瀏覽器上的HTTPS小鎖意味著安全窃款?

No‰狗眨看一下PhishLabs的數(shù)據(jù)統(tǒng)計和解釋晨继。

https://info.phishlabs.com/blog/49-percent-of-phishing-sites-now-use-https


HTTPS Phishing Site in All phishing Sites

Notice how quickly uptake of SSL certificates has risen — From less than three percent in 2016 to almost 50 percent by the end of Q3 this year. There are several reasons for the shift:

“In Q3 nearly half of all phishing sites, 49 percent, were using SSL, up from 35 percent the prior quarter,” said John LaCour, PhishLabs Founder and CTO. “PhishLabs believes that this can be attributed to both the continued use of SSL certificates by phishers who register their own domain names and create certificates for them, as well as a general increase in SSL due to the Google Chrome browser now displaying ‘Not Secure’ for websites that do not use SSL.”

The bottom line is that the presence or lack of SSL doesn’t tell you anything about a site’s legitimacy.

More specifically, this is not to say that Chrome’s use of Secure (padlock) or Not Secure isn’t inherently?wrong, but it is at best misleading. In most cases, users simply don’t understand what component of a site is considered secure, in this case, encrypted communication, and that leads to misconceptions about the site and its legitimacy.

17年的一個調(diào)查統(tǒng)計 (https://info.phishlabs.com/blog/quarter-phishing-attacks-hosted-https-domains

Why are We Seeing an Increase in HTTPS Phish?

Now that we’ve covered the basics about how the phishing landscape is changing, let’s talk about why it’s happening.

There are two primary reasons we’re seeing an increase in HTTPS phishing attacks:

1) More HTTPS websites = more HTTPS phishing sites

The first reason is the most obvious. As more websites obtain SSL certificates, the number of potential HTTPS websites available for compromise increases. An SSL certificate only means that the data sent from the website to its destination is encrypted in transit. It does NOT mean that a website has been secured or any vulnerabilities on the site have been patched. Thus, attackers will be able to exploit vulnerabilities in HTTPS websites just as easily as they can compromise HTTP websites.

Essentially, because HTTPS websites are not any less vulnerable than non-HTTPS sites, when attackers scan for potential domains to compromise and host malicious content, they will simply be more likely to randomly identify an HTTPS to pwn as HTTPS adoption increases.

2) Phishers are taking advantage of unclear security messaging

While the presence of phishing content on insecure HTTPS websites is based on a natural shift in the adoption of security measures, a significant number of HTTPS phish are hosted on domains that are registered by the phishers themselves.

An analysis of Q3 HTTPS phishing attacks against two of the most phished brands?indicates that nearly three-quarters of HTTPS phishing sites targeting them were hosted on maliciously-registered domains rather than compromised websites, which is substantially higher than the overall global rate.?Based on data from 2016, slightly less than half of all phishing sites were hosted on domains registered by a threat actor.

In the context of this discussion, the use of infrastructure that is obtained by a threat actor for the explicit purpose of hosting phishing content is particularly important because it is a conscious?choice?made by an attacker. As we mentioned earlier, the use of maliciously-registered domains to host phishing content isn’t a rare occurrence, but because we’re talking about HTTPS phishing sites, this also means that a phisher has taken the additional step of obtaining a valid SSL certificate.

Although a vast majority of SSL certificates used in HTTPS phishing attacks are obtained for free from services like Let’s Encrypt or Comodo, their use is notable because, technically, they aren’t necessary to create the phishing site. Without an SSL certificate, the phishing page would still function as intended.

So why would a threat actor take an extra step to create an HTTPS page when it is not actually needed?

The answer is because phishers believe that the “HTTPS” designation makes a phishing site seem more legitimate to potential victims and, thus, more likely to lead to a successful outcome. And unfortunately, they’re right.

As we discussed in a?blog post in November, we conducted an informal poll to see how many people actually knew the meaning of the green padlock that is associated with HTTPS websites. More than 80% of the respondents believed the green lock indicated that a website was either legitimate and/or safe, neither of which is true.

Results of an informal poll about the meaning of the green lock in a browser URL bar.

Adding to the confusion, browsers like Google Chrome label websites with SSL certificates as “Secure” in the URL bar. Another word for secure: safe.

Example of an Amazon HTTPS phishing site labeled as “Secure” in Chrome.

The misunderstanding of the meaning of the HTTPS designation among the general public and the confusing labeling of HTTPS websites within browsers are the primary drivers of why they have quickly become a popular preference of phishers to host phishing sites.

