I was out all day yesterday to attend the Anti-Phishing Working Group meeting at Wells Fargo World HQ in San Francisco. About one hundred people from wide assortment of backgrounds were there, some from law enforcement agencies like the Secret Service and FBI, lawyers, prosecutors, financial services, e-tailers, solutions vendors, and security experts. APWG did an impressive job of pulling them altogether to focus on the phishing epidemic which continues to grow.
While everyone wanted to pool resources to combat phishing, I sensed a common desire to protect details about ongoing APWG activities from the public for various reasons. Since I am not sure what APWG's policy is about blogging, I will limit this post to my thoughts and observations.
Toolbars
Warm receptions received by Account Guard feature of eBay Toolbar and Dan Boneh's SpoofGuard means more toolbars in the near future. I predict we'll see about ten security-related toolbars released before this year is over. Since highly integrated client-side software like browser toolbars are one of my specialties, all this is good news for me but I couldn't help worrying about the oncoming glut of toolbars, sidebars, and deskbars causing confusion among users.
Microsoft
Microsoft needs to do more to combat phishing. Actually, they need to do 'less' by disabling or limiting use of hyperlinks and javascript in Outlook and Hotmail. Since phishing is causing real financial damages to companies and individuals, Microsoft created an arguably very large liability exposure by introducing DHTML e-mail in Outlook.
My opinion is that hyperlinks in e-mail contents should require the user to approve each navigation after viewing a dialog that clearly indicate the link destination. This constraint can be eased depending on the age of the hyperlinks because destination phishing websites are more likely to be takendown or abandoned over time. I also think javascript should be disabled completely in e-mail contents to protect against new breed of javascript obfuscated webpages.
Hunters vs. Butchers
Law enforcement agencies are IMHO still in the hunter mode, meaning hackers they find and prosecute are more or less trophies for assuring the public. Seen as services, they are open to denial of service attacks by organized hackers arming script-kiddies to overload or slowdown cybercops. They need to think about ways to shift-gear from hunter to butchers mode now, if not just against phishers, then for homeland security.
Takedown.com
Most difficult part of fighting against phishing is taking down phishing websites. Differences and confusino in law and legal jurisdictions, cross-language communication issues, availability, authority verification problems, and other issues make taking down a fraud site a skill or an art of social networking, ingenuity, and patience which most companies do not have.
Solutions suggested so far like contacts and standards are useless IMHO. A more effective solution is to encourage entrepreneurs to startup federated or franchised businesses to offer takedown services around globe and around the clock with the local touch. Having middlemen like them solves most of the issues mentioned above.
Spoofback
Considering the difficulty with takedown, another options is to 'spoof back' by posting phony information to the phishing websites in order to spoil the goods by diluting it with bad info. Instead of receiving 3,000 good responses, phishers will receive 300,000 responses most of which will be bad. Another variation is to post user info leading to honeypots in order to phish the phishers. I am not sure about the legal issues, but hackback risk is no worse than the takedown IMHO.
APWG Future Threat Models SIG
I have volunteered to participate in the Future Threat Models SIG at APWG because I am both highly creative and insanely paranoid which means I can see blindspots where none exists. :-) I probably won't be posting about the activities there but I will post my thoughts and publicize imminent threats like the XSS Network threat I posted about before.