Spamming Spoofing and Phishing E-Mail Security A S
Spamming Spoofing and Phishing E-Mail Security A S
net/publication/268412871
CITATIONS READS
0 2,751
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by P.L.T. Hoonakker on 26 February 2015.
Considering that many organizations today are extremely dependent on information technology, computer
and information security (CIS) has become a critical concern from a business viewpoint (Knapp, Marshall,
Rainer, & Morrow, 2006). Much research has been conducted on CIS in the past years. However, the
attention has been primarily focused on technical problems and solutions. Only recently, the role of human
factors in CIS has been recognized (Kraemer & Carayon, 2007). End-user behavior can increase the
vulnerability of computer and information systems. In this study, we present the results of a large study
among end-users and show how end-users’ e-mail behavior can affect computer vulnerability.
INTRODUCTION Radicati Group estimate the number of e-mails sent per day in
2008 to be around 210 billion (Tschabitscher, 2008). Other
There is very little reliable information about the costs and sources confirm these estimates and show that users are
impact of security breaches to companies and end users. Most sending more than 180 billion e-mails per day. 180 billion
of the information is either anecdotic or stems from messages per day means that more than 2 million e-mails are
commercial surveys among companies and end users. For sent every second. About 70% of them may be spam and/or
example, results of a recent study among 5000 consumers by contain viruses. The genuine e-mails are sent by around 1.3
Javelin Strategy & Research (Monahan, 2007) revealed that billion e-mail users. Results of the Pew Internet & American
identity fraud (defined as access to personal account Life Project Study (Fallows, 2005; Rainie & Fallows, 2004)
information that leads to fraud) affects nearly 5% of show that 60% of employees receive 10 or fewer e-mail
consumers, or nearly 10 million people in the USA per year, messages on an average day; 23% receive more than 20 and
and on average costs more than $6,000 per victim. The total only 6% more than 50. However, there are also disadvantages
one-year cost of identity fraud in the United States was more of using e-mail, such as receiving Spam e-mail (also known as
than $55 billion in 2006 (Monahan, 2007). Contrary to belief, "unsolicited commercial e-mail"), phishing and spoofing
most data compromise still takes place through offline scams.
channels (91%) and not via the Internet (9%). Lost or stolen Spamming is the abuse of electronic messaging systems
wallets, checkbooks or credit cards continue to be the primary to indiscriminately send unsolicited bulk messages. Spam in
source of personal information theft when the victim can e-mail started to become a problem when the Internet was
identify the source of data compromise (30%). Nevertheless, opened up to the general public in the mid-1990s. It grew
computer viruses, spyware or hackers account for more than exponentially over the following years, and today comprises
5% of all identity fraud cases; phishing for 3%; and online some 80 to 85% of all the e-mail in the world, by conservative
transactions for 0.3% (BBBOnline, 2007; Monahan, 2007). estimate (Kanich, et al., 2008). Results of studies by Fallows
(Fallows, 2005; Rainie & Fallows, 2004) on the effects of the
BACKGROUNDS CAN SPAM Act (a law aimed at controlling non-solicited
commercial and pornographic e-mails) in the USA on January
Evidently, using electronic or e-mail has many advantages. 1, 2004, show that the CAN SPAM Act did have some positive
E-mail is usually a faster alternative to other forms of effects. Users who say they have ever received porn spam
communication (i.e. letters, phone calls, meetings, etc.) and have decreased from 71% in 2004 to 63% in 2005. However,
users can decide when to use and respond to e-mails. The results of the study by Rainie & Fallows also show that 52%
popularity of e-mail is shown by its use: extrapolations by the of internet users consider spam a big problem; 22% of e-mail
users say that spam has reduced their overall use of e-mail; The average amount of money consumers recovered from
53% of e-mail users say spam has made them less trusting of phishing attacks in 2005 was 80%, but in 2006, recovery
e-mail; and 67% of e-mail users say spam has made being amounts dropped to 54%. Recently, security vendor
online unpleasant or annoying (Rainie & Fallows, 2004). Cyveillance reported a significant increase in phishing attacks
Apart from annoying, Spam messages can also contain during the last months of 2008. Cyveillance reported that the
malware. Malware (malicious software) are programs average number of phishing attacks in the first quarter of 2008
designed to harm or compromise a computer. Malware was around 400 per day. In September and October that
includes a wide array of computer code that can wreak havoc number rose to over 1,750 with record peaks as high as 13,209
to computers, computer networks and even the Internet itself. phishing attacks in a single day. Techniques, targeted at special
When end-users open an e-mail attachment they can populations, such as spear phishing or context aware phishing,
inadvertently download the malicious computer code on their are targeted scams, where the attacker uses knowledge learned
computer, and it can spread to the computer network or the about an individual victim in order to fool more victims
Internet. Some common forms of malware include: (Jakobsson & Stamm, 2006). For example, a users’ browser
history can be used to determine what websites an user has
• Computer viruses - programs that disable the victim's visited (for example to access his or her bank account) and
computer, either by corrupting necessary files or hogging subsequently an e-mail can be sent to that user, appearing to
the computer's resources come from that particular bank, containing the bank’s logo,
• Worms - programs that spread from one machine to etc., asking the user for sensitive information.
another, rapidly infecting hundreds of computers in a Spoofing, creating hoax websites that closely mimic real
short time sites in order to extract personal information from web visitors,
• Trojan horses - programs that claims to do one thing, but is an increasingly popular form of online scam (Dinev, 2006;
actually either damage the computer or opens a back door Federal Bureau of Investigation (FBI), 2003; Felten, Balfanz,
to your system Dean, & Wallach, 1997). In 2000, Ye at al., (Ye, Yuan, &
• Backdoors - methods of circumventing the normal Smith, 2000) estimated that 30 hoax attack sites were detected
operating-system procedures, allowing a hacker to access each day. According to the Anti-Phishing Work Group
information on another computer (Anti-Phishing Work Group (APWG), 2008), that number has
• Rootkits - a collection of programs that permits increased to nearly 1000 sites a day in the first quarter of 2008.
administrator-level control of a computer; not necessarily Network administrators and end-users can protect
malware on its own, but hackers use rootkits to control computer systems in different ways from spamming, spoofing
computers and evade detection and phishing attacks. Some of the soft- and hardware
• Key loggers - programs that record keystrokes made by a protections are described below:
user, allowing hackers to discover passwords and login • Anti-virus software is used to detect and if possible to
codes. remove malware. Typically, anti-virus software works by
maintaining a list of virus signatures which are used for
Apart from the indiscriminately sent unsolicited bulk messages comparison with the content of scanned files. Modern
(Spam) there are more sophisticated ways of getting the users’ anti-virus software uses a real time scanner to protect a
information or access to their computer and network. Phishing, system at all times and is also able to detect possible
or a phishing scam, means that someone or a website tries to threats by analyzing for suspicious program behavior.
get personal information from the end-user, for example by This method can detect some unknown threats.
accidently signing into a website or filling out a form placed • Intrusion detection systems (IDS) are soft or hardware
on web site. It is an example of a social engineering technique solutions used to detect all sorts of attacks, such as
used to fool users. Gartner Inc. (2006) conducted a study intruders and malicious software. This is typically done by
among 5,000 online adults in 2006 on phishing attacks. monitoring systems and networks with sensors and agents.
According to the results of the survey, approximately 109 For example, agents can monitor modifications to system
million U.S. adults have received phishing e-mail attacks in files or analyze network traffic and look for certain
2006, up from 57 million U.S. adults in 2004. The average loss patterns previously known as generated by malicious
per victim has grown from $257 to $1,244 per victim in 2006. traffic. IDS can detect known and some unknown threats.
• Intrusion prevention systems (IPS) can be considered an programs often have less strict security settings than
extension of the IDS technology. The purpose of an IDS is “corporate” mail. Passwords used for webmail can often be
to detect intruders and make a notification. An IPS takes a simple, and are not updated on a regular basis. Further,
step more and tries to prevent an intruder or attack by allowing employees to use webmail, also means that corporate
taking a prevention action instead of only making a content filters are bypassed. If organizations are subject to
notification. Actions are taken real time and examples of requirements of the Gramm-Leach-Bliley Act, the Health
actions are dropping packets from offending systems and Insurance Portability and Accountability Act (HIPPA) or other
blocking ports or IP addresses. regulatory requirements that limit the types of communications
Despite the technological efforts described above to counteract their employees have with the outside world, they need to
malware, computer and information systems remain consider the legal impact of the decision to grant access to
vulnerable because the systems need to interact with human external Web-based e-mail services. All of the content controls
beings, who have their own needs and preferences. It is the that they place on their "official" e-mail servers may be
human-computer interaction that often creates the biggest rendered moot by an employee's ability to access web-mail.
