Vous êtes sur la page 1sur 19

CAN STRONG ABSTRACT

AUTHENTICATION
SORT OUT
PHISHING AND
FRAUD?
Authentication, especially two- This paper traces the recent
factor authentication, is seen as evolution of malware techniques
an important step against on-line in response to technological
crime, especially for on-line changes in our security regimes,
banking and Internet shopping. But and proves once again the old
authentication alone is not cliche that the price of freedom
enough to protect computer users is eternal vigilance. The Bad Guys
against the efforts of are out to get us, and if they
organized crime to thieve their can turn our defences against us,
credentials, their data and even even in the slightest way,
their identity. then they surely will.
In fact, strong authentication in Q. Can strong authentication sort
only one part of a system may out phishing and fraud?
even make things worse if users
expect to rely entirely on
technology to protect them from A. No.
phishing and related attacks.
Organized criminals have realised
(precisely because they are Q. Hmm. That makes for a rather
organized) that phishing and short paper, don’t you think?
identity theft can be carried out
over an extended period, by
piecing together snippets of A. Yes.
information from separate attacks
for a final sting. For Q. Could you go into a little more
example, logging on using an detail?
authentication token will
neutralize password stealers, but
the very presence of a token A. These days, a lot of phishing is
authentication request can make orchestrated, or at least
an ideal trigger for spyware, assisted, by malicious code
especially if its goal is to build up a somewhere in the network. This
pattern of your on-line means that solving the problem of
behaviour by monitoring your malware is effectively a
financial transactions. necessary part of solving the
problems of phishing and fraud.
(When we say ‘fraud’ in this paper, authors, or for phishers, to go to
we mean on-line fraud the next level, does it?
against users conducting business
via their PCs. We do not
mean other sorts of financial fraud A. No. I was just being dramatic.
such as credit card abuse or Nothing, whether it is
kiting.) authentication or something else,
But solving the malware problem is can actually solve the
hard – indeed, it is problem of phishing, in a
undecidable. After all, the Halting mathematical sense of solving it.
Problem tells us that we But
cannot write a program which will we can make phishing much
reliably determine the harder, and authentication is
behaviour of all other possible indeed one of the tools we can use.
programs:
‘No program can say what another
will do. Q. Staying on the topic of malware
Now, I won’t just assert that, I’ll detection for a moment,
prove it to you: I will prove how hard is it to produce malware
that although you might work til – a new banking trojan, for
you drop, you can’t predict instance – which evades detection?
whether a program will stop.

[. . .] A. On one hand, it is getting


harder. On modern PCs,
anti-virus software can be much
You can never discover mechanical more computationally
means for predicting the aggressive than it was in the past.
acts of computing machines. Generic detection techniques
It’s something that cannot be done. mop up a lot of new trojans
So we users must find proactively. On the other hand, it is
our own bugs; our computers are getting easier. You may even be
losers!’ [1] able to precompute whether
This general result can be cast into your new malware will succeed.
specific terms to show that One way to do this is through a
a program which will distinguish targeted attack, where you
unfailingly between malware write a trojan and aim it at a
and non-malware cannot be made. specific part of the Internet, such
Malware authors always get as a single company, whose
a ‘next chance’ to circumvent the defensive posture is known to you.
protection we currently have Targeted attacks are not especially
in place [2]. difficult to orchestrate, and
there is a paper at this conference
which investigates this
Q. However, that doesn’t mean it is phenomenon [3].
always easy for malware
Another way is to use an on-line figuratively) to check:
service to which you can • that trustworthy software is
submit malware samples and from orchestrating the transaction,
which you will receive • that it really is you yourself
automated replies telling you which conducting the transaction,
products detected it, and • that you really are trading with
what they called it. the person or service you
expect,
• that the details of the transaction
Q. On-line services to help you are correct.
fine-tune your phishing Authentication, clearly, can assist
trojans? you with this.

