Phishing with a Darknet: Imitation of Onion Services

Phishing with a Darknet: Imitation of Onion Services

Phishing With A Darknet: Imitation of Onion Services Frederick Barr-Smith Joss Wright Department of Computer Science Oxford Internet Institute University of Oxford University of Oxford Oxford, England Alan Turing Institute [email protected] Oxford, England [email protected] Abstract—In this work we analyse the use of malicious ferred amongst mutually untrusting users, and is thus mimicry and cloning of darknet marketplaces and other an attractive target for a variety of scams, theft, and ‘onion services’ as means for phishing, akin to tradi- fraudulent behaviour. Phishing taking place on such sites tional ‘typosquatting’ on the web. This phenomenon occurs due to the complex trust relationships in Tor’s is unlikely to be reported to law enforcement, although onion services, and particularly the complex webs of this is not to say that anonymous reports on forums do trust enabled by darknet markets and similar services. not occur on occasion. Winter et al. [67], theorised about To do so, we built a modular scraper tool to identify the potential existence of phishing onion domains based networks of maliciously cloned darknet marketplaces; on data from their experiments. in addition to other characteristics of onion services, in aggregate. The networks of phishing sites identified by Phishing on the clearnet is a well established threat [15], this scraper are then subject to clustering and analysis [29]. A particularly effective variant being that of imitating to identify the method of phishing and the networks of ownership across these sites. We present a novel sites [52] to obtain credentials or financial details from discovery mechanism for sites, means for clustering and victims. We discovered this to be the dominant technique analysis of onion service phishing and clone sites, and utilised in onion services hosting phishing sites. an analysis of their spectrum of sophistication. One complexity in assessing potential phishing in onion domains is that we must identify whether purposeful I. Introduction ‘typosquatting’ of domains is occurring in order to target The darknet [33], [49] is commonly used to refer to a people in an equivalent manner to similar behaviour on the set of websites hosted in anonymous and untraceable normal web. For onion services, there is a key difference overlay networks, the most common of which is Tor and, in these behaviours - the objective is to deceive potential specifically, its onion services. Amongst many legitimate victims into clicking, visiting, and potentially using a site; and illicit uses of darknet websites, the rise of marketplaces rather than capitalising on a victim’s mistyping of a given for restricted drugs [38] and other illegal products are domain. The use of precise and sophisticated mimicry perhaps the most well-known. was identified through the similarity of domains that were part of phishing campaigns to the domains that they were Darknet markets are sites that utilise the capabilities imitating. of onion services in order to host and facilitate illegal commerce. These take advantage of the Tor network’s Crucially, onion domains are not created manually and capability of providing anonymity and onion services’ pro- registered via a DNS system as in the normal web. In- vision of relative anonymity for the operator of an onion stead, onion domains [43] are generated from a public key, service [60]. These markets are ephemeral and often rotate resulting in a string of characters that are hard for humans domains to maintain availability and anonymity, particu- to validate [64]. The complexity of onion domain names, larly following heavy DDoS attacks using the Stinger-Tor1 and lack of fully human-memorable addressing schema, en- tool during the period under analysis [11]. The currency ables easier mimicry of marketplaces and cloning of other used to undertake transactions on these marketplaces are sites for phishing and malicious purposes. Our research typically cryptocurrencies [2], [24] such as Bitcoin, Dash, discovered that these phishing sites were prolific through- Monero and Litecoin. out the darknet and that many sites were imitations or clones. Darknet markets trading in illicit goods [18] result in large volumes of hard-to-trace cryptocurrencies being trans- As an illustration of this complexity even for experienced users, during “Operation Onymous”, in which the US Fed- 1https://github.com/whitepacket/Stinger-Tor via archive.org eral Bureau of Investigation investigated and shut down several darknet markets. The FBI reportedly experienced A. Timing of Research difficulty discerning the genuine from the imitation with regards to shutting down darknet markets. The resulting The period during which we conducted this research, was shutdowns of various phishing-focused clones of major from May to July 2019. This was during and immediately darknet forums, included possible mistakenly-identified following the public shutdown and arrest of the adminis- sites [14]. Some of the key findings from this research trators of the Wall Street Market and Valhalla [23] and were: the murky closure of Dream Market in the wake of several vendor arrests [66]. During this period there were also 1) We established that over half the sites on the darknet reported DDoS attacks of unknown origin, causing down- are duplicates, many of them benign. time. This strongly incentivised administrators of illegal 2) We discovered that a subset of onion domain names sites to close their operation before they were arrested, are imitated by phishing groups and that phishing from compromised informant vendors and operators or is a widespread phenomenon on the darknet. through deanonymisation. 