Phishers won’t stop as long as users continue to click

Cara Garretson: As long as there are phools, there will be phish

Carnegie Mellon University is researching the best ways to educate email users about the dangers of phishing, such as how to distinguish the URL of a fraudulent website from a legitimate one. Not exactly rocket science...or is it?

The Pittsburgh-based university has scientists and graduate students working on research to determine, in essence, how to get through to email users. Early results of a recent study show that users need to fall for phishing first in order to become aware enough to educate themselves against this form of fraud.

Another PhD student at CMU took the time to develop an online game called Anti-Phishing Phil that goes into great detail about fraudulent sites and how to detect them.

But clearly, not enough people are playing Anti-Phishing Phil.

How do we know that email users are clicking on fraudulent URLs embedded in messages? Because spammers and phishers continue to send them. These guys don't waste their time; if a spamming technique doesn't work they move on to something that does. Clearly, embedding bogus URLs in spam messages and getting recipients to click on them is working.

Here's an example from an email I received today: In a so-called account confirmation spam that purported to come from Western Union (the sender's domain is listed as westernunion.com), I was asked to click on an embedded link to confirm my account information with them, or it would be deleted. The fact that I don't have a Western Union account was my first clue that this message was trying to send me to a site that would probably ask for some personal information and promptly steal it.

But what was even a bigger clue to me was the URL itself. I'm not sure what the site that it pointed to entails, and I don't want to publish the URL because I wouldn't want to be responsible for anyone else clicking on it, but it has the words `hotel,' `bar,' and `pub online' in it; nary a mention of Western Union. Plus the domain suffix is `ch,' for Switzerland; Western Union is based in Colorado.

According to a report issued today by PhishTank, a clearinghouse of information about phishing hosted by DNS service provider OpenDNS, phishing scams reported to the website in July were up 254% over the amount reported in January. That means there's a lot of URL clicking going on.

Email users need to educate themselves about fraudulent sites, find their inner geeks for just a moment and learn to recognise URLs that don't match company names. Because spammers and phishers will continue to try and trick those who are willing to click.

In other words, as long as there are phools, there will be phish.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags theftSecurity ID

Show Comments
[]