A. That’s not how they position Q. How? Can you start by giving
themselves, of course. Several me an example of the sort of
such services exist, and some are authentication technology which
strongly supported by the can help with each item above?
security industry. VirusTotal [4], for
example, has permission
to use some 25 different products A. Of course. Let’s ask the
for scanning incoming files. questions we want answered one
In return, samples are sent to by one.
vendors who miss them, thus • Is the right program doing the
helping to improve detection and work? Some endpoint
responsiveness. firewalls can help with this, for
Unfortunately, VirusTotal allows example by using
you to withhold submissions cryptographic checksums to
from vendors (though this is not regulate which applications
the default), which could be can make what sorts of connection
said to play into the hands of to which servers.
organized crime and the • Is it really you kicking off the
counterculture. transaction? A hand-held
authenticator can ensure that you
use a new password
Q. So let’s assume you can create every time you connect, which
a new phishing trojan and helps to prevent replay
target me and my company with it. attacks where previously-stolen
How can authentication, or credentials are re-used
anything else, help me then? by someone else.
• Are you connecting to the right
service? Digital
A. When you are carrying out a certificates can help to reassure
financial transaction on-line, you that you are not
there are several things that it speaking to an imposter at the
pays you (literally and other end.
• Are you carrying out the Ross Anderson shows that
transaction you intended? problems in implementation and
Encryption and digital signatures use seem to be the main reasons
provide protection for failure, rather than weak
against exposing the details of the cryptography.
transaction, and help With hindsight, this is perhaps
prevent the transaction being obvious, since they are the two
tampered with in transit. aspects in which human error is
most likely and in which
rigorous peer review is hardest. In
Q. Firewalls, tokens, certificates the last case, human error
and encryption. Aren’t these can effectively be guaranteed by
old technologies that we’ve been cheating or misleading users.
using for ages? Are they Of course, what this means is that
failing us? systems which can work
correctly to provide us with safe
on-line commerce may fail in
A. Yes and no. There are three unexpected ways.
main ways in which
security-related systems fail, and
these are mirrored by the Q. But if a system is vulnerable
main ways in which cryptographic because it doesn’t deal well
systems fail. This is with inadvertent or unexpected
unsurprising, since computer use, doesn’t that mean the
security relies heavily on design is wrong?
cryptography. Things can go wrong
because:
A. Perhaps it does. But the PC, and
its operating system, is
• the underlying design is flawed designed to be a flexible, general-
(e.g. a defective cipher), purpose tool which can be
adapted to many tasks, such as
word processing, browsing the
• the implementation is incorrect Internet, watching movies, making
(e.g. insufficient key art, designing buildings
material is used), and searching for extraterrestrial
life. Users are generally free
to add and remove any software
• the system is used wrongly (e.g. they like at any time in order
users write down their to enjoy this flexibility.
PINs). When you carry out commerce on-
line, for example when
clicking on a [Buy now] link, you
In a seminal paper about the failure need to turn your PC –
of cryptosystems [5], temporarily, and at short notice –
into a secure cryptographic
device which acts as an important banking but that they expect it to
component of the be cheap, and easy, and
transaction. accessible from anywhere. If the
So it is hardly surprising that the bank cuts off their Internet
design of such a system banking in the interests of safety,
makes certain assumptions about and requires them to visit a
the state of the PC, and the branch to sort out any possible
awareness of the user. And it is problems (a reasonable
hardly surprising that the PC, security precaution, you might
or the user, or both, sometimes let think), this is viewed as a bug
the system down. in the system, not a feature.
Uri Rivner of RSA, which makes and
sells cryptographic
Q. Is this really unsurprising? Don’t solutions including hand-held
the banks owe it to us to authenticators, agrees:
do better?

