views:

104

answers:

5

The talk of internet town today is the SNAFU that led to dozens of Facebook users being led by Google search to an article on ReadWriteWeb about the Facebook-AOL deal. What ensued in the comments tread is quickly becoming the stuff of internet legend.

However, behind the hilarity is a scary fact that this might be how users browse to all sites, including their banking and other more important sites. A quick search for "my bank website login" and quickly click the first result. Once they are there, the user is willing to submit their credentials even though the site looks nothing like the site they tried to reach. (This is evidenced by the fact that user's comments are connected to their facebook accounts via facebook-connect)

Preventing this scenario is pretty much out of our control and educating our users on the basics of internet browsing may be just as impossible. So how then can we ensure that users know they are on the correct web site before trying to log in? Is something like Bank of America's SiteKey sufficient, or is that another cop-out that shifts responsibility back on the user?

+1  A: 

When I set up my online bank account, it asked me to choose from a selection of images. The image I chose is now shown to me every time I login. This assures me that I am on the right website.

EDIT: i just read the link about the BoA SiteKey, this is apparently the same thing (it sounded from the name like a challenge-response dongle)

I suppose the best answer would be a hardware device which required a code from the bank and the user and authenticated both. But any of these things assume that people are actually thinking about the problem, which of course they don't. This was going on before internet banking was common - I had a friend who had her wallet stolen back in the 90s, and theif phoned her pretending to be her bank and persuaded her to reveal her PIN...

Colin Pickard
You're assuming someone logging into the site is a savvy user such as yourself, not one that would click on any link from a search result and attempt to login. They may forget they've setup an image and just go with whatever login is presented to them.
bdl
but you only get that once you're logged in right? at which point, the spoof site already has your credentials (or some of them)
roryf
of course, all you can do then is to alert the bank and get your credentials revoked.
Colin Pickard
+1  A: 

The site could "personalize" itself by showing some personal information, easy recognizable by the user, on every page. There are plenty of ways to implement it. The obvious one: under first visit, the site requires user to upload some avatar, and adds user's id to the cookies. After that, every time the user browses the site, the avatar is shown.

Moisei
A: 

When the user first visits the site and logs in, he can share some personal information (even something very trivial) that imposter sites couldn't possible know - high school mascot, first street lived on, etc.

If there's ever any question of site authenticity, the site could share this information back to the user.

Like on TV shows/movies with the evil twin. The good twin always wins trust by sharing a secret that only the person who's trying to figure out who the good twin is would know.

Terry Donaghe
If you read the comments on the linked website you would realize how much that is asking of these people. If the image wasn't shown they wouldn't think something was wrong - they would likely think that the bank had come up with some new routine to make things less of a bother for them.
dagoof
Unfortunately, this doesn't provide the security you think it does. Just look at the example of Sarah Palin's "hacked" account.
bdl
+2  A: 
erickson
"vast farms of Magic 8-Balls" that made me laugh. You make me sound ancient with my usage of these arcane arts! Then again, I know better and understand how internet browsing works. It's a new world we live in now though, and the type of user unveiled here are the same people we would hope to have as customers on any internet driven business.
Donal Boyle
If "a fool and his money are soon parted," then, yes, these folks look like great customers.
erickson
I blame internet explorer.. What other evil browser do you type in "facebook.com" in the URL address bar only to get a MSN search page saying you searched for "facebook.com".. No no, it requires "http:// facebook.com" to get straight to the site you intend..
Earlz
Yes , but DNS cache poisoning , IP spoofing , man in the middle ..
YordanGeorgiev
Sure, but those problems aren't made any better by creating a *de facto* meta-standard naming system through search engines.
erickson
people getting confused by search engines has happened for as long as search engines have existed. removing or hobbling search engines would not siginficantly reduce the problems these people have (and as for the collateral damage...)
Colin Pickard
A: 

You cannot prevent phishing per-se but you can take several steps each of which do a little bit to mitigate the problem.

1) If you have something like site-key or a sign-in seal, please ensure that these cannot be iframed on a malicious website. Just javascript framebusting may not be enough as IE has security="restricted".

2) Be very consistent about how you ask for user credentials - serve the login form over SSL (not just post-back over SSL). Do not ask for login on several places or sites. Encourage third parties who want to work with user data stored on your site to use OAuth (instead of taking your user's password).

3) You should never ask for information via email (with or without link).

4) Have a security page where you talk about these issues.

5) Send notification on changes to registered phone, email, etc.

Apart from above, monitor user account activity - such as changes to contact information, security Q&A, access, etc (noting time, ip, and there are several subtle techniques).

mar