Re: [Full-disclosure] simple phishing fix

2008-08-02 Thread lsi
To cut to the chase, approx 80% of all phish target 1 of 20 or less 
companies. [1] [2] [7] [8] [9]

I also found a paper which suggests the blacklist might work. [6]  I 
found three other papers that reviewed phish detection in-depth, 
however none of them seemed to mention filtering on the FROM field. 
[4] [5] [10]

I also detail a fix for unblocked senders (eg. to selectively allow 
mail from spoofed domains, such as Paypal), see below.

Nick says the blacklist won't stop phishing, per se, because phishers 
will begin to target unlisted companies.  While I agree that phishers 
will begin to target unlisted companies, it does not follow that 
phishing will continue to be profitable.  It MAY still be profitable 
to be a phisher in these circumstances.

What will definitely be true is that such a blacklist will make 
phishing less profitable, this being because the total amount of 
funds available to phish has been substantially reduced, while at the 
same time, locating new victims is more difficult.

What will also be true is the list will stop phish from listed 
companies from clogging mail systems, particularly as most users 
never have any need to receive mail from those companies.

I accept that the blacklist MAY NOT make phishing unprofitable, and 
the blacklist WILL NOT stop phish from unlisted companies.

So, the list WILL reduce junk and WILL hit phishers in the back 
pocket.  And this is a bad idea?

Assumptions:

1. the phisher does NOT know which bank his potential victims use
2. the phisher is seeking to maximise revenue, and minimise costs
3. creating the fake mail and site is time-consuming

---

likely factors affecting phishing profitability:

Here's a description of the phishing business model, there's no 
reference cos I made it up.  As you can see there's a few more costs 
than actually spamming out the phish, which I agree may be without 
cost.

total cost =

time + money to create the fake mail
PLUS
time + money to create the fake web site
PLUS
time + money to obtain hosting for the fake web site
PLUS
time + money to obtain/maintain/rent the botnet used to send the fake 
mail
PLUS
time + money to launder the cash
PLUS
time + money on personal security

total revenue =

total number of mails sent
MINUS
mails blocked - bad recipient address
MINUS
mails blocked - filtered (anti-spam/phish filter etc)
MINUS
mails deleted - end-user not a customer of target institution
MINUS
mails deleted - end-user not fooled
MINUS
mails deleted - end-user not interested
MINUS
mails deleted - technical issue
MULTIPLY
average profit per successful phish

Most articles on phishing describe how the fake mail and fake website 
are "carefully" designed, and "carefully" selected recipient lists 
are used.  Careful means slow, AFAIK.  The more careful you are, the 
more successful your phish, BUT the longer it takes you to make, the 
more money you need to make to break even.  So the rational phisher 
will find a balance there.  The point is, the rational phisher will 
not bang out a new site every five minutes.  The site needs to be 
convincing, the email needs to be convincing, and being convincing 
takes time.

I might be wrong.  The kits Nick mentioned might make it all easy.  
But Nick also mentions that those kits are backdoored.  So I think 
that means the rational phisher is going to have to make his own 
pages from scratch.  And that is gonna take time.

Time = money.  If the phisher makes $20/hr from phishing, but he 
could be making $50/hr spamming, it's costing him $30/hr to be a 
phisher.  The rational phisher would cease phishing in these 
circumstances.



statistics showing that blocking the top 20 brands will have a big 
impact:

"..These brands exhibited Pareto-type properties in that a small 
number of brands accounts for a large number of actual phishing 
sites." [9]

Approx 80% of all phish target 1 of 20 or less companies. [1] [2] [7] 
[8] [9]  If those companies were widely blacklisted, 80% of all 
phish/phishers would need to make new phishing sites, and find new 
victims.

Note that 20 is a very small number and a blacklist of this size, 
including variants, is manageable.

Note that although 20 is a very small number, it covers all of the 
most-profitable-to-phish companies currently being phished (assuming 
that profitability-to-phish is proportionate to total phishing 
attempts, this may be wrong, but if it is wrong, some phishers are 
wasting their time).

Although the top 20 account for 80% of total phish, blacklisting mail 
from those companies will not stop 80% of phish, because phishers 
will presumably move on to target companies that are not blacklisted.

However, those companies are less profitable for phishers - if they 
were more profitable, then those companies would be in the top 80% 
already.  There are many reasons why they might be less profitable:

 - ease of execution
 - size of customerbase
 - total funds available
 - additional benefits or penalties

Th

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Raj Mathur
On Sunday 27 Jul 2008, lsi wrote:
> Soo y'all know not to click on those emails from your bank, or from
> any other bank, in your inbox and now you just delete them ... why
> not automate this process?  It's easy, just filter a whole bunch of
> banking names straight to your deleted items.
>
> All you do is create a rule for each bank, which deletes any mail
> from that bank, automatically.
>
> The rule should read something like "if the FROM field contains the
> string X then DELETE message".

Hey, I also used to receive a lot of spam from Yahoo.  Based on your 
research, I've blocked all @yahoo.com mails in my client and now I have 
2398% less spam!  Thank you!

Regards,

-- Raju
-- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
PsyTrance & Chill: http://schizoid.in/   ||   It is the mind that moves

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Dragos Ruiu

nowhere near "a few hundred thousand"

On 30-Jul-08, at 12:29 PM, Exibar wrote:

There are quite a few credit unions and smaller "savings  
institutions" that are not FDIC insured.


 Not to mention all the FDIC insured "savings institutions" that are  
worth less than $100 million


  Exibar
- Original Message -
From: Dragos Ruiu
To: Exibar
Cc: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk
Sent: Wednesday, July 30, 2008 2:36 PM
Subject: Re: [Full-disclosure] simple phishing fix


On 30-Jul-08, at 9:19 AM, Exibar wrote:


No time to comment on most, but just to throw this in there:
   Here in the states we have a few hundred thousand different  
banks at
least.  500 is WAY too small of a number.  Credit Unions are banks,  
small
banks, and almost every city has at least one credit union.  The  
city I grew
up in has 12 or so different credit unions, along with all the  
major bank

branches


FDIC says:

 4,893 banks or savings institutions have more than $100 million in  
assets; 3,517 have $100 to $500 million; 859 have $500 million to $5  
billion; 150 have $5 to $50 billion; and 22 have more than $50  
billion.


Circa 2003.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Exibar
There are quite a few credit unions and smaller "savings institutions" that are 
not FDIC insured.

