Sci Simple

New Science Research Articles Everyday

# Computer Science # Cryptography and Security

Phishing Unmasked: The Hidden Dangers of Email Scams

Learn how phishing attacks exploit trusted networks to steal information.

Elisa Luo, Liane Young, Grant Ho, M. H. Afifi, Marco Schweighauser, Ethan Katz-Bassett, Asaf Cidon

― 8 min read


Phishing Threats Exposed Phishing Threats Exposed are alarmingly common. Phishing attacks from trusted sources
Table of Contents

Phishing is a type of online scam where attackers send fraudulent emails to trick individuals into revealing personal information. Think of it like a fisherman casting a line to catch fish, but instead, they're trying to catch your sensitive data. These emails often appear to come from trustworthy sources, and they usually contain links to fake websites that look legitimate.

Why Phishing is a Problem

Phishing attacks are a significant threat to organizations, costing them billions of dollars. They can disrupt operations, steal sensitive information, and even threaten national security. In today's online world, where emails are a primary form of communication, it's crucial to be aware of the tactics used by scammers and how to protect yourself and your organization.

The Dark Side of Email Networks

While we often think of reputable companies like Microsoft and Amazon as safe places to send and receive emails, it's surprising that a significant volume of phishing emails comes from their servers. Imagine finding out that your friendly neighborhood grocery store is serving up rotten fruit—it's shocking!

Attackers don’t usually send emails directly from shady servers. They prefer using these famous services because they have better chances of getting their messages through filters. So, even though the majority of emails from these companies are harmless, a chunk of phishing emails manage to slip in.

How Phishing Emails Get Delivered

Every email travels through a series of servers before reaching its destination—like a delivery truck making stops along the way. Each server adds a record of its journey in the email headers, which contain information about where the email came from.

When an email is sent, it passes through these servers, each adding "Received" headers to show the email's path. If an email goes through a lot of servers before reaching you, it might be a red flag. Think of it like a package that makes way too many detours—it could be suspicious!

The Dataset: A Deep Dive

To understand how phishing emails operate, researchers analyzed a massive dataset over one year. This dataset included billions of emails and revealed that a surprising number of phishing emails originate from trusted networks. Over 800,000 phishing emails were tracked, providing valuable insights into the behavior of these malicious messages.

The Power of Email Headers

Email headers are like the birth certificates of emails—they tell the story of where an email came from and how it arrived in your inbox. By examining these headers, researchers can categorize the networks that send phishing emails.

Two main categories emerged:

  1. Low Phishing Concentration Networks: These are networks where the majority of emails are legitimate, but a small amount comes from phishing attempts.
  2. High Phishing Concentration Networks: These networks mainly send phishing emails with very few legitimate messages mixed in.

It's like finding out that some restaurants serve only delicious food, while others primarily serve dishes that would make you question your life choices.

How Many Phishing Emails Get Through?

Organizations often use filters, like static blocklists, to protect against phishing. These lists are used to block known malicious senders, but they aren't foolproof. In fact, many phishing emails still manage to breeze past these barriers. It’s like having a security guard at the front door who occasionally nods off during his shift—some scammers still make it inside!

Despite having these filters, hundreds of thousands of phishing emails evade Detection. This is because scammers continually adapt their methods. Email addresses and server ownerships change so frequently that static lists quickly become outdated.

Changing Landscape of Phishing

The landscape of phishing is ever-changing. Attackers often hop from one network to another to avoid getting caught, like a cat burglar who switches disguises after every heist. This makes it difficult for traditional defenses to keep up with the evolving tactics used by scammers.

The researchers aimed to understand these changing behaviors better. By studying the networks that deliver phishing emails over time, they found that many networks only send phishing emails in short bursts. This suggests that current security measures may not be enough, and new, more dynamic methods are needed to combat phishing.

Email Filtering Services: Do They Help?

Some organizations employ email filtering services that can detect and block phishing attempts before they reach users' inboxes. However, it turns out that these filters don't catch everything. In one study, 75% of organizations using email filtering services were still vulnerable to phishing attacks. That’s like having a lock on your front door but leaving the window wide open!

A Closer Look at Attackers' Infrastructure

While the email service providers might sound trustworthy, they sometimes host services abused by attackers. These networks can be categorized based on how much phishing they send and how stable they are over time.

Some reputable networks, such as Amazon and Microsoft, are surprisingly involved in phishing despite being known for their legitimate services. Attackers might use these platforms to send phishing emails because they know they’re less likely to get flagged by security filters.

Identifying Phishing Campaigns

Not all phishing emails are created equal. Researchers categorize phishing emails into campaigns based on the sender and the subject line. By analyzing multiple campaigns, they can see trends and identify which tactics are most effective for attackers.