‘...[I]n the online consumer


A. This paper isn’t really about the authentication market, usability
social contract which is in many cases of greater
banks do or don’t have with their importance than security. It’s
customers, so we’ll just look true that some people [would] like
very quickly at both sides of the to see changes in the
argument. banks’ security procedures and
Critics of the banks say that the [would] appreciate it if the
banks aren’t doing enough. financial institution handed them
They say it is the banks who have authentication devices or
the greater interest in came up with other visible security
Internet commerce, because it measures.
allows them to close branches,
lay off tellers and front-of-house
staff, and thus to save an But other customers don’t really
awful lot of money. This money, care about all of that; they
they argue, should already demand security from the bank,
have been used to make Internet but all they really want is
banking much safer than it is. to access their account, pay bills
and transfer money
without any delay or additional
The banks, on the other hand, can challenge...’ [6]
argue at least as reasonably
that the popularity of on-line
commerce is driving the need Q. OK, let’s go back to the failure
for Internet banking (eBay, QED). points above. Can you give
They can also point out historical examples of each sort of
that their younger customers not failure, to paint a picture
only much prefer Internet
of the sorts of thing that can go cryptography but implemented
wrong? Let’s start with the dangerously?
most exciting-sounding one: a
cryptosystem which got cracked.
A simple example of an
implementation flaw – one which
A. An example many people was fixed by devising an
probably know about is Wired alternative but compatible
Equivalent Privacy (WEP), the approach
authentication and encryption – is the way early Unix systems
system originally proposed for stored their password file. All
wireless networking. WEP users and programs need read
relies on a secret key, either 40 or access to this file, as it is
108 bits in length; to access (amongst other things) the
and use the network, you need to database which maps usernames,
know the key. (This, in turn, such as ‘fp’, onto real names, such
means you can read all the traffic as ‘Ford Prefect’.
on the network, just as if However, early Unix
you were on a LAN.) implementations also stored each
As it happens, the cipher used by user’s
WEP has a statistical flaw hashed password in this file, so
which affects the randomness of its anyone could retrieve the
early output bytes. hashes and perform a dictionary
Interestingly, the cipher, RC4, is attack against them off-line.
also used in SSL (which we This meant that weak passwords
will talk about later), but in a way could quickly be recovered
which does not cause the without leaving evidence of the
problems seen in WEP. dictionary attack on the
Nevertheless, the flaw exists in the targeted system.
RC4 cryptosystem itself, or at least The backward-compatible solution,
its key scheduling used in Linux to this
algorithm (KSA) [7], rather than day, was to duplicate the password
simply in WEP’s file, to replace the
implementation. hashes in the world-readable file
This statistical flaw allows an with a dud entry, such as ‘x’,
attacker to recover a WEP key and to read-protect the second
by capturing and analysing a few copy of the file, called the
million wireless packets. So shadow file.
there is no way to fix WEP without
changing it for something
different. WEP is irrevocably User programs worked exactly as
broken. before, except that they saw
dud information for the password
hash, which they didn’t
Q. How about a system which was need anyway. Only the login
based on sound program needed changing to use
the shadow file instead. was entirely legal, as it asked for
permission before sending
any email.
Q. And what about a case where But who had ever heard of
we used security wrongly Permissioned Media Inc. of Sun
and paid the price? Towers, First Floor Office #39, Ave.
Ricardo J. Alfaro,
Panama City, El Dorado Zona 6,
Perhaps understandably, many of Panama? And why did they
us are willing to assume that trust this unknown company with
anyone who is prepared to confirm their email address book?
his identity must, ipso
facto, be trustworthy. So when we
come across an unknown Q. That was in 2002. Have users
program which is digitally signed, got smarter since then?
we sometimes assume that
the signature tells us something
about the morals and the A. FriendGreetings was a problem
character of the signatory, rather for system administrators,
than simply about his name. because of the unwanted email it
So, for example, in late 2002, many generated. It was an
people willingly annoyance for users, for the same
downloaded and installed software reason. The application also
known as FriendGreetings had the troublesome side effect of
from a company identifying itself preventing programs from
as Permissioned Media [8]. appearing in the taskbar, which
These downloads were in response interfered with the correct use
to an email, usually of an affected PC until it was
received from a friend or correctly cleaned up. But
acquaintance, which promised an FriendGreetings didn’t set out to
electronic greetings card. steal information that could
FriendGreetings displayed two End be used to plunder your bank
User Licence Agreements account or to carry out
(EULAs), in the second of which it fraudulent transactions.
claimed permission to
email everyone in your Outlook
address book. Which, of Phishing has raised the bar in
course, it promptly did. terms of the risk that each user,
For system administrators and for and each user’s organization, faces
those in your address book, from malicious code. This,
the side-effects were little different in turn, has raised both concern
from a mass-mailing virus and awareness about malware
such as LoveBug (VBS/LoveLet-A). and the importance of preventing
The signatories, of it. Whether this counts as a
course, claimed that the virus-like silver lining to the cloud that
behaviour of their software organized crime has brought
into the malware scene is not clear, and other companies associated
but an optimist would say with on-line financial
that it has. transactions. Of these, seven were
real and 12 were spoofed.
The goal was to identify which ones
Q. That’s an interesting were bogus. Only one
observation, but I notice you have site (a real one) was identified
skirted the question. Have users correctly by all 22 participants.
got smarter since 2002? All the other sites, real and fake,
got a mixture of answers.

