skip to main content
10.1145/1124772.1124861acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Why phishing works

Published:22 April 2006Publication History

ABSTRACT

To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users. We first analyzed a large set of captured phishing attacks and developed a set of hypotheses about why these strategies might work. We then assessed these hypotheses with a usability study in which 22 participants were shown 20 web sites and asked to determine which ones were fraudulent. We found that 23% of the participants did not look at browser-based cues such as the address bar, status bar and the security indicators, leading to incorrect choices 40% of the time. We also found that some visual deception attacks can fool even the most sophisticated users. These results illustrate that standard security indicators are not effective for a substantial fraction of users, and suggest that alternative approaches are needed.

References

  1. Ang, L., C. Dubelaar, & B. Lee. To Trust or Not to Trust? A Model of Internet Trust From the Customer's Point of View. Proc. 14th Bled E-Commerce Conf. (2001), 25--26.]]Google ScholarGoogle Scholar
  2. Anti-Phishing Working Group. Phishing Activity Trends Report November 2005 (2005).]]Google ScholarGoogle Scholar
  3. Anti-Phishing Working Group Phishing Archive. http://anti-phishing.org/phishing_archive.htm]]Google ScholarGoogle Scholar
  4. Ba, S. & P. Pavlov. Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly, 26, 3 (2002), 243--268.]]Google ScholarGoogle Scholar
  5. Cheskin Research. E-commerce Trust Study (1999).]]Google ScholarGoogle Scholar
  6. Dhamija, R. Authentication for Humans: The Design and Analysis of Usable Security Systems. Ph.D. Thesis, University of California Berkeley (2005).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dhamija, R. & J. D. Tygar. The Battle Against Phishing: Dynamic Security Skins. Proc. SOUPS (2005).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Egger, F.N. Affective Design of E-commerce User Interfaces: How to Maximize Perceived Trustworthi-ness. Proc. Intl. Conf. Affective Human Factors De-sign (2001), 317--324.]]Google ScholarGoogle Scholar
  9. Fogg, B. J. Stanford Guidelines for Web Credibility. Res. Sum. Stanford Persuasive Tech. Lab. (2002).]]Google ScholarGoogle Scholar
  10. Fogg, B. J. et al. How Do Users Evaluate the Credibility of Web Sites?: A Study with Over 2,500 Par-ticipants. Proc. DUX (2003).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fogg, B. J. et al. What Makes Web Sites Credible?: A Report on a Large Quantitative Study. Proc. CHI (2001), 61--68.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Franco, R. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers. IEBlog, Nov. 21, 2005.]]Google ScholarGoogle Scholar
  13. Friedman, B. et al. Users' Conceptions of Risks and Harms on the Web: A Comparative Study. Ext. Abs. CHI (2002), 614--615.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Friedman, B. et al. Users' Conceptions of Web Security: A Comparative Study. Ext. Abs. CHI (2002), 746--747.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gefen, D. Reflections on the Dimensions of Trust and Trustworthiness Among Online Consumers. ACM SIGMIS Database, 33, 3 (2002), 38--53.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hemphill, T. Electronic Commerce and Consumer Privacy: Establishing Online Trust in the U.S. Digital Economy. Bus. & Soc. Rev., 107, 2 (2002), 331--239.]]Google ScholarGoogle Scholar
  17. Jagatic, T., N. Johnson, & M. Jakobsson. Phishing Attacks Using Social Networks (Indiana U. Human Subject Study 05-9892 & 05-9893). (2005).]]Google ScholarGoogle Scholar
  18. Kim, D., Y. Song, S. Braynov, & H. Rao. A B-to-C Trust Model for Online Exchange. Proc. Americas Conf. on Inf. Sys. (2001), 784--787.]]Google ScholarGoogle Scholar
  19. Lee, M. & E. Turban. A Trust Model for Consumer Internet Shopping. Intl J. Elec. Commerce, 6, 1, (2001), 75--91.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Litan, A. Phishing Attack Victims Likely Targets for Identity Theft. Gartner Research (2004).]]Google ScholarGoogle Scholar
  21. Loftesness, S. Responding to ""Phishing"" Attacks. Glenbrook Partners (2004).]]Google ScholarGoogle Scholar
  22. MailFrontier, MailFrontier Phishing IQ Test II (2005).]]Google ScholarGoogle Scholar
  23. Princeton Survey Research Associates, A Matter of Trust. (2002).]]Google ScholarGoogle Scholar
  24. Secunia. http://secunia.com/.]]Google ScholarGoogle Scholar
  25. Secunia, Internet Explorer URL Spoofing Vulnerability (2004).]]Google ScholarGoogle Scholar
  26. Secunia, Multiple Browsers Vulnerable to the IDN Spoofing Vulnerability (2005).]]Google ScholarGoogle Scholar
  27. Stone, D. et al. User Interface Design & Evaluation. Elsevier (2005).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Wang, Y & H. Emurian. An Overview of Online Trust. Computers in Human Behavior, 21, 1 (2005), 105--125.]]Google ScholarGoogle ScholarCross RefCross Ref
  29. Wu, M., R. Miller, & S. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks? Posters SOUPS (2005).]]Google ScholarGoogle Scholar

Index Terms

  1. Why phishing works

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2006
        1353 pages
        ISBN:1595933727
        DOI:10.1145/1124772

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 April 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader