F-Secure Responds To Criticism of .bank 203
Crimson Fire writes "F-Secure recently offered a solution to the problem of bank-account phishing, and the discussion here of a .bank TLD generated some criticism. In their latest blog entry F-Secure has responded point-by-point."
I'm still not convinced (Score:5, Insightful)
If you're going to spend money on fixing this problem, I think the best place to put it is in user education.
Suppose
At this point, you *still* have to educate users of what this green bar means. So why not just skip this expensive
This just seems like it would be a big waste of money for all parties involved.
Impossible. (Score:5, Insightful)
Even if you spend just $1 on educating each person, there has got to be a better way to secure online transactions for $300 MILLION.
A far better solution would be to go for the simpler approach.
For every transaction you initiate online, the bank will call the phone number that they have on record for you and ask you to "press 1 to authorize the transaction in the amount of $X, press 2 to cancel or press 3 to report a fraudulent transaction".
There, that solves the problem for all people with online banking who also have a phone (say about 99.9% of them).
And the best thing is that the bank will then have records of what IP addresses are originating the fraudulent transactions and be able to flag those on its own.
"The transaction for the amount $X is originating from an address with a history of reports of fraudulent behaviour. Press 1 to authorize the transaction in the amount of $X, press 2 to cancel or press 3 to report a fraudulent transaction".
Re: (Score:3, Insightful)
Think about that. (Score:2)
This is a good thing. The system fails in such a manner that your money STAYS with you.
This gets to the concepts of not doing something if it cannot be secured and verified
vs
Making it as easy as possible for the customer even it it makes it easier to criminals to steal the customer's money.
Re: (Score:3, Insightful)
Re: (Score:2)
My CC company (Wells Fargo Mastercard) likes to call me when they see charges that are different from my usual purchasing pattern.
Re: (Score:2)
What I've wanted for years is for my bank to let me specify this for my Mastercard or my Debit card - you go out to dinner, pay with your card and the bank's system calls you and asks you to authorise the payment by pressing a key / entering a password PIN on
Re: (Score:2)
You are right on the money on this issue. Education is the only real solution to the problem, and trying to impose a technological solution to what is ultimately a social problem only makes it that much harder to teach people how to avoid it later because they are that much more used to trusting suppo
Re: (Score:2)
Re: (Score:2)
You are right that it would expensive, but it would be orders of magnitude more effective than a technological solution like a trusted top level domain name that in the end accomplishes nothing more than being a placebo.
Re: (Score:2)
Expensive? I can educate a couple bilion people cheaply - make a text website that simply says "Keep your account secure - don't bank online, get off your lazy ass, and learn how to write checks and mail them." and point them to that site.
Problem solved.
Re: (Score:3, Insightful)
My biggest issue with the proposal is the cost; and not that it shouldn't charge big banks $50,000 but that it ignores small banks and credit unions. Especially, since it ignores them with a 'they aren't the ones loosing money or big
Re: (Score:2)
What's the URL of your bank?
Before you type in your login/bank information, check to make sure that the URL in the URL toolbar is the URL of your bank. If it isn't, then this is most likely a phishing scam, and you shouldn't enter any information.
All banks have to do is put this information on a nice one sheet insert, and put it in with the account statements that they mail out monthly anyway.
Re: (Score:2)
Then you get companies like citibank which insists on putting their online credit card access under "citicards.com". How about educating the banks themselves? Get it through their head that they need ONE site with ONE name which is their OFFICIAL name that their customers know.
Then build a
Re: (Score:2)
Re: (Score:3, Insightful)
What the ... ? (Score:5, Insightful)
Who determines what "misleading domain names" means?
And we are talking about criminals making MILLIONS of dollars a year.
Spending $50K to make $5,000K is a GREAT deal. After all, EVERYONE knows that if it's a
Re: (Score:2)
It doesn't matter. (Score:2)
Or lots of banks will spend the money and that will mean lots of different people will be performing the checks.
Now, you DO realize that we are talking about "criminals", right? The people who already break the law. So things like bribery and extortion will not be forbidden.
Just look at the drug trade.
I should have gone with that one first. (Score:2)
Suppose there was a seal that you could only buy for $50,000 and a background check. But having that seal on your vehicle (no matter what size) meant that your shipment would NEVER be checked by law enforcement. No matter what borders you crossed. No matter what time.
Does ANYONE think that that would be a good idea? That it would reduce drug smuggling in any way?
Or would you just laugh at the person naive enough to suggest it?
Re: (Score:2)
Granted, there are many more financial instit
Re: (Score:2)
Re: (Score:2)
Right lets keep going with that, because your analagy is flawed, and this will fix it up:
Now suppose that seal had a serial number as part of its design, and it was displayed prominently. (because each domain name is different)
Next suppose that
Yes. (Score:2)
Sure. Why not?