 Not to mention all the FDIC insured "savings institutions" that are worth less 
than $100 million

  Exibar
  - Original Message - 
  From: Dragos Ruiu 
  To: Exibar 
  Cc: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk 
  Sent: Wednesday, July 30, 2008 2:36 PM
  Subject: Re: [Full-disclosure] simple phishing fix




  On 30-Jul-08, at 9:19 AM, Exibar wrote:


No time to comment on most, but just to throw this in there:
   Here in the states we have a few hundred thousand different banks at 
least.  500 is WAY too small of a number.  Credit Unions are banks, small 
banks, and almost every city has at least one credit union.  The city I 
grew 
up in has 12 or so different credit unions, along with all the major bank 
branches



  FDIC says:


   4,893 banks or savings institutions have more than $100 million in assets; 
3,517 have $100 to $500 million; 859 have $500 million to $5 billion; 150 have 
$5 to $50 billion; and 22 have more than $50 billion.


  Circa 2003.___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Dragos Ruiu


On 30-Jul-08, at 9:19 AM, Exibar wrote:


No time to comment on most, but just to throw this in there:
   Here in the states we have a few hundred thousand different banks  
at
least.  500 is WAY too small of a number.  Credit Unions are banks,  
small
banks, and almost every city has at least one credit union.  The  
city I grew
up in has 12 or so different credit unions, along with all the major  
bank

branches


FDIC says:

 4,893 banks or savings institutions have more than $100 million in  
assets; 3,517 have $100 to $500 million; 859 have $500 million to $5  
billion; 150 have $5 to $50 billion; and 22 have more than $50 billion.


Circa 2003.___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Exibar
No time to comment on most, but just to throw this in there:
Here in the states we have a few hundred thousand different banks at 
least.  500 is WAY too small of a number.  Credit Unions are banks, small 
banks, and almost every city has at least one credit union.  The city I grew 
up in has 12 or so different credit unions, along with all the major bank 
branches
 You mentioned it's not a problem to list all the major banks, and many 
of the smaller banks as well.  I'll pose a challenge to you, list half of 
the banks and credit unions here in the states by the weekend and you'll win 
the prize :-)

   Cost of sending the phishing mail is ZERO... I'll repeat, it costs the 
bad guys NOTHING, ZERO, ZILTCH, NADA to send out their phishing messages. 
They mainly use 'bot nets and compromised machines to send the mail.  It 
doesn't matter if they send 1 message or 1 billion messages, still costs 
them the same, nothing.  So, even if they get to scam one person, it's all 
profit for them.  So ya, you're right on your ARPM thoughts.  When it falls 
to nothing forever, they will stop sending their messages and move onto 
another scam like a 419 scam, that's been around in one form or another 
since the late 50's

   I'll tell you one thing that will help prevent Phishing...  User 
Awareness...  but even that, won't stop it

  Exibar


- Original Message - 
From: "lsi" <[EMAIL PROTECTED]>
To: 
Sent: Wednesday, July 30, 2008 4:14 AM
Subject: Re: [Full-disclosure] simple phishing fix


> Thank you all for your comments.  However, I cannot disagree more
> fully.
>
> It doesn't matter that the blacklist is not complete, if a scammer
> tries to phish a bank that's not on the list, eg. is not popular, he
> won't make much money, because it's a small bank and the probability
> of him hitting an email address which works, and is an address of a
> customer of that tiny bank, and the customer gets suckered, and all
> other security mechanisms fail, is very small.
>
> The scammer knows this and so he targets the popular banks.
>
> Therefore, the blacklist only needs to contain popular banks.
> However there is almost no penalty to add another 500 to the list,
> it's a simple filter, it's fast.
>
> I do agree that the more banks on the list, the better, but there are
> not millions of banks in the world, it's not a problem to list all
> the major banks, and many of the smaller banks as well.
>
> As the blacklist is deployed, the average revenue per mail (ARPM)
> will fall.  The more it is deployed, the more the ARPM will fall.
> The ARPM does not need to hit zero.  As soon as the ARPM falls below
> the average cost to send each mail, phishing will be economically
> unviable.
>
> Eg. it might still be technically feasible, however it will no longer
> be profitable to be a phisher.
>
> Repeat, phish do not need to be completely eliminated.  Once they are
> reduced below a certain level, it will become economically infeasible
> to be a phisher.  The invisible hand [1] will do the rest of the work
> for us.
>
> Other bits:
>
> I agree that by opening a hole in your phish firewall (eg. permitting
> traffic from the Bank of Foo) you are making yourself slightly less
> protected, however if a user has a blacklist where he has to
> specifically ALLOW traffic from a certain bank that user will be well
> aware that he has opened a hole in his phish wall and will be
> extremely attentive when he actually gets a mail.  (I'm appalled that
> some banks actually use email, how cheap are they?  If my bank did
> that, I'd complain, and consider changing banks.)  As with a real
> firewall, it's not a total solution, but one layer of several.
>
> The blacklist catches variations, of course the common variations are
> listed as well, again, every combination is not required, because the
> probabilities of failure rapidly stack up once the scammers start to
> get too imaginative with their variations (eg. they will have to use
> more and more obscure variations, which will trick less and less
> users).  I hear unicode will make life interesting, I'm looking
> forward to some samples.
>
> Blacklists do work.  They are successfully used in many applications,
> the Spamhaus blocklist, the denyhosts SSH tool and desktop AV
> software all spring to mind.  Blacklists don't work *when the content
> they are checking is polymorphic*.  Phish, by definition are NOT
> polymorphic.  We are talking banks here, they do not change their
> names very often.
>
> I think that is an important point.  The problem space is a lot
> smaller once you start working with a finite list of domainnames.  A
> blackl

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Peter Besenbruch
On Tuesday 29 July 2008 23:27:45 Nick FitzGerald wrote:
> You really have no f*&ing clue how "ordinary users'" tiny little brains
> work, have you???

I got an inkling when a phishing spam asked me for the usual information, and 
also requested my "future password."

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread blah
On Wed, Jul 30, 2008 at 1:14 AM, lsi <[EMAIL PROTECTED]> wrote:
> Thank you all for your comments.  However, I cannot disagree more
> fully.

The simple fact that you said, put all banks on the list except the
one you actually use, really demonstrates how poorly some of this has
been thought out.

Because then, phish emails get through, and the end user is at greater
risk.  Perhaps even more so with the false sense of security you gave
them by setting up "filters".

Your smart move would be to acknowledge some of the glaring holes in
the statements you have made.  However, to continue to defend some of
the really bad ideas you've proposed bolsters the recently stated
opinion that you're simply trolling.

I think it's always great to toss an idea out there to see its
reception.  That doesn't mean you have to defend it to the death, but
only to the point that it's been proven to be unviable.

