Welcome to the resource topic for 2005/091
Title:
Distributed Phishing Attacks
Authors: Markus Jakobsson, Adam Young
Abstract:We identify and describe a new type of phishing attack that circumvents what is probably
today’s most efficient defense mechanism in the war against phishing, namely the
shutting down of sites run by the phisher. This attack is carried out using what we
call a distributed phishing attack (DPA). The attack works by a per-victim
personalization of the location of sites collecting credentials and a covert
transmission of credentials to a hidden coordination center run by the phisher.
We show how our attack can be simply and efficiently implemented and how it can
increase the success rate of attacks while at the same time concealing the tracks
of the phisher. We briefly describe a technique that may be helpful to combat DPAs.
ePrint: https://eprint.iacr.org/2005/091
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .