Dealing with phishers
2008-05-07 16:00![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
There's been a raft of phishing attacks against Universities over the last few months. We received a couple of thousand of these last night:
Subject: CONFIRM YOUR EMAIL ADDRESS Date: Tue, 6 May 2008 16:08:53 -0400 From: CAM SUPPORT TEAMReply-To: Dear Cam Subscriber, To complete your (CAM) account, you must reply to this email immediately and enter your password here (*********) Failure to do this will immediately render your email address deactivated from our database. You can also confirm your email address by logging into your CAM account at www.webmail.cam.ac.uk/ Thank you for using CAM.AC.UK! FROM THE CAM SUPPORT TEAM
We did the usual announcement dance, including a notice on the webmail login page, but this did not prevent some users (including webmail users!) from replying to the phish.
captain_aj suggests scanning email to reject it if it contains the user's password. I wonder how long it would take to crypt() every word of every message... :-)
no subject
Date: 2008-05-07 15:12 (UTC)no subject
Date: 2008-05-07 15:31 (UTC)no subject
Date: 2008-05-07 15:33 (UTC)no subject
Date: 2008-05-07 15:47 (UTC)1. Send everyone an email containing the word [password1] and inviting them to reply to look at [enticing pics]
2. Send everyone an email not containing the word [password1] and inviting them to reply to look at [different enticing pics]
3. Assume everyone who replies to the second only has the password "password1"
4. Profit.
I'm sure that doesn't work, but something in that plan gives me the heebiejeebies even if it's possible. (Though admittedly it may be better than letting people tell people their passwords.)
no subject
Date: 2008-05-07 18:23 (UTC)I mean you can guess the password, but that only gives you one attempt (because anyone receiving a few thousand such emails would be tipped off) per user. Wouldn't it be easier to just try to brute force logging in?
no subject
Date: 2008-05-07 23:35 (UTC)Wouldn't it be easier to just try to brute force logging in?
Well, maybe, but I guessed there would be something to stop someone trying n00 logins.
no subject
Date: 2008-05-07 23:36 (UTC)no subject
Date: 2008-05-08 04:22 (UTC)Someone is doing that. Our firewall has blocked about 180 hosts in 24 hours, for trying to make too many ssh connections.
The coincidence of the timing is *interesting*, though the logs suggest the ssh attacks are targetting root.
no subject
Date: 2008-05-07 15:47 (UTC)no subject
Date: 2008-05-07 16:09 (UTC)no subject
Date: 2008-05-07 16:37 (UTC)(Surely nobody reading this journal will fall for that old chestnut?)
no subject
Date: 2008-05-07 16:52 (UTC)no subject
Date: 2008-05-07 19:56 (UTC)I'm wondering if this idea is inspired or stupid.
no subject
Date: 2008-05-07 20:05 (UTC)no subject
Date: 2008-05-07 20:08 (UTC)no subject
Date: 2008-05-07 22:59 (UTC)no subject
Date: 2008-05-08 00:12 (UTC)I'm thinking of skipping the message header and checking the first few hundred words that pass these basic tests.
no subject
Date: 2008-05-08 09:01 (UTC)no subject
Date: 2008-05-08 21:27 (UTC)You could get a crypto processor. This is our one: http://www.broadcom.com/products/Small-Medium-Business/Security-Processor-Solutions/BCM5862
It can do 2Gbps ipSEC. It's not immediately clear to me how many crypt operations this means it could do.