vulnerabilities. To quote Mitnick and Simon (2002): “A Estimates show that around 30 percent of employees are using
company may have purchased the best security technologies private e-mail accounts in the office, even though the
that money can buy, trained their people so well that they lock company’s Internet policy prohibits it (Stone, 2007). Webmail
up all their secrets before going home at night, and hired is also vulnerable to malicious actions. Examples are session
building guards from the best security firm in the business. hijacking (Noiumkar & Chomsiri, 2008), password cracking,
The company is still totally vulnerable... the human factor is cross-site scripting, worms, viruses, and all sorts of scams.
truly security’s weakest link”. Especially the use of e-mail and Often attached files will never be deleted but remain in the
working from remote locations make computer systems user’s e-mail archive even after employment has been
vulnerable, partly because it is not under control of the terminated.
organization. Working from remote locations, including using the home
With regard to e-mail, end-users can protect the system computer for work, can also make computer and information
by being careful and not open unknown or suspicious e-mail. systems more vulnerable (Landau, 2005). Many organizations
However, sometimes that is difficult. The latest viruses can depend on mobility of their employees to work from remote
“spoof” the sending e-mail address so that it looks like it is locations such as their home or when on the road (Morgan,
coming from someone other than the computer that infected it. 2004). Opening the organization’s network to employees
If an e-mail is not from someone the end-user knows, it is working from remote locations means greater flexibility as
usually best to simply delete it without looking at it. If the well as an increased amount of security risks (Orme, 2004)
e-mail appears to be from someone they know, end-users and identity and access management is a must for
should read the message carefully before opening any attached organizations of all types and sizes (Witty, Allan, Enck, &
files. Estimates show that more than a million computer users Wagner, 2003).When working from a remote location, the
use Web-based e-mail programs or webmail (Yahoo, Microsoft, exchange of data typically is done through e-mail, USB
AOL, Google, etc.), (Brownlow, 2008). One of the advantages devices or a direct connection to the corporate network, for
of webmail is that you can access your e-mail, everywhere, example through a Virtual Private Network (VPN) connection
anytime. However, webmail creates a security issue for the (Venkateswaran, 2001). Especially using the home computer
organization because sensitive data can easily be transferred to access the organization’s network can increase security risks
outside of the organization’s control and stored on third party (Ellison, 2002). The computer at home obviously is not as well
servers, meaning that the organization will lose track of the protected as the office computer, and is not under the control
data. Often end-users do not use their own computer, but of the organization. Often other members of the family use the
computers in hotels, airports etc., to access their webmail, home computer as well, for playing games, downloading files,
which can involve risks. Some services keep caches of Web etc. This creates the possibility of transferring infected files or
pages accessed on the local system, including those accessed unauthorized connections into the organization’s network
over a secure link. These caches may allow other users of (Dyer, Perez, Sailer, & Van Doorn, 2001). When employees
shared computers to view the e-mail messages other users use external storage devices such as USB keys, these can
viewed over a Web-based link (Chapple, 2005). Webmail easily be forgotten or misplaced (Gorge, 2005).
Some solutions, most technically, exist to eliminate and are related to CIS deviations: 1) Accessing the computer
lowering the risks of remote access. Examples are to require system and password use; 2) Security settings of the computer;
all communication with the organization’s network to run 3) System maintenance and downloading software; 4)
through encrypted connections, and limiting access to the data Electronic mail; 5) Help with computer problems; 6) Remote
and applications that can be accessed remotely. However, this access and working from home; 7) Sharing the computer and
can cause the user to access restricted data by other means. social networking; 8) CIS training; 9) CIS policy; and 10)
Providing webmail access to the organization’s e-mail account beliefs and attitudes towards CIS. In this paper we focus on
limits the need to use an external webmail service and the results with regard to Electronic mail.