Should it pose a problem, your criminal friends can spend their spare time reporting every other seal. The cops won't know the legitimate complaints from the fraudulent ones.
And all you need is enough time to turn that $50K investment into $5,000K.
This is not about establishing a permanent presence. This is about cashing out a LOT of money as QUICKLY as possible by exploiting the
And you verify that ... how? (Score:2)
Ah, but if the people putting the seals on the trucks were "*actually* trustworthy" then they would be "a decent idea" with regards to drug smuggling.
Do you see the point?
SOMEONE has to approve the seal. A person. And people can be bought. You will NOT know if that person was "*actually* trustworthy" or not.
Particularly when that seal would mean that EVERYONE in the world KNEW that it was safe to use that site.
Anybody can start a tax-haven bank (Score:2)
The harder part is getting a *useful* bank domain name - you're probably not going to get chase-manhattan-grand-cayman-branch.bank
Re: (Score:2)
If that were true. Do you have any evidence to support the claim that one phishing site is likely to return 5000k?
How long does the average phishing site stay active before people figure it out, and it gets shutdown?
Phishers, from my understanding of it, plow through junk domains, I'm not even sure they go a full day before getting knocked offline, and probably only hours before they a get added to the list of known phish sites and get blocked by 'anti-phish' so
Pfft. (Score:5, Insightful)
now how safe is the
Re: (Score:2, Insightful)
Wait, you need to actually install that software on my computer? Then how is it different from any other piece of malware that could possibly be installed on my computer? If a computer isn't secure then you shouldn't be using it for online banking in the first place.
MOD PARENT UP (Score:2)
Re: (Score:2)
They might stop immediately as they notice that selling .bank domains yields much higher profits.
V1@gr@ (Score:2)
So, uh... build a white list of valid banks. How hard can that be? What are you going to do with that while list, eh? Block everything that isn't on it? This is clearly an idea they haven't throught through, and they felt a little defensive about it after the thrashing they received from Slashdot. Their defense could use help. Maybe a d
Hmmm (Score:2)
...and if a trojan messes with hosts/LMHOSTS? (Score:2)
While admittedly it would take a compromise of the user's computer to do it, it still points out the one big, fat inherent weakness of a new TLD: The fact that sites aren't specifically identified by DNS name per se, but by a translation mechanism that points to the real site identifier (IP).
('course, the "safety toolbar" could then do a WHOIS check and such, but now we'r
Re: (Score:2, Insightful)
Or, you know, a check of the SSL certificate, which you'll need to do anyway.
It would still be an invalid domain (Score:2)
What about DNS poisoning? (Score:2)
Even worse, hackers can start poisoning the hosts on individual machines, which makes it even worse. It's already at a known address: %SystemRoot%\system32\drivers\etc. Once they start adding their own entries into the hosts file for Windows users, they are fucked. It will be so easy to point them whereever the hackers want.
His suggestion solves NOTHING. In fact, it is extremely shortsi
Once you crack the workstation, it's over. (Score:3, Interesting)
That's why you need a SECOND CHANNEL to confirm the transaction.
Which is why the bank should be calling your phone number and asking you to press "1" to authorize the transaction.
This won't stop them from re-routing your transactions. If you're trying to send $500 from your bank account, they can re-route it to their account. But they couldn't make any DIFFERENT transactions.
And the bank could quickly build
Re: (Score:2)
Re: (Score:2, Insightful)
And then you go to that site... and the browser says "your SSL certificate's no good".
You would also need to compromise one of the SSL certificate authorities.
And how does that get round a domain cert? (Score:4, Informative)
I'm suprised (Score:2)
Name ONE genuinely negative aspect of this to the individual consumer.
I can't think of one but I'm not so egotistical as to think there might not be one, but there are certainly lots of positive aspects.
You won't be paying for this, the banks will, why do you care.
As TFA states there are
Re:I'm suprised (Score:5, Insightful)
Not every solution can solve every problem, but adding the
Re: (Score:2)
They are trying to be polite. For those who fail to understand the point, let me express it this way: The entire .bank proposal is utter bullshit. The real problem of phsihing and related attacks (namely pharming and Trojans) is pretty simple: doing business over a compromised channel. We do hav
Re: (Score:2)
The problem is OCPD (Score:3)
1. things were working perfectly fine in the good old days, changing things and/or making me learn/do new stuff is _evil_. Someone ought to educate users instead, change the whole culture, whatever. (A.k.a., "back in my days we walked to school 2 miles through the snow, up hill both ways, and we _liked_ it" nostalgia.)
2. It's a conspiracy and/or it will be bought a
Re: (Score:2)
That's like arguing for not bothering with locks on vaults/tills because bank staff with enough security clearance could pocket wads of cash on the sly if they're careful enough anyway.
