TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

We Got Phished

338 pointsby juanplusjuanover 8 years ago

26 comments

ryanobjcover 8 years ago
2 factor authentication is key here. The ubikey is a gold standard for business - no one should do serious business without it!<p>For everyone else, I think the new 2fa Google App approach is better. When you go to login, your Google App pushes a notification to your phone and you have to click on it. This raises the bar to doing a simultaneous login, which isn&#x27;t impossible, but even if it weeds out a large number of attacks for now, it&#x27;s worth it!
评论 #12782787 未加载
评论 #12782158 未加载
评论 #12782448 未加载
评论 #12784192 未加载
评论 #12782132 未加载
评论 #12782464 未加载
评论 #12782383 未加载
评论 #12783129 未加载
评论 #12782831 未加载
评论 #12782494 未加载
ivankover 8 years ago
Google provides a Chrome extension that alerts you (and an administrator) if you accidentally enter your Google password on a site that isn&#x27;t accounts.google.com: <a href="https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;password-alert" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;password-alert</a>
评论 #12782901 未加载
winglessover 8 years ago
I use Lastpass and I just realized that it prevents phishing since it autocompletes my login info based on the domain.
评论 #12781981 未加载
评论 #12781825 未加载
评论 #12782247 未加载
评论 #12781846 未加载
tikhonjover 8 years ago
This article seems great at describing how phishing actually works in practice, especially to people without much exposure to technology. I&#x27;ve gone through at least a couple of training emails from IT departments about phishing, and this was way more effective. A realistic case-study with a really clear description is valuable!<p>This article could definitely augment the anti-phishing education at your organization—the only downside is that it&#x27;s a bit long, so busy people probably won&#x27;t want to read it :&#x2F;.
评论 #12783436 未加载
nmcover 8 years ago
The beginning of the story is missing. PZ clicked on the link in the email because it was <i>&quot;received [...] from a familiar mailing list&quot;</i>.<p>Did PZ trust a mailing list where anyone could post? Or did the attackers spoof the &quot;from&quot; field? The former may have been prevented by employee training, the latter by SPF or similar technologies.
评论 #12785823 未加载
评论 #12781803 未加载
评论 #12781969 未加载
评论 #12785311 未加载
the_watcherover 8 years ago
Kudos to Exploratorium for sharing. Hopefully they&#x27;re able to find a way to use it in their educational exhibits.
评论 #12782130 未加载
BoysenberryPiover 8 years ago
Many people won&#x27;t check the url when signing in if everything looks to be on the up and up. This is why I really liked one of the things Yahoo did which was create a sign-in seal. Every time you signed in Yahoo would display a custom image that you set and if that image wasn&#x27;t there then something was probably wrong.
评论 #12781672 未加载
评论 #12782135 未加载
评论 #12782232 未加载
评论 #12781701 未加载
评论 #12782452 未加载
评论 #12782530 未加载
Raphmediaover 8 years ago
We also got hit by this a few months back. It also got send to all of your company&#x27;s contact. We had to mail all of them back and lost face.<p>One hour in or so Google made it so that the emails (even those already received and opened) were blocked. It helped to mitigate the issue. Most of the outside contact that would have received the mail received it in their spam.<p>We learned from it and have better security now.
registered99over 8 years ago
&gt; URL shortener, which IT reverse engineered with a URL expander<p>That&#x27;s an interesting way to put it...
评论 #12782767 未加载
shawkinawover 8 years ago
It seems to me that browsers could be smarter about this kind of thing. Like, &quot;Hey, you just put your Gmail credentials into a non-Gmail login form, did you really mean to do that?&quot;<p>Obviously in the HN-type crowd, you know to always carefully check the URL of links and form submissions. But I just don&#x27;t know how realistic it is for that to be expected of an average user.
评论 #12782722 未加载
评论 #12782655 未加载
评论 #12782628 未加载
arkitaipover 8 years ago
Google needs to add some optional intelligence to Chrome so that when it comes across a site with suspiciously similar design as key google urls by on a unrenognized url, it should warn the user.
评论 #12781897 未加载
评论 #12781890 未加载
x0x0over 8 years ago