A. Security experts are always on a


slippery slope when Eight of the sites (including six
commenting on the knowledge, or spoofed ones) were
lack of it, shown by misidentified by 11 (50%) or more
users. To come down too hard of the participants. In the
against users sounds arrogant, worst two results, more than 80%
but to exonerate them from any of the participants said that
responsibility for their own a bogus site was real.
PCs is to assume that technology The study explains these results
can solve all security quite clearly. It is worth
problems, which, as we repeating the explanation (or, as
demonstrated light-heartedly at the study more
the conservatively calls it, a
outset, it cannot. hypothesis) because it emphasizes
how hard it is for us to be aware of
everything we need to take
However, recent research carried into account when making value
out in the USA [9] paints a judgements on-line, and
rather dismal picture of levels of shows how easy it is for phishers
common sense amongst and other on-line fraudsters
users. (More accurately, it paints a to exploit this:
dismal picture of a very
small sample of academic staff and
students at a prestigious ‘...Participants made incorrect
American university. The rest of us judg[e]ments because they
might back ourselves to lacked knowledge of how computer
do rather better, but the results are systems worked and
interesting nevertheless.) did not have an understanding of
security systems and
indicators. More experienced
In this study, 22 participants were participants were tripped up
sent to 19 different by visual deception, e.g. when the
websites allegedly belonging to a address was spoofed or
range of well-known banks when images of the browser [user
interface] with security
indicators were copied into website In fact, there are a lot of problems
content. The study also with SSL, though
revealed issues that we did not fortunately these do not appear to
anticipate [...]: be of the ‘flawed
cryptography’ sort. The problems
are a little to do with
• Some users don’t know that implementation (or at least with
spoofing websites is deployment) and a lot to do
possible. Without awareness [that] with use.
phishing is possible, Very broadly speaking, SSL
some users simply do not question provides three main facilities for
website legitimacy. securing web communications:

• Some users have misconceptions • the exchange of digital


about which website certificates, permitting each end
features indicate security. For of the link to establish something
example, participants about the identity of
assumed that if websites contained the other end,
professional-looking
images, animations, and ads,
[then] the sites were • the secure exchange of session
legitimate...’ keys allowing for
So users may be getting smarter, encryption without the need to
but there is still a lot that share key material in
they need to learn and to know. advance,

Q. If we become aware of what this • the encryption of the data in each


study calls ‘security session, using the keys
indicators’ and can use them exchanged above.
reliably, will we be safe? Can
the SSL padlock save the day?
When we are banking on-line, the
encryption is important,
A. Secure Sockets Layer (SSL) is because we do not want others to
very largely the fabric of be able to sniff our account
on-line commerce today. But most numbers, or to learn how much
people assume that it is money we are spending with
simply what it says: secure, which whom. But the first stage, mutual
means that too much trust authentication, is in many
is often placed in the padlock ways more important. Without it,
which most browsers display we can easily be tricked into
when the SSL protocol is in use. engaging in an encrypted
After all, padlock means conversation with a complete
SSL, and SSL means secure. stranger.
an individual unassociated with the
software giant [10].
Unfortunately, there are many
ways in which this
authentication can be subverted, or • By a worthless certificate. It is
can go wrong. Phishers easy to produce a
know this, and so are able to self-signed SSL certificate. In this
succeed despite, or even because case, you act as your
of, the presence of SSL connections own certifying authority, rather
and the padlock in your than paying a known
browser. third party to do this job for you.

Q. But if a connection is secure and • By a low-quality certificate. Some


authenticated, how can it certification
be subverted? authorities (CAs) issue low-cost
certificates, or trial
certificates, which make it easy for
A. There are several different ways smaller vendors to
in which you can be enter the market. In some cases
tricked or misled when making SSL the identity checks
connections, for example: carried out before issuing these
• By falsified security indicators. A certificates are cursory
fake website may serve and almost instantaneous, so the
up pages which render in your certificates have little
browser so that they value for authentication.
suggest a secure connection. The
falsification may range
from the trivial, such as displaying • By malware active on your PC.
a picture of a padlock Malware can suppress
somewhere on the page, to the security errors, create falsified
sophisticated, where security indicators, paint
scripts in the page rewrite over input forms in order to
elements of the browser’s user capture or modify your input
interface to simulate an encrypted before it is encrypted by SSL, or
site. otherwise mislead you
into how your PC or your browser is
behaving.
• By the use of an illegally acquired
certificate. This is
uncommon, but not unknown. For • By becoming accustomed to
instance, in 2001, the starting secure connections
world’s biggest issuer of SSL from insecure pages. Numerous
certificates, Verisign, legitimate on-line
issued and signed a certificate in financial sites [11] invite you to
the name ‘Microsoft’ to login from their main
(http) page, then take you via on one website issued in the name
some scripting to their of another, or use
secure (https) site. In many cases certificates which provoke browser
these insecure pages warnings which can safely
include padlock imagery, lending be ignored. This just reinforces
credibility to spoofed risky behaviour.
sites which do the same.