Just because there are insurmountable flaws, doesn't mean you shouldn't do everything you possibly can to cover the others to help limit the damage as best you can.
What about DNS hijacking? (Score:2, Interesting)
As the article mentioned this is not a silver bullet. For example, this won't solve DNS hijacking. Recently, I have observed such an attack. The victim told me that the bank site he was looking asked for national ID
Re: (Score:2)
F-secure's comment on this not being an issue for small banks/credit unions doesn't make sense. I assume that if this
Re: (Score:2)
hmmm (Score:2)
This in no way will "fix" the problem. It would however make sure that smaller banks can't get a look in which will help to enforce the monopoly of the large ones... and make a fuck of a lot of money for the people who get to pocket that 50k.
What would be a far better resource would be a firefox plug-in which highlights the part of the name which is the website, so "itsyourbank.obviouslyphishing.co.uk" would highlight the relevant par
Re: (Score:2)
Straw men (Score:2)
Re: (Score:2)
What are the consequences when a bad guy gets in? (Score:3, Interesting)
There are no rogue sites on .gov domain names (Score:2)
Uhm...
My lawyer says my comment is NO COMMENT.
Re: (Score:3, Funny)
I beg to differ. [whitehouse.gov]
Re: (Score:2)
Watch out for homeland security...
One thing they don't address... (Score:3, Insightful)
What does this do to address URL display bugs? (Score:3, Interesting)
Nothing in this addresses links that show up in email clients or browsers as say, www.yourbankyouknowandlove.com instead of where they really take you- an IP address of some random server run by the phisher.
If email clients were fixed to show the REAL url on mouseover, people wouldn't click the links in the first place. If browsers (well, mostly IE) were fixed such that you couldn't obfuscate the *real* URL, people would realize quickly what was going on.
Working with a lot of office people, they're all sharp enough to pick up on stuff like this pretty quickly (we use all macs, so we have neither problem- Safari and Apple Mail aren't "spoofed.")
.bullshit (Score:2, Insightful)
Who will be liable when the crime gangs start poisoning DNS and consumers enter details into what they believe is a
F-Secure are a laughing stock, this is a PR exercise that fails to address any of the real points.
If a Nigerian or Russian bank can get hold... (Score:2)
Re: (Score:2)
The Banks Don't Help Themselves (Score:4, Interesting)
Is it any wonder people end up falling for phishing site?
Re: (Score:2, Interesting)
Won't do jack (Score:3, Informative)
The far bigger problem are trojans that hijack the system to siphon login data from the user, either using browser plugins or hooks into the system. No
They missed the 2 biggest flaws... (Score:3, Interesting)
Re: (Score:2)
PGP... (Score:2)
If these companies used trusted public keys, which you download from their website or receive when you sign up..
Any phishing mail would be immediately visible as a scam, and easily deleted. Upstream filters could easily do this too.
What's a bank? (Score:2)
Even in the financial services industry, there's disagreement over what a "bank" is. Consider
Re: (Score:2)
If you have a business that has nothing to do with banking or money and want a
The Real Reason F-Secure Is Pushing This (Score:2)
Dave G. covered this on our blog [matasano.com] last month. There's backstory to this.
As Mikko acknowledges, the real purpose of ".bank" is not to make it easier for end-users to recognize fake sites. A new TLD does almost nothing to ameliorate that problem; end-users don't know what TLDs are, or what the slash character in a URL means. And before you yelp that end-users should learn that stuff, ask yourself: do you understand how the NANP phone number scheme works, or what the 3-digit exchange number in the middle of yo
I like Citibank's idea (Score:2)
Anyway, they let you choose a color and background pattern (or even your own picture). When you visit their website, it displays that picture and color. This is extremely difficult for phishing sites to emulate. They may be able to match the main webpage, but they won't be able to match the background and color since only the real website has this information.
It's easy to train users: Just tell them that all the bank's pages will display their background and color and no others.
Re: (Score:2)
It's pretty simple, actually. All the phishing site has to do is to fetch the color and picture from the real bank site, pretending to be the user.
Re: (Score:2)
Picture this:
Phisher copies main page. Unsuspecting user logs into fake bank page. Fake bank page passes username and password on to real bank page. User is now on real bank site only fake bank page now has their username and password.
how stupid are they? (Score:2)
(I raise my hand for 4 computers for IE7 alone, as corporate has outlawed that yet on machines that connect to that network).
Yet you expect all 300 million users out there to immediately update their browsers?
Foolish foolish thinking on your part.
barclays.bank.uk.reg (Score:2)
So user could enter this URL directly or barclays.co.uk could be redirected to this as certificate of authentication.