Combined with the accelerated adoption of HTTPS among website owners globally, we can expect to see the number of HTTPS phishing sites to continue to grow rapidly.

再看看CenSys上面那些注冊的Paypal的phishing網(wǎng)站?https://censys.io/certificates?q=CN%3D%25paypal%25

最后編輯于
?著作權歸作者所有,轉載或內(nèi)容合作請聯(lián)系作者
  • 序言:七十年代末,一起剝皮案震驚了整個濱河市搬俊,隨后出現(xiàn)的幾起案子紊扬,更是在濱河造成了極大的恐慌蜒茄,老刑警劉巖,帶你破解...
    沈念sama閱讀 207,248評論 6 481
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件餐屎,死亡現(xiàn)場離奇詭異檀葛,居然都是意外死亡,警方通過查閱死者的電腦和手機腹缩,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 88,681評論 2 381
  • 文/潘曉璐 我一進店門屿聋,熙熙樓的掌柜王于貴愁眉苦臉地迎上來,“玉大人藏鹊,你說我怎么就攤上這事润讥。” “怎么了盘寡?”我有些...
    開封第一講書人閱讀 153,443評論 0 344
  • 文/不壞的土叔 我叫張陵楚殿,是天一觀的道長。 經(jīng)常有香客問我竿痰,道長脆粥,這世上最難降的妖魔是什么? 我笑而不...
    開封第一講書人閱讀 55,475評論 1 279
  • 正文 為了忘掉前任影涉,我火速辦了婚禮变隔,結果婚禮上,老公的妹妹穿的比我還像新娘常潮。我一直安慰自己弟胀,他們只是感情好,可當我...
    茶點故事閱讀 64,458評論 5 374
  • 文/花漫 我一把揭開白布喊式。 她就那樣靜靜地躺著,像睡著了一般萧朝。 火紅的嫁衣襯著肌膚如雪岔留。 梳的紋絲不亂的頭發(fā)上,一...
    開封第一講書人閱讀 49,185評論 1 284
  • 那天检柬,我揣著相機與錄音献联,去河邊找鬼。 笑死何址,一個胖子當著我的面吹牛里逆,可吹牛的內(nèi)容都是我干的。 我是一名探鬼主播用爪,決...
    沈念sama閱讀 38,451評論 3 401
  • 文/蒼蘭香墨 我猛地睜開眼原押,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了偎血?” 一聲冷哼從身側響起诸衔,我...
    開封第一講書人閱讀 37,112評論 0 261
  • 序言:老撾萬榮一對情侶失蹤盯漂,失蹤者是張志新(化名)和其女友劉穎,沒想到半個月后笨农,有當?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體就缆,經(jīng)...
    沈念sama閱讀 43,609評論 1 300
  • 正文 獨居荒郊野嶺守林人離奇死亡,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點故事閱讀 36,083評論 2 325
  • 正文 我和宋清朗相戀三年谒亦,在試婚紗的時候發(fā)現(xiàn)自己被綠了竭宰。 大學時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片。...
    茶點故事閱讀 38,163評論 1 334
  • 序言:一個原本活蹦亂跳的男人離奇死亡份招,死狀恐怖羞延,靈堂內(nèi)的尸體忽然破棺而出,到底是詐尸還是另有隱情脾还,我是刑警寧澤伴箩,帶...
    沈念sama閱讀 33,803評論 4 323
  • 正文 年R本政府宣布,位于F島的核電站鄙漏,受9級特大地震影響嗤谚,放射性物質(zhì)發(fā)生泄漏。R本人自食惡果不足惜怔蚌,卻給世界環(huán)境...
    茶點故事閱讀 39,357評論 3 307
  • 文/蒙蒙 一巩步、第九天 我趴在偏房一處隱蔽的房頂上張望。 院中可真熱鬧桦踊,春花似錦椅野、人聲如沸。這莊子的主人今日做“春日...
    開封第一講書人閱讀 30,357評論 0 19
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至杖狼,卻和暖如春炼蛤,著一層夾襖步出監(jiān)牢的瞬間,已是汗流浹背蝶涩。 一陣腳步聲響...
    開封第一講書人閱讀 31,590評論 1 261
  • 我被黑心中介騙來泰國打工理朋, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留,地道東北人绿聘。 一個月前我還...
    沈念sama閱讀 45,636評論 2 355
  • 正文 我出身青樓嗽上,卻偏偏與公主長得像,于是被迫代替她去往敵國和親熄攘。 傳聞我的和親對象是個殘疾皇子兽愤,可洞房花燭夜當晚...
    茶點故事閱讀 42,925評論 2 344