Cryptology ePrint Archive: Report 2005/091
Distributed Phishing Attacks
Markus Jakobsson and Adam Young
Abstract: We identify and describe a new type of phishing attack that circumvents what is probably
today's most efficient defense mechanism in the war against phishing, namely the
shutting down of sites run by the phisher. This attack is carried out using what we
call a distributed phishing attack (DPA). The attack works by a per-victim
personalization of the location of sites collecting credentials and a covert
transmission of credentials to a hidden coordination center run by the phisher.
We show how our attack can be simply and efficiently implemented and how it can
increase the success rate of attacks while at the same time concealing the tracks
of the phisher. We briefly describe a technique that may be helpful to combat DPAs.
Category / Keywords: applications / Covert channels, distributed attacks, phishing, social engineering, security
Publication Info: in submission
Date: received 25 Mar 2005
Contact author: markus at indiana edu
Available format(s): PDF | BibTeX Citation
Version: 20050325:180653 (All versions of this report)
Short URL: ia.cr/2005/091
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]