Obviously, this would work for all other trademarks in other goods or service (called classification) e.g. apple.computer.us.reg
Please visit http://wipo.org.uk/ [wipo.org.uk] - not connected with the crooks at UN's WIPO.org
Only Big Banks are losing money? (Score:2)
PayPal.bank? (Score:2)
What if it did? Should some competing Internet (or real world) payment system that's not regulated as a bank get a
This whole thing is stupid. Real banks are trusted because they are insured, by the FDIC, FSLIC and/
Re:Sooo.... (Score:5, Informative)
Not only expensive, but also exclusive. As with suffixes like
The only problem I see with
Re:Sooo.... (Score:4, Interesting)
Re: (Score:3, Interesting)
But we can trust that if this becomes a standard, browser makers will take advantage of it to make life easier to users, or at least to some users. Just like Firefox turns the URL bar yellow for SSL sites, and IE7 turns it green (I think), there could be some UI cue telling the user tha
Re: (Score:3, Insightful)
Education is the best line of defense against this type of attack. Too bad one of my credit cards (MNBA) insist on sending me HTML emails with "click here to service your account" to confuse matters (while my other banks tell me to never click a link in an email to do such a thing). The worst bit is they don't seem to care - when I questioned the practic
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
The thing which concerns me is the question of how they would prevent DNS attacks aimed at redirecting traffic to those sites to a filter site. Certificates help as well as the ability to keep people
Mikko Doesn't Really Answer the "Will it Work" (Score:5, Insightful)
You're right about the "real.bank.example.com" problem, and there are lots of other approaches,
like
There's another class of n00b phishing attacks that use the real.bank name as social engineering - "Dear subscriber, we're changing the name of our website to EXAMPLEBANK.BANK to improve security! Please verify your information on the old website, EXAAMPLEBAANK.com, to make sure your access continues to work!"
Re: (Score:2)
Re: (Score:3, Insightful)
I suppose you could build a separate browser that only looks at whitelisted sites and tell people to use it instead of their regular browser when they're doing banking - but if
Re: (Score:2)
Of course it will work, if you take it for what it really is: a cleverly designed domain registrar business model. As a business model, it is surprisingly similar to how phishing works. Approach many for little money, break even on a very small number of respondents. At a price of ... how much? 50,000? per domain it is s safe
Re: (Score:2)
Re: (Score:3, Insightful)
To improve security, really? Unfortunately, a site having a .bank TLD does not convey any additional information to the user. Let's assume you are a bank customer and thus, a potential phishing victim. You will probably have at most a handful of banks that you do business with. All the addresses of all the online banking sites you ever interact with fit on a sticker that you can put below your screen. What exactly is the additional informat
Re: (Score:2, Insightful)
Shopping carts, mall websites, payment gateways, -- anything with a payment form on the site... they are all attacked more than "banks" right now. It's easier to skim a lot of small insecure sites than hit one big well-protected one. I learned that from Neuromancer.
Re: (Score:2)
After all, you don't see criminals purporting to represent U.S. government agencies by using fake .gov domains.
I used to know someone who had a .gov.uk domain. He didn't use it much; he got it set up for testing purposes when he was doing some contract work for a government agency and never got around to telling them that it was no longer needed. Apparently getting it set up in the first place only required one telephone call, and didn't involve any additional checks.
Re:Sooo.... (Score:5, Interesting)
Nah, they use real
Seriously tho, when it comes to banks they're even harder than governments to tell apart the good guys from the bad guys. Banking regulations are not at all the same over the world, and I suspect it might not be that hard for serious phishers to get a 'real' bank registered in some less regulated country. And would
The very idea that security vendors would automatically trust anything just because it had special domain or a special designation has me wondering how seriously they've tried to break their own idea.
Further, F-Secure validating all sites under a domain doesnt need a new TLD, they could just as well register
Of course, the trouble with both certificates and validated domains is essentially that you get more profit the less you validate and the more customers you accept. Which means it's not in the providers actual financial interest to do what they say they do. Which is why we have Verisign and co suggesting brand-spanking-new extraspecial validated certificates. Which they have all the incentive to turn into crap and then come up with yet another, extraextraspecial validated... etc.
Re: (Score:2)
Proof of legitimacy & exclusivity... .bank.uk .bank url?
TFA mentions State tlds like
So do only USA banks get to have a
Or, can I setup a dummy bank in the Cayman Islands, pay $50K and
Re:User's software... (Score:5, Insightful)
It gives the user false a sense of security thinking that typing www.citi.bank into their browser will take them to a secure site that has been vetted when it actuality it takes them to a fake site.
There is simply no way to ensure that the Internet is safe for users unless you spend time and resources to educate those users in methods that they themselves can use to determine if they are talking to a scam site or not.
Re: (Score:2)
Re: (Score:2)
More TLDs are Just Fine (Score:5, Insightful)
Re: (Score:2)
The whole point of a hierarchical naming scheme was to spread the load around and remove a centralised point from the network. At the moment 99% of websites are