That point has been made, as you have not addressed some of the
glaring weaknesses in your statements.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Robert Holgstad
I think you are the new greatest troll of FD

On Wed, Jul 30, 2008 at 3:14 AM, lsi <[EMAIL PROTECTED]> wrote:

> Thank you all for your comments.  However, I cannot disagree more
> fully.
>
> It doesn't matter that the blacklist is not complete, if a scammer
> tries to phish a bank that's not on the list, eg. is not popular, he
> won't make much money, because it's a small bank and the probability
> of him hitting an email address which works, and is an address of a
> customer of that tiny bank, and the customer gets suckered, and all
> other security mechanisms fail, is very small.
>
> The scammer knows this and so he targets the popular banks.
>
> Therefore, the blacklist only needs to contain popular banks.
> However there is almost no penalty to add another 500 to the list,
> it's a simple filter, it's fast.
>
> I do agree that the more banks on the list, the better, but there are
> not millions of banks in the world, it's not a problem to list all
> the major banks, and many of the smaller banks as well.
>
> As the blacklist is deployed, the average revenue per mail (ARPM)
> will fall.  The more it is deployed, the more the ARPM will fall.
> The ARPM does not need to hit zero.  As soon as the ARPM falls below
> the average cost to send each mail, phishing will be economically
> unviable.
>
> Eg. it might still be technically feasible, however it will no longer
> be profitable to be a phisher.
>
> Repeat, phish do not need to be completely eliminated.  Once they are
> reduced below a certain level, it will become economically infeasible
> to be a phisher.  The invisible hand [1] will do the rest of the work
> for us.
>
> Other bits:
>
> I agree that by opening a hole in your phish firewall (eg. permitting
> traffic from the Bank of Foo) you are making yourself slightly less
> protected, however if a user has a blacklist where he has to
> specifically ALLOW traffic from a certain bank that user will be well
> aware that he has opened a hole in his phish wall and will be
> extremely attentive when he actually gets a mail.  (I'm appalled that
> some banks actually use email, how cheap are they?  If my bank did
> that, I'd complain, and consider changing banks.)  As with a real
> firewall, it's not a total solution, but one layer of several.
>
> The blacklist catches variations, of course the common variations are
> listed as well, again, every combination is not required, because the
> probabilities of failure rapidly stack up once the scammers start to
> get too imaginative with their variations (eg. they will have to use
> more and more obscure variations, which will trick less and less
> users).  I hear unicode will make life interesting, I'm looking
> forward to some samples.
>
> Blacklists do work.  They are successfully used in many applications,
> the Spamhaus blocklist, the denyhosts SSH tool and desktop AV
> software all spring to mind.  Blacklists don't work *when the content
> they are checking is polymorphic*.  Phish, by definition are NOT
> polymorphic.  We are talking banks here, they do not change their
> names very often.
>
> I think that is an important point.  The problem space is a lot
> smaller once you start working with a finite list of domainnames.  A
> blacklist is feasible in these circumstances.
>
> I agree my list is small, you'll note however it contains most of the
> biggest banks, I didn't choose them, they self-selected, by being
> sent to me.  That's why they are the biggest banks, because the
> scammers target those banks.  There's obviously no reason why the
> list could not contain every large bank in the world.  I could maybe
> hunt down some stats to add banks I don't get phished for, but that
> would just slow down my filter!  If others were to use it they'd want
> to customise it.  Because the blacklist is on the client machine, the
> user is free to add banks they get hammered with, and free to remove
> banks they want to correspond with.
>
> Don't forget that "achovia." can be listed, to catch wachovia.com,
> vvachovia.com, vvachovia.co.uk etc.
>
> Think about it, most people have no need to accept mail from every
> bank in the world.  That is accept ALL. Using the blacklist means
> they are now denying all bank traffic. (OK, denying all on the list,
> I agree that it's not a complete deny all, because we cannot know the
> names of all banks in advance.  I do regret confusing the discussion
> by mentioning DENY ALL, I was hoping to explain my analogy to a
> firewall, eg., it blocks everything by default and then lets in what
> you tell it to let in, I do accept that unlike a real firewall it can
> be got around by using an unlisted name, it's really DENY MOST.)
>
> > "(x) Mailing lists and other legitimate email uses would be affected
>
> Irrelevant.  They are affected already. They are the victims of
> spoofing.  It's either block their mails, or users suffer the spoofs.
>  Given than suffering the spoofs means bank-originated mails are
> useless in any case, that

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread Nick FitzGerald
lsi wrote:

> Thank you all for your comments.  However, I cannot disagree more 
> fully.

Ignorance does that for people...

> It doesn't matter that the blacklist is not complete, if a scammer 
> tries to phish a bank that's not on the list, eg. is not popular, he 
> won't make much money, because it's a small bank and the probability 
> of him hitting an email address which works, and is an address of a 
> customer of that tiny bank, and the customer gets suckered, and all 
> other security mechanisms fail, is very small.

So, the spammer just sends _A LOT MORE_ phishing spam targetting that 
bank.

There are US credit unions with only a few tens of thousands of customers 
that have been targets of (LARGE) phishing campigns.  The phishers in at 
least some of those cases got several, to several dozen, known victims 
and helped themselves to the contents of their accounts, in the few hours 
between the beginning of the spam run and the CU becoming aware of it and 
disabling their online banking interface.  Those few successful targets 
were more than reward enough...

And I once got a phishing scam Email for a small US bank that only had 
_two_ physical branches according to the real bank's website (and no, 
they weren't a large "mostly online" bank but an old-style, small-town, 
bricks-and-mortar operation).

Oh -- and those were _BEFORE_ some of the much more highly targetted, and 
thus _MUCH_ smaller phishing spam runs we have seen more recently.

As you do not understand how these folk work, what a triflingly small 
successful victim rate they have to hit for their effort to be 
worthwhile, and so on, you are going to keep making the dumb-ass n00b 
mistakes in your reasoning that we've been seeing from you for the last 
few days.

Phishing still exists _BECAUSE_ it is a hard problem to solve.

Not because those who know how it works are lazy.

Not because those who know how it works are stupid.

Not because some, or even many, of those who know how it works are 
employed by companies that a conspiracy theorist will ignorantly argue 
have a vested interest in NOT solving the problem.

No -- phishing still exists _BECAUSE it is a hard problem to solve_.

If widely implemented, your trivial suggestions might, _just might_, ever 
so slightly reduce the total world-wide cost of bank losses due to 
phishing.

But they would do so at a significantly greater cost in the effort 
required to implement your suggestions across the planet than they would 
save.  Yes, the banks will spend a lot of money failing to entirely stamp 
out phishing, BUT they generally try to spend that money in ways that at 
least have some pay-off in terms of reassuring their customers that they 
are doing something to help...

