I'd like to reinforce Waqas and Peter's comments here.
I've been in IT security R&D for 20 years and can say that the crims
use whatever protocol will get the job done, I've also been using the
Jabber protocol since 1999 and have seen IM used by the bad guys well
before it became main stream.
But i'd have to disagree with Winifried about phishing being "one of
the darkest activities on the internet", in fact it's rather grey.
David.
http://www.linkedin.com/in/dbanes
On 27/09/2009, at 6:59 AM, Peter Saint-Andre wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 9/26/09 7:40 AM, Winfried Tilanus wrote:
Hi,
Up to now jabber was used for legitimate applications like
microblogging, psychological counselling or battlefield information
systems. But is was inevitable we would witness the day jabber
would be
used for one of the darkest activities on the internet, phishing:
http://software.silicon.com/security/0,39024655,39527467,00.htm
The original blog posts referenced in that article is here:
http://www.rsa.com/blog/blog_entry.aspx?id=1525
http://www.rsa.com/blog/blog_entry.aspx?id=1515
Let us look at the attack.
The phishing incident happens via a fraudulent website that looks like
your bank.
Hold it. Now that the unsuspecting user has visited a fraudulent
website, anything is possible! The criminals could use XMPP, SMTP,
HTTP,
IRC, or whatever they want at that point.
The "problem" here is that XMPP is a distributed technology. Anyone
can
download and run their own XMPP server. What they do with that
server is
up to them. We -- and by "we" I mean the XMPP Standards Foundation,
the
IETF's XMPP WG, the developers of a particular XMPP server
implementation, and the general XMPP community -- have no control over
how XMPP technologies are deployed. In this case, some people have
gotten creative about using XMPP instead of SMTP or IRC or some other
technology in order to gather and deliver, in close to real time
information, that is of interest to them. It just happens that the
information these people are interested in relates to criminal
activities in which they are engaged.
Now, if these people had decided to use one of the public XMPP
services
(such as, say, the jabber.org IM service, of which I am the primary
admin), then those who are interested in combatting this kind of crime
might be able to contact the admins of said services and find out some
identifiying data about those who are connecting (e.g., IP addresses).
But since these people are in fact deploying their own infrastructure,
it is outside of "our" control.
There is nothing particular to XMPP in these attacks, other than the
fact that the criminals are using a chat interface and then sending
information through an XMPP server that they have installed on their
own
machines. These attacks are not being perpetrated against Jabber
users,
but against regular older Internet users via fraudulent websites, with
XMPP as an information transport.
There is nothing we can do about this kind of attack.
However, we might want to look more seriously at XEP-0165 so that we
can
help prevent similar attacks over the real XMPP network.
Peter
- --
Peter Saint-Andre
https://stpeter.im/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkq+gKAACgkQNL8k5A2w/vwMMgCfXdKXFraXEkgxYP8TfyU69wwG
ZooAniTm7AdS7uvJLFM6f+ZCCzyQxKlf
=13VE
-----END PGP SIGNATURE-----
--------------------------------------------------------------------------------------------------------
Email Filtering by Cleartext a Carbon Minimised company - www.cleartext.com
--------------------------------------------------------------------------------------------------------