One of the solutions that has been widely used by naive users to protect against phishing attacks is security toolbars or phishing filters in web browsers. The present study proposes a new attack to bypass security toolbars and phishing filters via local DNS poisoning without the need of an infection vector. A rogue wireless access point (AP) is set up, poisoned DNS cache entries are used to forge the results provided to security toolbars, and thus misleading information is displayed to the victim. Although there are several studies that demonstrate DNS poisoning attacks, none to our best knowledge investigate whether such attacks can circumvent security toolbars or phishing filters. Five well-known security toolbars and three reputable browser built-in phishing filters are scrutinized, and none of them detect the attack. So ineptly, security toolbars provide the victim with false confirmative indicators that the phishing site is legitimate. Copyright © 2009 John Wiley & Sons, Ltd.
A rogue wireless access point is set up and poisoned DNS cache entries are used in a local DNS poisoning attack to bypass five well-known security toolbars and three reputable browser built-in phishing filters.
[1]
Suku Nair,et al.
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
,
2008,
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2]
Tim Kindberg,et al.
Measuring trust in wi-fi hotspots
,
2008,
CHI.
[3]
Lorrie Faith Cranor,et al.
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
,
2008,
CHI.
[4]
Markus Jakobsson,et al.
Drive-By Pharming
,
2007,
ICICS.
[5]
Markus Jakobsson,et al.
Warkitting: The Drive-by Subversion of Wireless Home Routers
,
2006,
J. Digit. Forensic Pract..
[6]
Min Wu,et al.
Do security toolbars actually prevent phishing attacks?
,
2006,
CHI.
[7]
Lorrie Faith Cranor,et al.
Phinding Phish: An Evaluation of Anti-Phishing Toolbars
,
2007,
NDSS.
[8]
Srivaths Ravi,et al.
Security in embedded systems: Design challenges
,
2004,
TECS.
[9]
John C. Mitchell,et al.
Client-Side Defense Against Web-Based Identity Theft
,
2004,
NDSS.