So, can you guess why your suggestions have not already been implemented?

> The scammer knows this and so he targets the popular banks.

Nope -- the scammers target pretty much any and every bank they can be 
bothered targeting.  Yes -- the pre-packaged scams centre on the bigger 
targets, but those are probably not the bigger scammers in terms of 
actual impact -- I mean, a skiddie too stupid to know or be able to work 
out that the "free" phishing kits (that he has just downloaded off a more 
or less open web site) are backdoored and also sending his phished data 
to someone else is not goingto be a major figure in the underworld scam 
scene...

And as further evidence of the breadth of opportunity scammers are 
prepared to deploy/employ, just this afternoon I uncovered a single 
phishing site hosting eleven different UK-only banks involving close to 
1.5MB of phishing site code, images, scripts, etc, etc to fake the eleven 
target banks' sites.

> Therefore, the blacklist only needs to contain popular banks.  
> However there is almost no penalty to add another 500 to the list, 
> it's a simple filter, it's fast.
> 
> I do agree that the more banks on the list, the better, but there are 
> not millions of banks in the world, it's not a problem to list all 
> the major banks, and many of the smaller banks as well.

Off you go then -- list 10% of the bank domains by this time tomorrow...

> As the blacklist is deployed, the average revenue per mail (ARPM) 
> will fall.  The more it is deployed, the more the ARPM will fall.  
> The ARPM does not need to hit zero.  As soon as the ARPM falls below 
> the average cost to send each mail, phishing will be economically 
> unviable.  

As virtually all (phishing) spam is sent by "criminal gangs" using their 
own bot-nets effectively for free, your simple view of the economics of 
this fails rather badly.

History has a lesson for us here -- as the amount of spam-filtering in 
use increased, so did the amount of spam being sent.  If your economics 
argument had any validity that should not be the case, but what happened 
is that the spammers and associated scammers coalesced _AND_ changed hwo 
they sent the vast bulk of their spam.  Now, sending spam is essentially 
fr

Re: [Full-disclosure] simple phishing fix

2008-07-30 Thread lsi
Thank you all for your comments.  However, I cannot disagree more 
fully.

It doesn't matter that the blacklist is not complete, if a scammer 
tries to phish a bank that's not on the list, eg. is not popular, he 
won't make much money, because it's a small bank and the probability 
of him hitting an email address which works, and is an address of a 
customer of that tiny bank, and the customer gets suckered, and all 
other security mechanisms fail, is very small.

The scammer knows this and so he targets the popular banks.

Therefore, the blacklist only needs to contain popular banks.  
However there is almost no penalty to add another 500 to the list, 
it's a simple filter, it's fast.

I do agree that the more banks on the list, the better, but there are 
not millions of banks in the world, it's not a problem to list all 
the major banks, and many of the smaller banks as well.

As the blacklist is deployed, the average revenue per mail (ARPM) 
will fall.  The more it is deployed, the more the ARPM will fall.  
The ARPM does not need to hit zero.  As soon as the ARPM falls below 
the average cost to send each mail, phishing will be economically 
unviable.  

Eg. it might still be technically feasible, however it will no longer 
be profitable to be a phisher.

Repeat, phish do not need to be completely eliminated.  Once they are 
reduced below a certain level, it will become economically infeasible 
to be a phisher.  The invisible hand [1] will do the rest of the work 
for us.

Other bits:

I agree that by opening a hole in your phish firewall (eg. permitting 
traffic from the Bank of Foo) you are making yourself slightly less 
protected, however if a user has a blacklist where he has to 
specifically ALLOW traffic from a certain bank that user will be well 
aware that he has opened a hole in his phish wall and will be 
extremely attentive when he actually gets a mail.  (I'm appalled that 
some banks actually use email, how cheap are they?  If my bank did 
that, I'd complain, and consider changing banks.)  As with a real 
firewall, it's not a total solution, but one layer of several.

The blacklist catches variations, of course the common variations are 
listed as well, again, every combination is not required, because the 
probabilities of failure rapidly stack up once the scammers start to 
get too imaginative with their variations (eg. they will have to use 
more and more obscure variations, which will trick less and less 
users).  I hear unicode will make life interesting, I'm looking 
forward to some samples.

Blacklists do work.  They are successfully used in many applications, 
the Spamhaus blocklist, the denyhosts SSH tool and desktop AV 
software all spring to mind.  Blacklists don't work *when the content 
they are checking is polymorphic*.  Phish, by definition are NOT 
polymorphic.  We are talking banks here, they do not change their 
names very often.

I think that is an important point.  The problem space is a lot 
smaller once you start working with a finite list of domainnames.  A 
blacklist is feasible in these circumstances.

I agree my list is small, you'll note however it contains most of the 
biggest banks, I didn't choose them, they self-selected, by being 
sent to me.  That's why they are the biggest banks, because the 
scammers target those banks.  There's obviously no reason why the 
list could not contain every large bank in the world.  I could maybe 
hunt down some stats to add banks I don't get phished for, but that 
would just slow down my filter!  If others were to use it they'd want 
to customise it.  Because the blacklist is on the client machine, the 
user is free to add banks they get hammered with, and free to remove 
banks they want to correspond with.

Don't forget that "achovia." can be listed, to catch wachovia.com, 
vvachovia.com, vvachovia.co.uk etc.

Think about it, most people have no need to accept mail from every 
bank in the world.  That is accept ALL. Using the blacklist means 
they are now denying all bank traffic. (OK, denying all on the list, 
I agree that it's not a complete deny all, because we cannot know the 
names of all banks in advance.  I do regret confusing the discussion 
by mentioning DENY ALL, I was hoping to explain my analogy to a 
firewall, eg., it blocks everything by default and then lets in what 
you tell it to let in, I do accept that unlike a real firewall it can 
be got around by using an unlisted name, it's really DENY MOST.)

> "(x) Mailing lists and other legitimate email uses would be affected

Irrelevant.  They are affected already. They are the victims of 
spoofing.  It's either block their mails, or users suffer the spoofs. 
 Given than suffering the spoofs means bank-originated mails are 
useless in any case, that means the only available course of action 
is to deny all bank email traffic.

> my Bayesian filter gets these anyway

My spam filter misses some, hence my post, however following this 
comment I have checked my config 

Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Peter Besenbruch
> As for email, judge by its content. This posting for example will do
> nothing to your money, sells you nothing. Nor does it ask any information
> of you. If it were spoofed it would be harmless.