Q. You mentioned ‘negative


Q. So how can you out-trick such authentication’. Can’t we run
trickery? community-based databases, like
real-time block lists (RBLs)
for spam, which help us to identify
A. Fortunately, many phishing on-line fraudsters?
tricks are obvious once you
know what to look for. In particular,
you should familiarize A. Several such schemes exist.
yourself with SSL certificates and Netcraft, for example [12]
how to check them. If you offers a browser toolbar add-on
know how your bank usually through which you can report
identifies itself to you, for and identify phishers on-line.
instance, then you will more easily Netcraft allows ISPs,
be able to carry out organizations and the like to utilize
‘negative authentication’ when you its database of known
need to. dubious locations on the Internet.
The site http://whichssl.com/, This can be useful in mitigating
though not as independent as its inbound communications
name might imply (it is run by a which reference these sites, such
certification authority), as email which tries to
offers a handy ‘test your own site persuade you to visit a spoofed
now’ link. This takes you to website, or to download a
an https site of your choice whilst piece of malware which the phisher
explaining, in an adjacent can turn against you later.
browser window, how to use your It is also useful in blocking
browser to check the SSL outbound connections which are
certificate supplied by that site. aimed at these sites. The blocking
Most browsers make an effort to can be done by a web filter,
warn you when dubious an endpoint firewall, a router at the
certificates have been presented, organization’s boundary,
but (as [9] suggests) many or in the user’s browser.
users click through these warnings Microsoft has offered an add-on
without giving them the phishing filter [13] for some
attention they deserve. It doesn’t time; this has become a built-in
help that legitimate sites feature in Internet Explorer 7,
frequently allow certificates to currently in its Beta 2 release.
expire, or publish certificates
So community-based block lists can ironically, be to the trojan’s
help, and it is suggested advantage that you check out the
that they can be very responsive if bank’s SSL certificate closely, thus
the community is large ensuring that you are
and widespread. (If just one person connected correctly. If a trojan is
in the entire world intending to manipulate the
reports a phishing site, everyone contents of a transaction, there is
else can benefit from this no point in doing so when
knowledge.) the victim is connecting not to the
But the phishing criminals can bank but to a ‘service’
react nimbly, too. operated by a rival criminal
concern!)
For example, using a network of Initially, the most common PC-
botnet-infected PCs, it would be based attack against banking
a simple matter to ‘report’ that a was indeed the keylogger. The
slew of legitimate sites were concept is simple: watch for a
bogus. Correcting errors of this sort banking transaction, record the
could take the keys typed in (hopefully
law-abiding parts of the community including account number,
a long time, and render password or other personally
the block list unusable until it is identifiable information) and later
sorted out. Alternatively, the pass those keystrokes to
community might need to make it someone outside.
tougher to get an Internet An early response to keyloggers
site added to the list, to resist false was the so-called virtual
positives. This would keyboard, a script-based or image-
render the service less responsive. based system which
requires you to click on pictures of
keys using the mouse.
Q. You mentioned botnets above, Often, the letters or numbers on
which brings to mind the virtual keyboard move
keylogging and other common around randomly each time you
tricks employed by malware. visit the site, so that the
How are we doing against these location of the mouse movements
threats? cannot be replayed. Many
banks still use this system,
believing that it provides
A. A trojan on your PC can succeed additional security.
without subverting your Malware authors were quick to
connection to an on-line service. In respond, painting over input
fact, many forms and popping up virtual
banking-related trojans specifically keyboard simulators which
watch out for you to make captured your details before
a legitimate connection to your forwarding them to the bank (or,
bank. (In this case, it may, to simplify the programming,
before faking an error and
forcing you to start again, this time cannot be re-used, because each
with the trojan allowing password is designed to be
your connection to proceed used once, and only once.
normally). This does, indeed, render a lot of
We can expect this sort of arms current malware impotent.
race to continue. Under some circumstances,
however, a trojan can still benefit
from capturing a one-time
Unfortunately, the phishers are password, for example if it can
more nimble than the banks. It capture the password before it is
might take a bank more than a used. This may be possible
year to introduce brand new using what is called a man-in-the-
web programming and access middle attack. A handy
control into their on-line pictorial summary of a range of
systems. After all, change control, such attacks can be found
correctness and quality are in [14].
an important part of a bank’s IT
ethos.
The criminals have no such Q. Can you give a quick description
constraints – and they do not of how such an attack
especially care if it is their first, works?
tenth or one hundredth trojan
of any new sort which succeeds.
The cost of 99 programmatic A. Imagine that you have to play
failures is inconsequential to them; chess against two
the bank, on the other Grandmasters. (This assumes that
hand, must succeed at the first you are not a top chess
attempt. player yourself.) There is a way in
which you can guarantee
not to get thrashed by both
Q. The malware you describe players, provided that you play
above relies on capturing them both simultaneously, and that
information which can be re-used you are allowed to play
later. Doesn’t the hand-held White in one game, and Black in
authenticator, or token, make that the other.
impossible?

