Log in

No account? Create an account

Online banking - John C. Kirk

Mar. 3rd, 2010

09:33 pm - Online banking

Previous Entry Share Next Entry


[User Picture]
Date:March 4th, 2010 11:54 am (UTC)
The main problem here though is that if you've been infected with a virus which can modify your HOSTS file, then it's already managed to acquire root privileges. At this point, it can pretty much do what it wants - track your web usage, log your keystrokes, scrape the screen each time you log in to internet banking and build up you password over successive logins (getting around the "enter characters 1, 5, and 7 of your password" approach the sensible banks use).

The key user behaviour to reinforce in this instance is the installation of good antivirus software from a reputable supplier. Microsoft's Security Essentials is a pretty decent package which is completely free and very simple to use.

If your DNS has been poisoned further upstream, then there's not a lot you can do - assuming the fake site is a faithful facsimile of the real one. As you've noted, the phishing sites all have security certificates now, so they get the little padlock many users have been trained into associating with security. EV is a step beyond this, but it's surely only a matter of time before this method falls over in some way and we move on to the next. The technological aspects of the fraud are going to evolve in step with the countermeasures - the only constant here is user behaviour, and good practice in this regard remains pretty much the same regardless of the specific technology involved:

- Use strong passwords and don't share them with anybody else.
- Preferably use a different password for each service. At the very least your online banking password should be unique.
- Install antivirus software and keep it up to date (if using Windows).
- Delete unsolicited email - and at the very least never click links in said email.
- Be observant - keep an eye out for suspicious activity on your account, and if you're in any doubt about a transaction, call your bank.
- Don't use IE
- Don't use Windows

On the bank's side, they can help by doing the following:
- Educating their users at every opportunity.
- Never ask for entry of a complete password (NatWest do this, Bank of Scotland don't)
- Use 2-factor authentication for any money transfers out of accounts. (most do this with their 'card reader' devices now)

If banks do all of these things, it will help, but it's safe to assume any security feature they come up with will be broken at some point. It at least discourages more casual / less competent phishing strategies though.

If users learn and keep in mind all the things stated above, then it becomes an awful lot harder to be defrauded. Never assume you won't be though - complacency is the criminal's best friend.
(Reply) (Parent) (Thread)
[User Picture]
Date:March 4th, 2010 12:08 pm (UTC)
That all sounds like very sensible advice

Incidentally - you mention 2-factor authentication. When I use this to verify transactions with the Co-op, they always remind me to do an extra check step. The way their system works is that once you've entered your pin on the card reader, it asks you for a numerical transaction code, and then it provides you with a response to this, which you enter on the website. So the co-op website gives you the transaction code, and you give back the response.
The last 4 digits of the transaction code *always* correspond to the last 4 digits of the recipient's account number. Now, theoretically, I shouldn't have to check this, right? Because I'm using the co-op's site and they are giving me all this data. But what if there was a man-in-the-middle attack that was feeding me data from the co-op but then, when I try to make a transaction, changing the destination of the money? Everything would look OK except that those 4 digits would almost certainly not match. And I would go "eeep", cancel the transaction, and phone them up. And even if the scammers were clever enough to remove that code from the html they served me, all the many times I've used the system have trained me to check this number, because it's highlighted as a really important step each time (including what to do if they don't match).

The power of user edumacation.
(Reply) (Parent) (Thread)
[User Picture]
Date:March 4th, 2010 12:13 pm (UTC)
Re-reading, when I refer to removing "that code", what I mean is the code that goes "oi check that those numbers match THIS IS REALLY REALLY IMPORTANT, if they don't match then don't enter anything and call us on this number NOW!"
(Reply) (Parent) (Thread)
[User Picture]
Date:March 4th, 2010 08:02 pm (UTC)
That sounds useful - I don't have 2-factor authentication with Lloyds TSB, so if someone intercepted my passwords then they could do as many transactions as they liked.
(Reply) (Parent) (Thread)
[User Picture]
Date:March 4th, 2010 07:54 pm (UTC)
Yes, that's a fair point about the HOSTS file; if your system has been compromised then you're in big trouble.

Regarding upstream DNS poisoning, I think that this is where certificates are really valuable. Back in 2005, I wrote about code signing certificates, and I said:

"Basically, before you run an application, there are two questions you should ask:

a) Do I trust the person/company who wrote it?

b) Am I sure that they did actually write it (and that nobody has tampered with it since)?

Code signing only addresses the second question, not the first. So, it's just a part of the overall solution, but it is a necessary part."

For websites, there are two similar questions:
1) Is the domain name correct?
2) Does it have an SSL certificate (i.e. is there a padlock)?

I've now got my fake website demo up and running, which involves two pages:

1) The main website:
This has the correct domain name, but no certificate.

2) The login page:
This has a certificate, but it's the wrong domain name.

I can't get a certificate for the Co-op's domain. I could create one for myself, but it wouldn't be issued by a trusted CA, so this would display a warning message when anyone tried to access the site.

So, the ideal scenario is that you should go to the bank's website (by typing the URL or using a bookmark), and that initial "landing page" should be secured by an SSL certificate. Some banks support that, which is good. Other banks don't, which is bad.

I agree with some of your advice, although we may have to agree to differ on whether Windows is inherently less secure than other OSes :) Regarding anti-virus software, this has the problem of enumerating badness, so it will never provide full protection. In particular, I just wrote a small program to modify the HOSTS file; it has to be run elevated, but my anti-virus software (McAfee VirusScan Enterprise) doesn't complain. This isn't really a virus in the classical sense, since it's not infecting other files. Instead, the program is doing exactly what it's intended to do, and there can be legitimate reasons to modify that file (e.g. during a disaster recovery scenario). Some AV software may use heuristic methods to detect suspicious behaviour, although you then run the risk of false positives. If anyone wants to try it out, I'd be interested to know whether your AV complains.

You can download it from here:
(17kb, requires .NET framework 2.0).

If you prefer to compile the source yourself, that's here (89 kb):
(Reply) (Parent) (Thread)