I might also add that Bogofilter didn't flag it as spam, either (X-Bogosity: 
Ham, tests=bogofilter, spamicity=0.00). ;) I stand by my assertion, 
however, that banks should not communicate with their customers via e-mail.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Randal T. Rioux
On Tue, July 29, 2008 2:31 pm, [EMAIL PROTECTED] wrote:
> You might eliminate phishing but there are occasionally messages from
> people at these institutions also. This sort of thing is in essence
> allowing phishers a denial of service attack against anyone they choose
> to make themselves a nuisance with.
>
> I am not well pleased with any bank authentication I have seen so far
> personally; seems to me finance-related messages should be authenticated
> both ways and preferably a confirming authentication to demonstrate the
> subject agrees with the transaction should be done before such are
> accepted. That kind of thing would be hard to spoof and if done right
> pretty useless to someone who could record entire transactions.
>
> As for email, judge by its content. This posting for example will do
> nothing to your money, sells you nothing. Nor does it ask any information
> of you. If it were spoofed it would be harmless.
>
> Glenn Everhart
>

But it is from Chase and nothing good comes from Chase ;-)


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Glenn.Everhart
You might eliminate phishing but there are occasionally messages from people at
these institutions also. This sort of thing is in essence allowing phishers a
denial of service attack against anyone they choose to make themselves a 
nuisance
with.

I am not well pleased with any bank authentication I have seen so far 
personally;
seems to me finance-related messages should be authenticated both ways and 
preferably
a confirming authentication to demonstrate the subject agrees with the 
transaction
should be done before such are accepted. That kind of thing would be hard to 
spoof
and if done right pretty useless to someone who could record entire 
transactions.

As for email, judge by its content. This posting for example will do nothing
to your money, sells you nothing. Nor does it ask any information of you. If it
were spoofed it would be harmless.

Glenn Everhart


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Peter
Besenbruch
Sent: Tuesday, July 29, 2008 2:04 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] simple phishing fix


On Monday 28 July 2008 20:55:10 Stian Øvrevåge wrote:
> You mention phising, but I think quite a few points from the
> why-your-spam-solution-wont-work-list are relevant:
>
> "(x) Mailing lists and other legitimate email uses would be affected

If we stick with the narrowly focused problem of bank phishing spam, I doubt 
mailing lists would be affected. Yes, stuart, the original poster, spoke 
of "deny all" tactics, but he certainly wasn't implementing anything like 
that in practice. At least, I couldn't see it.

> (x) It will stop spam for two weeks and then we'll be stuck with it

Yes, you would need to add a new filter from time to time. This would work on 
your own e-mail account, but I would see problems generalizing to more 
people.

> (x) Users of email will not put up with it

On the other hand, it sounded like the original poster wanted to share lists, 
so that anyone who wanted to could tweak theirs. People sharing such lists 
would "put up with it."

> (x) Ideas similar to yours are easy to come up with, yet none have ever
> been shown practical

I get my share of phishing spam, and most involve about a dozen domains, or 
less.  These domains have remained relatively stable over the last two years. 
Paypal still dominates. So yes, a list of the common banking sites might 
reduce the annoyance factor.

> (x) Whitelists suck"

They do indeed.

> http://craphound.com/spamsolutions.txt
>
> 1. Your filter will never be complete, there are too many
> banks/institutions (with ever-changing domains etc).

See above.

> 2. Banks/institutions actually sends legitimate mail.

Yes, but I would not do business with a bank that did. Phishing spam has 
eliminated e-mail as a viable means of communication between banks and their 
customers. My bank doesn't know my e-mail address, and I don't bank on-line 
(but that's a whole other kettle of fish).

> 3. Phishers will find ways to get around the filters, either by
> registering similar domain-names or by numerous browser/MTA tricks.
> 4. Users likely to fall for a phish is not very likely to even know
> what a filter is.

What we are talking about here is the sharing of filter material on a small 
list of people who can spot a phish from a mile off. Full Disclosure isn't 
big enough to change the habits of spammers.

That said, I haven't made use of any filters specifically to weed out phishing 
spam. I use Kmail and Bogofilter, and they have caught almost every phishing 
spam I have received in the last year. Such spam was one of the firsts things 
that the Bayesian based Bogofilter learned to flag reliably. Bogofilter flags 
a far greater variety of spam reliably than flagging domains in the "from" 
field could ever hope to accomplish.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

-
This transmission may contain information that is privileged,
confidential, legally privileged, and/or exempt from disclosure
under applicable law.  If you are not the intended recipient, you
are hereby notified that any disclosure, copying, distribution, or
use of the information contained herein (including any reliance
thereon) is STRICTLY PROHIBITED.  Although this transmission and
any attachments are believed to be free of any virus or other
defect that might affect any computer system into which it is
received and opened, it is the responsibility of the recipient to
ensure that it is virus free and no responsibility is accepted by
JPMorgan Chas

Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Peter Besenbruch
On Monday 28 July 2008 20:55:10 Stian Øvrevåge wrote:
> You mention phising, but I think quite a few points from the
> why-your-spam-solution-wont-work-list are relevant:
>
> "(x) Mailing lists and other legitimate email uses would be affected

If we stick with the narrowly focused problem of bank phishing spam, I doubt 
mailing lists would be affected. Yes, stuart, the original poster, spoke 
of "deny all" tactics, but he certainly wasn't implementing anything like 
that in practice. At least, I couldn't see it.

> (x) It will stop spam for two weeks and then we'll be stuck with it

Yes, you would need to add a new filter from time to time. This would work on 
your own e-mail account, but I would see problems generalizing to more 
people.

> (x) Users of email will not put up with it

On the other hand, it sounded like the original poster wanted to share lists, 
so that anyone who wanted to could tweak theirs. People sharing such lists 
would "put up with it."

> (x) Ideas similar to yours are easy to come up with, yet none have ever
> been shown practical

I get my share of phishing spam, and most involve about a dozen domains, or 
less.  These domains have remained relatively stable over the last two years. 
Paypal still dominates. So yes, a list of the common banking sites might 
reduce the annoyance factor.

> (x) Whitelists suck"

They do indeed.

> http://craphound.com/spamsolutions.txt
>
> 1. Your filter will never be complete, there are too many
> banks/institutions (with ever-changing domains etc).

See above.

> 2. Banks/institutions actually sends legitimate mail.

Yes, but I would not do business with a bank that did. Phishing spam has 
eliminated e-mail as a viable means of communication between banks and their 
customers. My bank doesn't know my e-mail address, and I don't bank on-line 
(but that's a whole other kettle of fish).

> 3. Phishers will find ways to get around the filters, either by
> registering similar domain-names or by numerous browser/MTA tricks.
> 4. Users likely to fall for a phish is not very likely to even know
> what a filter is.