The data revealed that a small number of campaigns contribute to a significant amount of phishing emails. This means that while there are thousands of attackers, a few are responsible for most of the fraudulent emails circulating the internet. It’s a bit like a game of Whac-A-Mole—no matter how many you hit, a few will keep popping up!

The Challenge of Email Authentication

Various protocols exist to authenticate email senders and counter spoofing. These include SPF, DKIM, and DMARC. However, many emails still manage to get through despite failing these checks. The problem is that these authentication methods are not foolproof, often misconfigured, or inconsistently applied.

In reality, less than half of clean emails successfully pass through DMARC validation. This low success rate emphasizes the challenges organizations face in combating phishing through authentication alone.

The Role of Hosting Services

A significant number of phishing emails come from recognized cloud hosting services. This makes sense since many attackers exploit these platforms to send emails without raising suspicion. Organizations must figure out what steps can be taken to spot bad actors making use of these services—like a bouncer who sometimes lets in shady characters without realizing it.

Geographical Distribution of Phishing Emails

When researchers analyzed where the phishing emails originated, they found that they often came from countries known for their online services. Countries like the U.S. and the U.K. frequently appeared as sources of both clean and phishing emails.

Interestingly, phishing emails often traveled through more countries than legitimate emails. The route an email takes can say a lot about its credibility. If it hops across countries like a world traveler, it might be hiding something.

Case Studies on Phishing Behavior

To illustrate phishing behavior, researchers examined specific networks known for high or low concentrations of phishing emails. For example, some IP addresses from well-known providers, such as Amazon and Microsoft, were responsible for a surprising number of phishing attempts. In some instances, they found that these emails were sent using compromised accounts.

Other networks demonstrated bursty behaviors, sending a large volume of phishing emails in short bursts and then vanishing. This highlights the need for adaptive measures that can respond to such sudden changes in email traffic patterns.

New Strategies for Phishing Detection

With all this knowledge about phishing networks and their behaviors, researchers collaborated with email security companies to develop a new classifier. This tool aims to adapt to the ever-changing landscape of phishing attacks.

Instead of relying solely on static lists, the new system constantly updates its understanding of which networks are delivering phishing emails. By employing a sliding window to monitor email traffic, it can improve detection rates and spot previously undetected phishing attacks.

Real-World Results of the New Approach

When the new detection method was put to the test, it successfully identified 3-5% more phishing emails than previous methods. This means that having a system that recognizes changing patterns can lead to better protection against phishing scams, which is music to everyone’s ears!

Conclusions and Key Takeaways

In summary, phishing remains a significant threat, with a surprising number of attacks emerging from trusted networks. Many phishing emails get through traditional defenses, and attackers continually adapt their tactics to stay one step ahead.

By assessing how emails are delivered and creating adaptable detection methods, organizations can bolster their defenses against phishing attacks. So, the next time you see an email asking for your personal information, take a moment to pause and consider—could this be a clever phishing attempt? Better safe than sorry!

Original Source

Title: Characterizing the Networks Sending Enterprise Phishing Emails

Abstract: Phishing attacks on enterprise employees present one of the most costly and potent threats to organizations. We explore an understudied facet of enterprise phishing attacks: the email relay infrastructure behind successfully delivered phishing emails. We draw on a dataset spanning one year across thousands of enterprises, billions of emails, and over 800,000 delivered phishing attacks. Our work sheds light on the network origins of phishing emails received by real-world enterprises, differences in email traffic we observe from networks sending phishing emails, and how these characteristics change over time. Surprisingly, we find that over one-third of the phishing email in our dataset originates from highly reputable networks, including Amazon and Microsoft. Their total volume of phishing email is consistently high across multiple months in our dataset, even though the overwhelming majority of email sent by these networks is benign. In contrast, we observe that a large portion of phishing emails originate from networks where the vast majority of emails they send are phishing, but their email traffic is not consistent over time. Taken together, our results explain why no singular defense strategy, such as static blocklists (which are commonly used in email security filters deployed by organizations in our dataset), is effective at blocking enterprise phishing. Based on our offline analysis, we partnered with a large email security company to deploy a classifier that uses dynamically updated network-based features. In a production environment over a period of 4.5 months, our new detector was able to identify 3-5% more enterprise email attacks that were previously undetected by the company's existing classifiers.

Authors: Elisa Luo, Liane Young, Grant Ho, M. H. Afifi, Marco Schweighauser, Ethan Katz-Bassett, Asaf Cidon

Last Update: 2024-12-16 00:00:00

Language: English

Source URL: https://arxiv.org/abs/2412.12403

Source PDF: https://arxiv.org/pdf/2412.12403

Licence: https://creativecommons.org/licenses/by/4.0/

Changes: This summary was created with assistance from AI and may have inaccuracies. For accurate information, please refer to the original source documents linked here.

Thank you to arxiv for use of its open access interoperability.

Similar Articles