I recently saw a link, that I unfortunately can&#x27;t find, where someone senior affiliated with Defcon or black hat nearly got phished. He was rushing packing in the midst of a flurry of amazon shipments to travel to some conference and got a very well timed phishing email asking him to confirm some sort of shipment details for amazon. He fortunately noticed it was the wrong product, but I seem to remember had started typing his info already.<p>If someone like that can get nearly fooled, there&#x27;s little hope for the rest of us or our families.<p>It&#x27;s time to give up preventing phishing and start working on amelioration.<p>ps -- if anybody knows the story I&#x27;m talking about, I&#x27;d love the link.
misiti3780over 8 years ago
2-factor would have prevented this - no ?
评论 #12781741 未加载
评论 #12781757 未加载
评论 #12781677 未加载
callesggover 8 years ago
At my company we get these things 2-3 times a year. Surprisingly many people understand that there is something fishy. But &quot;Surprisingly many&quot; is not enough.<p>2FA is not enough here a user that does not have the required knowledge to see what is phishing and what is not will most likely enter the 2FA key giving the bad guys the auth tokens anyway.
评论 #12782732 未加载
评论 #12782681 未加载
评论 #12782733 未加载
heartsuckerover 8 years ago
&gt; What makes an attack like this so effective is that you never expect to see something as convincing as this<p>I&#x27;ve been working on phishing and counter-phishing recently, and if someone is actually putting any effort in, you have to expect something like this. Very legitimate looking email, the correct signature (complete with up to date font&#x2F;logo), and a virtually perfect copy of the login page to whatever service they&#x27;re using. All of this, even just to target a single person, is under 8 hours of work, which is to say, it&#x27;s a simple task for someone who really wants to phish you.<p>The article mentions having an IDS and disaster recovery plans, and this is the best you can hope for as pretty much everyone is susceptible to this, and AI still can be beaten.<p>Source: I&#x27;ve done this, beaten Gmail&#x27;s anti-scam filters, and phished CTOs.
评论 #12785326 未加载
评论 #12783456 未加载
greggmanover 8 years ago
I fell for this one :( The signs were there but the simplicity of the email I think is what lowered my guard.<p><a href="http:&#x2F;&#x2F;blog.greggman.com&#x2F;blog&#x2F;getting-phished&#x2F;" rel="nofollow">http:&#x2F;&#x2F;blog.greggman.com&#x2F;blog&#x2F;getting-phished&#x2F;</a>
mathgeniusover 8 years ago
Ok, this article is great and I&#x27;d like to share it with all my friends. BUT, it says nothing about how to mitigate against phishing and so ... would leave the average internet user just vaguely paranoid, which is not helpful.<p>I&#x27;d like to contact the author and get him to append something about &quot;check the url&quot;. But I guess they are not advertising their email addresses anymore :-)
codedokodeover 8 years ago
This just shows that password-based authorization doesn&#x27;t work for normal (not computed engineers) people and needs to be replaced with physical cryptographic keys. This is a script kiddie level attack any teenager can do and it succeeded.
ASalazarMXover 8 years ago
It&#x27;s surprising that a dedicated phisher would go so blatantly overboard, knowing it would stand like a sore thumb. This wasn&#x27;t spearphishing, it was regular phishing in a pond.
joeblauover 8 years ago
Like others, I use a password manager. As soon as I hit command + \ and nothing happened - I would have known something was up.
space99over 8 years ago
I have seen the infosec future and the future is going to be domain whitelisting. Banks are already doing it.
评论 #12784823 未加载
elchiefover 8 years ago
Yubikey + Chrome solves this.<p>You should get two though. Register both. Put one somewhere very safe, like a safe-deposit box.
bcjordanover 8 years ago
Why isn&#x27;t there some browser-level identity &#x2F; authentication you allow access to like oauth?
cloudjackerover 8 years ago
I haven&#x27;t read anything this interesting since the Milw0rm days, post more from that perspective
minimaxirover 8 years ago
It&#x27;s worth nothing the new user-image-before-password-input for Google is an anti-phishing feature. Of course, most people won&#x27;t think that deeply when prompted with a password request and a similar UI.
评论 #12781751 未加载
评论 #12783780 未加载
评论 #12781997 未加载
bottoover 8 years ago
This is why SQRL just needs to be completed and everyone should move to it.
评论 #12783134 未加载
评论 #12784852 未加载