS
[5]  
[Anonymous], 2018, UNITYPOINT HLTH NOTI
[6]  
[Anonymous], 2018, Data Breach Investigations Report
[7]  
[Anonymous], 2019, BIGGEST HEALTHCARE D
[8]  
[Anonymous], 2017, PHISH BARREL HUNTING
[9]  
[Anonymous], P CCS 17
[10]  
Blum Aaron, 2010, P AISEC 10