The Effect of Repeated Login Prompts on Phishing Susceptibility

The Effect of Repeated Login Prompts on Phishing Susceptibility

The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Mike K. Reiter Department of Computer Science Department of Computer Science University of Illinois at Chicago University of North Carolina at Chapel Hill fpsnyde2,[email protected] [email protected] Abstract 1 Introduction and Motivation Of all cybersecurity attacks, Phishing is perhaps most Background. Understanding the human aspects of phish- intimately tied to user decisions and behavior, rather than ing susceptibility is an important component in building technical weaknesses of the platform on which it is per- effective defenses. People type passwords so often that it petrated. Despite numerous studies both aimed at better is possible that this act makes each individual password understanding why and how people fall for phishing at- less safe from phishing attacks. tacks [3, 4] and new systems to detect the sites themselves Aim. This study investigates whether the act of re- and protect users [9], the problem continues, [6] and thus authenticating to password based login forms causes users fully understanding the causes and effects of the phe- to become less vigilant toward impostor sites, thus making nomenon is a crucial component of successful defenses. them more susceptible to phishing attacks. Our goal is to Fundamental to phishing as an attack is the user cre- determine whether users who type their passwords more dential, which is most often a password, also sometimes often are more susceptible to phishing than users who type accompanied by multi factor authentication credentials. their passwords less often. If our hypothesis is correct, Passwords have been the subject of intense investigation this result could lead to theoretically well grounded best along many dimensions; Bonneau et al. present a frame- practices regarding login session length limits and re- work for comparing passwords along with other authenti- authentication practices. cation schemes in [1]. One weakness of passwords they highlight is that the current one password per site ecosys- Method. We built a custom browser extension which tem has several downsides: it urges users to remember logs password entry events and has the capability of short- different passwords and greatly penalizes password re- ening session times for a treatment group of users. We use due to password database leaks or other brute force recruited subjects from our local campus population, and attacks on the simple passwords schemes people use to had them run the extension for two months. After this remember several passwords. time, we conducted a synthetic phishing attack on all re- Beyond the weaknesses listed in [1], another negative search subjects, followed by a debriefing. Our research aspect of password based authentication is the frequency protocol was approved by the University’s IRB. with which users are asked to re-authenticate to ALL sites, Results. We failed to reject the null hypothesis. We not just individual sites. In the Internet’s infancy, personal found that login frequency has no noticeable effect on computers were commonly shared among different users, phishing susceptibility. Our high phishing success rate of and software to enable efficient sharing via different pro- 39.3% was likely a leading factor in this result. files did not yet exist. Thus, automatically logging users out after some relatively short period of time, either due Conclusions. This study confirms prior research show- to memory limitations or security concerns, is the de facto ing exceedingly high phishing success rates. We also default security posture with respect to authentication ses- observed that recruiting in-person and campus-affiliated sions. In the present day however, modern software can users only greatly reduced our subject pool, and that easily support long lived session records, browsing often the extension based investigation method, while promis- takes place on single user devices like smarthpones, and ing, faces significant challenges itself due to deployed streamlined browser profiles make separating different extension-based malware defenses. user accounts easy even on shared devices. Thus, the 1 choice of a session length is purely a security decision. 2 Methodology Several services like Facebook and Google have adopted a strategy where sessions remain logged in for This work was carried out in five stages, starting with an indeterminately long amount of time.1 However, to the development of the software used to measure and our knowledge there is no scholarship or best practices manipulate the web browsing experience of the control document available which provides a breakdown of how group, and ending with informing the test participants successful this practice is, and it has not seen widespread about the experiment they participated in. This section adoption on the rest of the web. describes each of these five sections in chronological With respect to phishing defenses, this might indeed order. be a very good one: the longer a session remains in place on a given device, the less common the sight of the login 2.1 Web Browser Extension Development screen (or even any login screen across all sites) is to the individual user. If login screens are less common, Browser extensions are pieces of software that are in- we hypothesize that this will cause the user to be more stalled in commodity web browsers to measure or modify alert when logging in to services. While this may be the the user’s browsing experience. Though all recent ver- reasoning behind the long lived sessions used by large sions of popular web browsers support the ability to write Internet companies, being able to reproduce this effect and install extensions, we limited our study to people in open scholarship would be an important step towards using Firefox and Chrome. convincing more software authors and site owners to make Our study included two different extensions, one ver- these longer lived sessions the default. sion for the control group that only took measurements Specifically, financial services websites very often keep of the user’s browsing activities, and another version their session lengths limited to hours or even minutes. On for the experiment group that took the same measure- one hand, this choice is an entirely reasonable: an online ments but also modified the browser to induce the user banking session left logged in on a shared or stolen device to (re)authenticate with popular websites more frequently can cause immense damage for an individual. Conversely, than they normally would. Each of theses versions of the being prompted for these passwords continually has the extension are described in greater detail in the following very real potential to make those users more susceptible subsections. to phishing attacks. When considering the threat models When the user installed the extension in their browser, of phishing attacks and physical device takeover, the for- they were prompted to enter their email address. The mer can be perpetrated by anyone on the Internet rather extension then generated a random identifier for the user. than anyone with access to the device, potentially making At no point in the study did the researchers tie these two the phishing concern far greater than the session length identifiers together; we were never able to tie a person’s concern. random identifier with their email address. Each of these We claim that password re-entry frequency is not only a identifiers were used to identify users during different usability issue, but is also a security issue for all password parts of the study. Finally, on installing the extension based login systems. If users are conditioned to type users were randomly assigned to either the control or their passwords often, our hypothesis is that this action experiment group, with equal chance. habituates users to the act of password entry, which in Throughout the experiment the extensions reported turn causes the user to have more difficulty remaining statistics to a central recording server, which we main- vigilant to the threat of phishing. tained and used to gather data through the study. When This study was built to test that hypothesis. We devised the extension reported non-sensitive information to the a methodology which includes a control group whose recording server (such as how long a user has been par- login frequency is unmodified, and a treatment group ticipating in the study), the extension identified the user who have the length of their login session shortened, ne- by their email address. Likewise, whenever the exten- cessitating additional log-in which simulates sites with sion reported sensitive information to the server, the data short session timeouts. Unfortunately, we did not find was tied to the user’s random identifier. This allowed us statistical significance in our study, but were able to repli- to track which users were still participating in the study, cate important results in phishing susceptibility, and find without tying any sensitive information to the participant. new but unremarkable results related to well crafted spear phishing attacks. 2.1.1 Control Group Extension The control group version of the extension did not modify 1It remains to be seen whether such infrequent reauthentication might itself be harmful: if passwords are so rarely re-entered, the user the browsing experience at all, it only recorded informa- runs the risk of forgetting it simply because they never use it! tion about the user’s browsing activities. Each of these 2 data points is described below. figure1. When a user logs into one of these sites, the site User Participation: In order to determine which par- sets a cookie in the user’s browser. This cookie usually ticipants were staying active in the study (and to be able to lasts for a long time: days, weeks or months. The site remind participants if they were not staying active) the ex- uses this information to identify the user to the site, so tension reported the user’s email address to the recording that the site knows who the user is and does not ask the server once a day.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us