What we are talking about here is the sharing of filter material on a small 
list of people who can spot a phish from a mile off. Full Disclosure isn't 
big enough to change the habits of spammers.

That said, I haven't made use of any filters specifically to weed out phishing 
spam. I use Kmail and Bogofilter, and they have caught almost every phishing 
spam I have received in the last year. Such spam was one of the firsts things 
that the Bayesian based Bogofilter learned to flag reliably. Bogofilter flags 
a far greater variety of spam reliably than flagging domains in the "from" 
field could ever hope to accomplish.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Nick FitzGerald
lsi wrote:

> Of all the approaches below I like the simple list of strings in the 
> email client (the first link).  This is because it's a DENY ALL 
> policy.  ...

"simple" -- yes.

"DENY ALL" -- nope...

>From your first post, it's clear that you receive samples from a _VERY_ 
limited sliver of the bank, credit union and other financial target 
phishing that goes on each and every day...

>From a purely theoretical perspective, to make your preferred approach 
"DENY ALL" you would have to have ongoing access to an oracle identifying 
the domains of ALL financial institutions, so your block list could be 
updated in a timely manner as domains are added and removed...

As no such oracle exists, a "deny all" approach along the lines you 
suggest is _practically_ impossible.

> ...  The other approaches below, AFAICS, use ACCEPT ALL and then 
> try and find reasons to block the mail.  ...

Which is actually what your suggested approach does, even if it could be 
practically implemented -- it accepts all Email (or at least all incoming 
Email delivery connections) then tries to find a reason to block it (From 
address domain on block list).

> ...  The first approach simply 
> blocks them all!   ...

...for some interesting and unknowably odd value of "all".

> ...  Sure, you want to receive mail from the Bank of 
> Foo, just don't put bankoffoo.com in your list!   

Thereby letting through the phish for the target(s) of most danger to you 
-- get suckered by a Foo Bank phish as a Foo Bank customer and you may be 
in trouble, but getting suckered by a Bar Bank phish when you are only a 
Foo Bank customer and no harm is done.

Also, your preferred approach entirely fails to deal with "close but not 
quite" domain "spoofing" -- [EMAIL PROTECTED] rather than 
[EMAIL PROTECTED], [EMAIL PROTECTED] rather than [EMAIL PROTECTED] 
(the real Foo Bank domain), etc, etc, etc.

In short, as is commonly the case in such matters, the quick'n'dirty, I-
just-thought-of-the-ultimate-solution-to-the-phishing-problem-AND-it's-
REALLY-SIMPLE solution is so far from complete that it's all but 
useless...


Regards,

Nick FitzGerald


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Stian Øvrevåge
On Mon, Jul 28, 2008 at 9:52 AM, lsi <[EMAIL PROTECTED]> wrote:
> Please post the list of strings you use in your phishing filter.
>
> Or don't you have one?
>
> Seriously dude, if phishing was so simple to fix then why is it "on
> the rise" according to recent news articles?
>
> I mean, if all the admins out there in the world are blocking them,
> when why are they still being sent out by scammers?
>
> Either the admins don't know how to block them, or the scammers don't
> know they are being blocked.
>
> My message can solve both problems.
>
> I seem to recall a time when email-borne viruses were a problem, once
> it was pointed out they were simple to block, they rapidly dropped
> out of fashion.
>
> I would indeed like to repeat that success and save the associated
> electricity, bandwidth and CPU time for something more important,
> such as replying to bone-headed posts in fd, for a start.
>
> Stu
>
> On 28 Jul 2008 at 10:57, Biz Marqee wrote:
>
> Date sent:  Mon, 28 Jul 2008 10:57:06 +1000
> From:   "Biz Marqee" <[EMAIL PROTECTED]>
> To: full-disclosure@lists.grok.org.uk
> Subject:RE: [Full-disclosure] simple phishing fix
> Copies to:  [EMAIL PROTECTED]
>
>> Wow, you our are savior.. no, no our e-Hero! Forget patches for software
>> bugs.. This guy can teach us how to set up a mail filter!!
>>
>> Seriously dude.. do you think we care about, or are too inept to set up mail
>> filter rules? Go find another list to contribute to, you are a joke.
>>
>

You mention phising, but I think quite a few points from the
why-your-spam-solution-wont-work-list are relevant:

"(x) Mailing lists and other legitimate email uses would be affected
(x) It will stop spam for two weeks and then we'll be stuck with it
(x) Users of email will not put up with it

Specifically, your plan fails to account for

(x) Eternal arms race involved in all filtering approaches

and the following philosophical objections may also apply:

(x) Ideas similar to yours are easy to come up with, yet none have ever
been shown practical
(x) Blacklists suck
(x) Whitelists suck"

http://craphound.com/spamsolutions.txt

1. Your filter will never be complete, there are too many
banks/institutions (with ever-changing domains etc).
2. Banks/institutions actually sends legitimate mail.
3. Phishers will find ways to get around the filters, either by
registering similar domain-names or by numerous browser/MTA tricks.
4. Users likely to fall for a phish is not very likely to even know
what a filter is.

-- 
Stian Øvrevåge

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-28 Thread lsi
[This is a repost, the original was blocked by Spamhaus as it 
contained a link to blacklisted blogspot server.  Also, I mangled the 
formatting.  Apologies.  Finally I added item #9, not mentioned 
previously.]


summary
---

Of all the approaches below I like the simple list of strings in the 
email client (the first link).  This is because it's a DENY ALL 
policy.  The other approaches below, AFAICS, use ACCEPT ALL and then 
try and find reasons to block the mail.  The first approach simply 
blocks them all!  Sure, you want to receive mail from the Bank of 
Foo, just don't put bankoffoo.com in your list!   

Frankly, email should not be used by banks, due to the risk of 
impersonation, and if this DENY ALL approach causes them to stop 
using email to send messages to customers, good.   

So let's not waste time on fancy error-prone algorithms, purleeze!  


a quick review of deployed anti-phishing technologies
-

0. filter against the FROM field using a blacklist in the email 
client:

http://seclists.org/fulldisclosure/2008/Jul/0488.html

1. software from Symantec, McAfee etc, integrated into their desktop 
security suites, filtering method not disclosed.  

2. there's anti-phishing filters for IE, Firefox and maybe Opera - 
filtering method not researched (we want to stop the phish before the 
user even opens the email, they should never see the link that takes 
them to their browser),  

3. article says CMU have developed an unreleased filter, using pretty 
standard anti-spam techniques, plus some attempt at matching the 
stated domainname against URLs listed in the bodytext:  

http://itmanagement.earthweb.com/columns/executive_tech/article.php/36
20741

The phishing filter in Thunderbird apparently uses a similar 
technique (eg. comparing the sender's domainname against URLs in the 
bodytext, a technique which reportedly is a bit flaky.  