3) We clustered phishing campaigns on the darknet into DeepDotWeb, a major centralised link repository and individual campaigns, grouped by HTTP headers. Tor news site, was also shut down by law enforcement 4) Our analysis showed that the vast majority of onion during this period. As a result of this disruptive activity, sites are used for criminal purposes. there was significant potential for malicious operators to engage in phishing activity to capitalise on this uncer- The structure of this paper begins with describing the tainty, and as such our results also represent a particular background and related work. This is followed by a dis- snapshot in time that may not fully generalise to future cussion of the complex ethics involved. The main body of behaviours. the paper then proceeds, which is a description of methods of analysis to identify, cluster and quantify phishing on the B. Contents of Darknet darknet; and the results of this analysis. A further analysis of the aggregated contents follows. The paper concludes Despite a range of stated and demonstrated legitimate with an assessment of limitations, areas for future work purposes for onion services; we discovered that the most and a conclusion. common uses for websites on Tor onion services was criminal activity [41]. Approaches that damage the trust between and within sites and their users with respect to II. Background the anonymity and trustworthiness of sites leaves fertile ground for fraudulent activity to occur; as demonstrated Despite the existence of other forms of darknet, in this in a recent law enforcement operation [62]. work we focused on hidden, or “onion” services hosted in It is hopefully uncontroversial that the use of privacy the Tor network, and only accessible via users that have enhancing technologies, cryptocurrencies, Tor, and related connected to that network [16]. Due to the anonymity tools are not, and should not be, criminal acts in them- and untraceability provided by onion services these at- selves. The uses of these tools to avoid censorship and tract, amongst others, those who have a vested interest to engage in communication and access to information in operating anonymously for illegal purposes. Long-term against the wishes of regulators with whom users may centralised directories of sites and chains of trust are legitimately disagree, are sufficient justification for their largely unavailable for service authentication in the dark- development and adoption. net; due to the fragmented nature of onion services and lack of reliable public key infrastructure. This situation has Further, despite the illicit activities occurring in darknet partially begun to resolve with the development of nascent marketplaces, users of these technologies are entitled to search engines and listing sites such as Grams [25] and be free from fraud. The lack of trust and inability to DeepDotWeb. Such services are themselves still partial, have confidence in transactions in the darknet has impli- unreliable and prone to shutdown by law enforcement. cations for legitimate users there regardless of the spe- The ephemerality of onion services, indexes and market- cific effects on those committing criminal acts: if security places [28] contributes to this fractured trust environment, mechanisms do not work for drug dealers, they also do creating fertile ground for malicious onion service opera- not work for whistleblowers, independent journalists, and tors to defraud users. others. Onion services, considered in aggregate, experience a sig- III. Related Work nificant level of churn and flux of domains. As such, attempts to crawl and index services are far less effective Phishing on the clearnet is well studied in the academic than the more stable clear web; representing a snapshot of literature. Of particular interest is Clayton and Moore’s a moment in time rather than a stable directory. early work [42], which identified a ‘rock-phish’ campaign based on an element of its URL, similar to our identifi- elsewhere, both legitimate and imitated, are no longer cation and clustering of distinct campaigns. Recent mea- active. Despite this, the phenomenon itself is of long surement papers by Oest et al. provide an example of the standing. increase in the scale [47], sophistication and profitability of In 2017, a man was sentenced for performing this method phishing; in addition to an exploration of the effectiveness of fraud upon customers of darknet markets.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us