All you do is wait for your White


A. No. Or, more accurately, not opponent to move. Then
entirely. What tokens are make this move against your Black
intended to do is to introduce an opponent. When the Black
unpredictable variable value opponent responds, repeat this
into the authentication process, move against the White player.
instead of a conventional The two Grandmasters are
password. This means that any effectively playing each other. You,
password captured by a trojan
the man-in-the-middle, are simply introducing it to every customer is
relaying moves between unappealing to the banks,
them, although you are turning and partly because the need to
these moves into what looks carry and use a token is still
like two separate games. unpopular with many customers.
A similar principle applies with a So there has been little need
man-in-the-middle trojan. for organized crime to take on the
The idea is simple, though the task of writing this more
implementation may be difficult sort of trojan.
complex.

The trojan waits for you to begin Q. When the criminals are forced to
what you believe to be a confront stronger
transaction with the bank, though authentication, how hard will they
you are in fact find it?
transacting with the trojan. This
means that you mistakenly
authenticate against the trojan, The criminals may not need to
and the trojan uses the subvert the authentication
information you supply – including process at all. Instead, they may
the one-time password simply come up with new
you carefully type in from your ways of tricking you out of your
token – to authenticate itself money. Spammers, for
with the bank. example, already know how to
conduct on-line fraud without
getting hold of your account
The trojan is then free (at least number or password. Many
within certain parameters) to spammers operate by persuading
alter various aspects of the you to conduct a transaction
transaction, such as the amount, willingly and overtly, using your
the destination account, or any hand-held authenticator if
other details of its choosing. you have one, and then supplying
sub-standard goods, or
nothing at all, in return.
Q. Are there already Trojans which Now imagine how much easier it
can carry out this sort of would be for criminals to
attack? seduce you into bogus transactions
if they had a complete
picture of your spending habits.
A. Not yet. The main reason is
almost certainly that token For example, if they knew
authentication is not very common you paid your rent on the seventh
in the Internet banking of every month, and which
world. This is partly because the agency you paid it to, they could
expense and complexity of attempt to phish you into
paying it into a different account. A. ComScore is no longer
And before you respond by distributing Marketscore, perhaps
saying, ‘but it’s such a big step to due to the publicity it received
start paying bills to a new when some American
recipient, so that would simply universities decided to block it
never work’, remember that it outright, despite the strongly
sounds just as far fetched to held tradition of academic freedom
believe that users would willingly on their networks [15].
go and type in their personal But here is what comScore
banking credentials into an themselves [16] have published
unknown website on the say-so of about its behaviour:
an email which could have ‘...[C]omScore has recruited for the
come from anywhere, and probably Marketscore Panel over
did. one and a half million opt-in
The technology to allow outsiders members who have agreed to
to keep detailed track of have their Internet behavio[u]r
your secure on-line activities, confidentially monitored
including everything you buy, and captured on a totally
and when, and where, already anonymous basis. These members
exists. give comScore explicit, opt-in
permission to confidentially
monitor their online activities in
One example is the application return for valuable benefits
Marketscore, created by the
market research company
comScore Networks, Inc. In return [...].
for a modest payment for Those individuals who choose to be
participation, users joined the part of the Marketscore
‘Marketscore Panel’ and installed Panel [...] download comScore’s
the Marketscore technology to their
application. Amongst other browser where it unobtrusively
features, Marketscore routes the member’s
incorporated what is effectively a Internet connection through
man-in-the-middle SSL comScore’s network of
proxy which aimed to crack open servers [...]. The technology allows
and to monitor all your comScore to capture
secure on-line transactions, the complete detail of all the
sending data about everything you communication to and from
bought, and how much you paid for each individual’s computer – on a
it, back to comScore. site-specific,
individual-specific basis.
Information captured on an
Q. Surely a legitimate application individual member basis includes
wouldn’t go quite that far? every site visited, page
viewed, ad seen, promotion used,
product or service
bought, and price paid. some of the new features of
[...] Windows Vista, such as User
Access Control, which tries to
restrict the subversive use of
It is extremely challenging, even the administrator account, and at
with a consumer’s opt-in the features of SELinux,
permission, to capture information which does away with the idea of
communicated to and an all-powerful account
from a browser in a secure session completely.
(e.g. any purchase The short answer points out that
transaction). In order to do this operating systems are
successfully, technology is becoming more resistant to trivial
required that “securely monitors a exploitation, but reminds us
secure connection”. all that there are still two important
[C]omScore’s patent-pending risk vectors:
technology does this at no
incremental cost to comScore or
risk to the panelists...’ • Users and administrators who
As dubious as this may sound, make errors of judgement,
remember that some security and who carry out fully-
products provide gateway-based authenticated installations of
tools to open and examine risky or inappropriate software.
SSL connections out of a network. Vista’s warning that ‘this
Whilst this is culturally operation requires elevation’, and
rather different to placing a its careful display of a
market-research-oriented SSL program’s digital certificate (or lack
proxy on every PC, it is technically of it), for example,
and functionally similar. can be undone with a single mouse
Like many technologies, whether it click to authorize the
is good or evil depends on offending operation.
how it is used, and who is using it.