4. article says GoDaddy filter scans URLs in bodytext against a 
blacklist:

http://help.godaddy.com/article/645

5. software says it uses some kind of user-generated database (eg. 
users report stats to a central server via client software):  

http://spam-fighter.qarchive.org/

6. post says google are using DKIM to detect phish:

[link removed due to spamhaus issue, search for this on the web]

(gmail's phish detection reportedly suffers from false-positives)

7. article says to use a Bayesian filter (unspecified):

http://ezinearticles.com/?Phishing-Filter---How-to-Use-Phishing-
Filters-to-Prevent-Any-Information-Theft&id=919156

8. product claims to use "rate controls" (eg. mails/minute) to detect 
phish:

http://www.moonslice.com/hosting/spamds.htm

9. sigs for clamAV, seem to be an MD5 of the bodytext

http://www.sanesecurity.com/clamav/


On 27 Jul 2008 at 14:10, lsi wrote:

From:   "lsi" <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Date sent:  Sun, 27 Jul 2008 14:10:38 +0100
Priority:   normal           
Subject:[Full-disclosure] simple phishing fix

> Soo y'all know not to click on those emails from your bank, or from 
> any other bank, in your inbox and now you just delete them ... why 
> not automate this process?  It's easy, just filter a whole bunch of 
> banking names straight to your deleted items.  
> 
> All you do is create a rule for each bank, which deletes any mail  
> from that bank, automatically.
> 
> The rule should read something like "if the FROM field contains the  
> string X then DELETE message".
> 
> Here's a list of strings to enter into your rules...
> 
> Royal Bank of Scotland
> HSBC
> NatWest
> halifax.co.uk
> abbeynational.co.uk
> @abbey.co.uk
> @abbey.com
> barclays.co.uk
> barclays.com
> CitiBusiness
> @citi.com
> equifax.com
> commercebank.com
> bankofamerica.com
> wachovia.com
> capitalone.com
> @nationalcity.com
> .chase.com
> @chase.com
> 
> The funny part is that because phish are trying to look as legitimate 
> as possible, you can bet that they will use the correct domainname 
> for the bank.  Which means they are extremely easy to filter... end 
> of problem  
> 
> Stu
> 
> ---
> Stuart Udall
> stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/
> 
> --- 
>  * Origin: lsi: revolution through evolution (192:168/0.2)
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/



---
Stuart Udall
stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-28 Thread lsi
summary
---

Of all the approaches below I like the simple list of strings in the 
email
client (the first link).  This is because it's a DENY ALL policy.  
The
other approaches below, AFAICS, use ACCEPT ALL and then try and find
reasons to block the mail.  The first approach simply blocks them 
all!  Sure, you
want to receive mail from the Bank of Foo, just don't put 
bankoffoo.com in
your list!   

Frankly, email should not be used by banks, due to the risk of 
impersonation, and if this DENY ALL approach causes them to stop 
using email to send messages to customers, good.   

So let's not waste time on fancy error-prone algorithms, purleeze!  


a quick review of deployed anti-phishing technologies
-

0. filter against the FROM field using a blacklist in the email 
client:

http://seclists.org/fulldisclosure/2008/Jul/0488.html

1. software from Symantec, McAfee etc, integrated into their desktop
security suites, filtering method not disclosed.  

2. there's anti-phishing filters for IE, Firefox and maybe Opera - 
filtering method not researched (we want to stop the phish before the 
user
even opens the email, they should never see the link that takes them 
to
their browser),  

3. article says CMU have developed an unreleased filter, using pretty
standard anti-spam techniques, plus some attempt at matching the 
stated
domainname against URLs listed in the bodytext:  

http://itmanagement.earthweb.com/columns/executive_tech/article.php/36
2074
1

The phishing filter in Thunderbird apparently uses a similar 
technique (eg. comparing the sender's domainname against URLs in the
bodytext, a technique which reportedly is a bit flaky.  

4. article says GoDaddy filter scans URLs in bodytext against a 
blacklist:

http://help.godaddy.com/article/645

5. software says it uses some kind of user-generated database (eg. 
users report stats to a central server via client software):  

http://spam-fighter.qarchive.org/

6. post says google are using DKIM to detect phish:

http://gmailblog.blogspot.com/2008/07/fighting-phishing-with-ebay-and-
payp
al.html

(gmail's phish detection reportedly suffers from false-positives)

7. article says to use a Bayesian filter (unspecified):

http://ezinearticles.com/?Phishing-Filter---How-to-Use-Phishing-
Filters-to
-Prevent-Any-Information-Theft&id=919156

8. product claims to use "rate controls" (eg. mails/minute) to detect
phish:

http://www.moonslice.com/hosting/spamds.htm


On 28 Jul 2008 at 18:32, Biz Marqee wrote:

Date sent:  Mon, 28 Jul 2008 18:32:48 +1000
From:   "Biz Marqee" <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Subject:Re: [Full-disclosure] simple phishing fix
Copies to:  [EMAIL PROTECTED]

> Post my mail filter strings? LOL. That just proves how insignificant you and
> your ideas are. I do real security research work like write exploits and
> patches. Do you know how to mmap @ 0x on current kernels? Do you
> even know why that would be useful?
> 
> How does this fix the problem? If it were that black and white ISP's would
> implement it at their MX's.. on top of that what about all the LEGITIMATE
> emails banks send out?
> 
> Anyone who knows how to set up mail filters would have already done so
> without your "message". Maybe you should stop posting trying to puff up your
> image on a mailing list and go back to your "research". Who knows maybe one
> day you can graduate to XSS... lmao.
> 
> Leave security work to the experts you untalented, fame seeking, peice of
> shit...
> 
> 
> On Mon, Jul 28, 2008 at 5:52 PM, lsi <[EMAIL PROTECTED]> wrote:
> 
> > Please post the list of strings you use in your phishing filter.
> >
> > Or don't you have one?
> >
> > Seriously dude, if phishing was so simple to fix then why is it "on
> > the rise" according to recent news articles?
> >
> > I mean, if all the admins out there in the world are blocking them,
> > when why are they still being sent out by scammers?
> >
> > Either the admins don't know how to block them, or the scammers don't
> > know they are being blocked.
> >
> > My message can solve both problems.
> >
> > I seem to recall a time when email-borne viruses were a problem, once
> > it was pointed out they were simple to block, they rapidly dropped
> > out of fashion.
> >
> > I would indeed like to repeat that success and save the associated
> > electricity, bandwidth and CPU time for something more important,
> > such as replying to bone-headed posts in fd, for a start.
> >
> > Stu
> >
> > On 28 Jul 2008 at 10:57, Biz Marqee wrote:
> >
> > Date sent:  Mon, 28 Jul 

Re: [Full-disclosure] simple phishing fix

2008-07-28 Thread Biz Marqee
Post my mail filter strings? LOL. That just proves how insignificant you and
your ideas are. I do real security research work like write exploits and
patches. Do you know how to mmap @ 0x on current kernels? Do you
even know why that would be useful?