eliminates a potential security risk, but the user can still have
Sample
local copies and caches of sensitive files and it is very difficult
if not impossible to control user behavior at home (Newman, A representative sample of employees of a large organization
2007). Providing secure equipment, such as laptops, which was asked to fill out a web-based survey. The organization
only are intended for work related tasks and restrict the user handles very sensitive private information and has experienced
from, for example, installing applications, is another computer security problems in the past. All employees at the
possibility. Little is known about end-users’ e-mail behavior organization are requested to participate in a Computer and
and how it can increase vulnerability of computer an Information Security training. Totally 836 employees filled out
information systems. Therefore, in this study we examine the questionnaire survey (response rate 52%). More than
end-users’ e-mail behavior and how this behavior can affect two-thirds of respondents are female (70%). Average age is 50
computer security vulnerability. years. On an average, respondents have 18.5 years of
computer experience. Three percent of respondents categorizes
METHODS themselves as novice users (just started using computers); 68%
as average users (use word processors, spreadsheets, e-mail,
Focus Groups surf the Web, etc.); 23% as advanced users (can install
Because relatively little is known about Computer and software, setup configurations, etc.); and 6% as expert users
Information Security (CIS) behavior of end-users, we first (can setup operating systems; know some computer
conducted focus groups with network administrators and CIS programming languages, etc.). Respondents had varying
experts (Hoonakker, Carayon, Deb, El Desoki, & Veeramani, educational backgrounds: high school or GED (9%); some
2008). Two rounds of focus groups interviews were conducted college (14%); 2-year college (13%); 4-year college (37%);
with the two different groups (CIS experts and network Master’s degree (MA, MS: 21%); professional degree (MD,
administrators). During the first focus group, participants were JD: 3%); and doctoral degree (PhD: 3%). On an average,
asked to describe non-malicious CIS deviations, and elaborate respondents have worked more than 14 years for the
on contributing factors and possible consequences. During the organization. Ninety-five percent of the respondents are
second round of focus groups, we gave feedback on the results normal end-users; 3% super-users (they do have some
of the first focus group and tried to reach a consensus on the administrator rights to change the computer settings); and 2%
most important deviations from the security rules. The focus network administrators.
e-mails and nearly 10% open e-mail attachments if they do not (V) (S) (P) (I)
know who the sender is. Forty percent of respondents use Open Yes No Yes No Yes No Yes No
web-based e-mail software and 7% use web-based calendar e-mails? 50% 40% 26% 19% 9% 6% 2.6% 1.7%
software, while only a small percentage of the respondents Open Yes No Yes No Yes No Yes No
who use web- and calendar based software pay attention to the e-mail 58% 43% 35% 21% 20% 6% 6.9% 1.7%
In the questionnaire, 4 questions were asked about web-mail 46% 43% 26% 20% 10% 6% 2.9% 1.6%
and identity theft. The results are summarized in Table 2. Use Yes No Yes No Yes No Yes No
web-based 55% 43% 30% 22% 15% 7% 2.7% 2.1%
Have you ever had a virus on your computer? 34% 42% 24% 0.1% to security
that quietly sit on your computer and can Percentages in bold are statistically significant different
deliver pop-ups or other advertisements to
16% 57% 26% 0.5%
you. Based on this description, do you think Results of analysis at group level show that respondents who
you have any spyware or adware on your open e-mail, and in particular respondents who open e-mail
computer right now? attachments if they do not know who the sender is, are more
A phishing scam means that someone or a vulnerable. They report significantly more viruses and
website tries to get personal information from spyware on their computer, and have more often been the
you, for example by accidently signing into a victim of a phishing scam and identity theft. Results show that
6% 81% 13% 0.1%
website or filling out a form placed on web respondents who use web-based software are more vulnerable
site. Have you, or do you believe you have, to phishing scams. However, when analyzing the data at group
ever fallen victim to a phishing scam? level, we did not take individual differences such as gender,
Do you think your identity or financial age, education, years of computer experience, and computer
2% 86% 11% 0.9%
information was stolen online? skills into account. Table 4 summarized the results of logistic
regression analysis, with these factors taken into account.
Table 4 Results of logistic regression of personal - Installing, using and regularly updating anti-virus
characteristics and e-mail behavior on increased vulnerability programs;
for computer and information security risks, statistically - Using the SPAM filters of their e-mail program;
significant Odd’s ratios - Not opening e-mails and in particular attachments to
e-mails if they do not recognize the sender, and even if
V S P I they recognize the sender, think twice before opening the
Gender (1=Male, 2=Female) 2.88 attachment;
Age - When they are not 100% sure that the e-mail attachment is
(1=<25 years, 2=25-34, 3=45-54, 4=≥55 years) from a trusted source, they should save it to their hard
Years of computer experience (0-46 years) disk, scan the file using anti-virus software, and only then
Computer skills (1=Novice user, 2=Average open the file. As an extra precaution they can disconnect
user, 3=Advanced user, 4=Expert user) their computer from the network;
Education (1=less than high school, 2=High - Use their organization’s e-mail account instead of web
school/GED, 3=Some college, 4=2 year college e-mail to access their e-mail, even when working from
degree, 5=4-year college degree, 6=Masters remote locations through a secure (e.g. VPN) connection
degree, 7=Professional degree, 8=PhD) - If the actions above are too complicated, they should ask
Open e-mails (Yes/No) the network or system administrator, or the help desk to
Open e-mail attachments (Yes/No) 3.02 8.96 8.10 help them perform these actions
Use web-based e-mail software? (Yes/No)