• Organized crime and the


Q. Let’s return to where we counterculture, who have shown
started, namely the subversion of a willingness to invest considerable
the endpoint via malware and amounts of time in
potentially unwanted probing even the most secure
applications. Will improvements in systems for tiny cracks into
operating system security which they can drive a subversive
help prevent users being wedge. Additionally,
‘marketscored’ by criminals? they are nimble enough to respond
to technological
changes, such as their subversion
A. There is a long answer to that, in of virtual keyboards, in
which we could look at weeks or even days, a luxury which
security
professionals cannot afford. which will slow down its adoption
by the banks; and it is
inconvenient, which will slow down
Q. So can we win? And is its acceptance by users.
authentication the key component
to
staying ahead of the phishers, Also, phishers currently target our
even though it cannot solve the banking credentials so that
whole problem? they can later masquerade as us in
order to raid our accounts.
They do this because they can,
A. Some say that we can, and it is. because it is easy, and because
For example, researchers it works. As we have seen, making
from a Swiss financial institution this harder, or even
and IBM [17] have impossible, is unlikely to stop
proposed an on-line banking phishing. The phishers will
authentication system which respond by attacking and
sounds very secure. subverting other parts of our on-
Briefly summarized, the system line
relies upon an external smart lifestyle.
card reader, with a numeric keypad This doesn’t mean that we should
and a small display. The ignore technological
cryptographic computations for advances in computer security, any
authentication and security more than we should
between the user’s browser and throw out the seat belts, the
the bank are offloaded to the airbags and the crumple zones
smart card (which is tamper- from the modern automobile. But it
resistant and contains an does mean that we need
operating system and software of to keep ourselves informed and
its own); the entry of vigilant when we spend
passwords and one-time codes is money on-line, just as we are
offloaded to the card encouraged to be safer and
reader’s keypad (where they more responsible drivers on the
cannot be sniffed or altered); and road.
each transaction is confirmed
cryptographically after its
details are shown on the card
reader’s display (where they are
not subject to manipulation by
malware writing on top of data
on the screen).
Of course, this system is complex, This article was provided by Sophos
which means it will be and is published here with their full
hard to implement correctly; it is permission. Sophos provides full data
comparatively expensive, protection services including: security
software, encryption software,
antivirus, and malware protection.

Vous aimerez peut-être aussi