How does this fix the problem? If it were that black and white ISP's would
implement it at their MX's.. on top of that what about all the LEGITIMATE
emails banks send out?

Anyone who knows how to set up mail filters would have already done so
without your "message". Maybe you should stop posting trying to puff up your
image on a mailing list and go back to your "research". Who knows maybe one
day you can graduate to XSS... lmao.

Leave security work to the experts you untalented, fame seeking, peice of
shit...


On Mon, Jul 28, 2008 at 5:52 PM, lsi <[EMAIL PROTECTED]> wrote:

> Please post the list of strings you use in your phishing filter.
>
> Or don't you have one?
>
> Seriously dude, if phishing was so simple to fix then why is it "on
> the rise" according to recent news articles?
>
> I mean, if all the admins out there in the world are blocking them,
> when why are they still being sent out by scammers?
>
> Either the admins don't know how to block them, or the scammers don't
> know they are being blocked.
>
> My message can solve both problems.
>
> I seem to recall a time when email-borne viruses were a problem, once
> it was pointed out they were simple to block, they rapidly dropped
> out of fashion.
>
> I would indeed like to repeat that success and save the associated
> electricity, bandwidth and CPU time for something more important,
> such as replying to bone-headed posts in fd, for a start.
>
> Stu
>
> On 28 Jul 2008 at 10:57, Biz Marqee wrote:
>
> Date sent:      Mon, 28 Jul 2008 10:57:06 +1000
> From:   "Biz Marqee" <[EMAIL PROTECTED]>
> To: full-disclosure@lists.grok.org.uk
> Subject:RE: [Full-disclosure] simple phishing fix
> Copies to:  [EMAIL PROTECTED]
>
> > Wow, you our are savior.. no, no our e-Hero! Forget patches for software
> > bugs.. This guy can teach us how to set up a mail filter!!
> >
> > Seriously dude.. do you think we care about, or are too inept to set up
> mail
> > filter rules? Go find another list to contribute to, you are a joke.
> >
>
>
>
> ---
> Stuart Udall
> stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/
>
> ---
>  * Origin: lsi: revolution through evolution (192:168/0.2)
>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] simple phishing fix

2008-07-28 Thread lsi
Please post the list of strings you use in your phishing filter.

Or don't you have one?

Seriously dude, if phishing was so simple to fix then why is it "on 
the rise" according to recent news articles?

I mean, if all the admins out there in the world are blocking them, 
when why are they still being sent out by scammers?

Either the admins don't know how to block them, or the scammers don't 
know they are being blocked.

My message can solve both problems.

I seem to recall a time when email-borne viruses were a problem, once 
it was pointed out they were simple to block, they rapidly dropped 
out of fashion.

I would indeed like to repeat that success and save the associated 
electricity, bandwidth and CPU time for something more important, 
such as replying to bone-headed posts in fd, for a start.

Stu

On 28 Jul 2008 at 10:57, Biz Marqee wrote:

Date sent:  Mon, 28 Jul 2008 10:57:06 +1000
From:   "Biz Marqee" <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Subject:    RE: [Full-disclosure] simple phishing fix
Copies to:  [EMAIL PROTECTED]

> Wow, you our are savior.. no, no our e-Hero! Forget patches for software
> bugs.. This guy can teach us how to set up a mail filter!!
> 
> Seriously dude.. do you think we care about, or are too inept to set up mail
> filter rules? Go find another list to contribute to, you are a joke.
> 



---
Stuart Udall
stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] simple phishing fix

2008-07-27 Thread Biz Marqee
Wow, you our are savior.. no, no our e-Hero! Forget patches for software
bugs.. This guy can teach us how to set up a mail filter!!

Seriously dude.. do you think we care about, or are too inept to set up mail
filter rules? Go find another list to contribute to, you are a joke.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] simple phishing fix

2008-07-27 Thread trejrco
And yet some banks do, in fact, send real emails to their clients ...


Sent from my Verizon Wireless BlackBerry

-Original Message-
From: "lsi" <[EMAIL PROTECTED]>

Date: Sun, 27 Jul 2008 14:10:38 
To: 
Subject: [Full-disclosure] simple phishing fix


Soo y'all know not to click on those emails from your bank, or from 
any other bank, in your inbox and now you just delete them ... why 
not automate this process?  It's easy, just filter a whole bunch of 
banking names straight to your deleted items.  

All you do is create a rule for each bank, which deletes any mail  
from that bank, automatically.

The rule should read something like "if the FROM field contains the  
string X then DELETE message".

Here's a list of strings to enter into your rules...

Royal Bank of Scotland
HSBC
NatWest
halifax.co.uk
abbeynational.co.uk
@abbey.co.uk
@abbey.com
barclays.co.uk
barclays.com
CitiBusiness
@citi.com
equifax.com
commercebank.com
bankofamerica.com
wachovia.com
capitalone.com
@nationalcity.com
.chase.com
@chase.com

The funny part is that because phish are trying to look as legitimate 
as possible, you can bet that they will use the correct domainname 
for the bank.  Which means they are extremely easy to filter... end 
of problem  

Stu

---
Stuart Udall
stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] simple phishing fix

2008-07-27 Thread lsi
Soo y'all know not to click on those emails from your bank, or from 
any other bank, in your inbox and now you just delete them ... why 
not automate this process?  It's easy, just filter a whole bunch of 
banking names straight to your deleted items.  

All you do is create a rule for each bank, which deletes any mail  
from that bank, automatically.

The rule should read something like "if the FROM field contains the  
string X then DELETE message".

Here's a list of strings to enter into your rules...

Royal Bank of Scotland
HSBC
NatWest
halifax.co.uk
abbeynational.co.uk
@abbey.co.uk
@abbey.com
barclays.co.uk
barclays.com
CitiBusiness
@citi.com
equifax.com
commercebank.com
bankofamerica.com
wachovia.com
capitalone.com
@nationalcity.com
.chase.com
@chase.com

The funny part is that because phish are trying to look as legitimate 
as possible, you can bet that they will use the correct domainname 
for the bank.  Which means they are extremely easy to filter... end 
of problem  

Stu

---
Stuart Udall
stuart [EMAIL PROTECTED] net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/