Phishing is [still] the primary way attackers either commit a primary criminal act (i.e. phish a target to, say, install ransomware) or is the initial vehicle used to gain a foothold in an organization so they can perform other criminal operations to achieve some goal. As such, security teams, vendors and active members of the cybersecurity community work diligently to neutralize phishing campaigns as quickly as possible.
One popular community tool/resource in this pursuit is PhishTank which is a collaborative clearing house for data and information about phishing on the Internet. Also, PhishTank provides an open API for developers and researchers to integrate anti-phishing data into their applications at no charge.
While the PhishTank API is useful for real-time anti-phishing operations the data is also useful for security researchers as we work to understand the ebb, flow and evolution of these attacks. One avenue of research is to track the various features associated with phishing campaigns which include (amongst many other elements) network (internet) location of the phishing site, industry being targeted, domain names being used, what type of sites are being cloned/copied and a feature we’ll be looking at in this post: what percentage of new phishing sites use SSL encryption and — of these — which type of SSL certificates are “en vogue”.
Phishing sites are increasingly using and relying on SSL certificates because we in the information security industry spent a decade instructing the general internet surfing population to trust sites with the green lock icon near the location bar. Initially, phishers worked to compromise existing, encryption-enabled web properties to install phishing sites/pages since they could leech off of the “trusted” status of the associated SSL certificates. However, the advent of services like Let’s Encrypt have made it possible for attacker to setup their own phishing domains that look legitimate to current-generation internet browsers and prey upon the decade’s old “trust the lock icon” mantra that most internet users still believe. We’ll table that path of discussion (since it’s fraught with peril if you don’t support the internet-do-gooder-consequences-be-darned cabal’s personal agendas) and just focus on how to work with PhishTank data in R and take a look at the most prevalent SSL certs used in the past week (you can extend the provided example to go back as far as you like provided the phishing sites are still online).
Accessing PhishTank From R
You can use the aquarium
package [GL|GH] to gain access to the data provided by PhishTank’s API (you need to sign up for access and put you API key into the PHISHTANK_API_KEY
environment variable which is best done via your ~/.Renviron
file).
Let’s setup all the packages we’ll need and cache a current copy of the PhishTank data. The package forces you to utilize your own caching strategy since it doesn’t make sense for it to decide that for you. I’d suggest either using the time-stamped approach below or using some type of database system (or, say, Apache Drill) to actually manage the data.
Here are the packages we’ll need:
library(psl) # git[la|hu]b/hrbrmstr/psl
library(curlparse) # git[la|hu]b/hrbrmstr/curlparse
library(aquarium) # git[la|hu]b/hrbrmstr/aquarium
library(gt) # github/rstudio/gt
library(furrr)
library(stringi)
library(openssl)
library(tidyverse)
NOTE: The psl
and curlparse
packages are optional. Windows users will find it difficult to get them working and it may be easier to review the functions provided by the urlparse
package and substitute equivalents for the domain()
and apex_domain()
functions used below. Now, we get a copy of the current PhishTank dataset & cache it:
if (!file.exists("~/Data/2018-12-23-fishtank.rds")) {
xdf <- pt_read_db()
saveRDS(xdf, "~/Data/2018-12-23-fishtank.rds")
} else {
xdf <- readRDS("~/Data/2018-12-23-fishtank.rds")
}
Let’s take a look:
glimpse(xdf)
## Observations: 16,446
## Variables: 9
## $ phish_id <chr> "5884184", "5884138", "5884136", "5884135", ...
## $ url <chr> "http://internetbanking-bancointer.com.br/lo...
## $ phish_detail_url <chr> "http://www.phishtank.com/phish_detail.php?p...
## $ submission_time <dttm> 2018-12-22 20:45:09, 2018-12-22 18:40:24, 2...
## $ verified <chr> "yes", "yes", "yes", "yes", "yes", "yes", "y...
## $ verification_time <dttm> 2018-12-22 20:45:52, 2018-12-22 21:26:49, 2...
## $ online <chr> "yes", "yes", "yes", "yes", "yes", "yes", "y...
## $ details <list> [<209.132.252.7, 209.132.252.0/24, 7296 468...
## $ target <chr> "Other", "Other", "Other", "PayPal", "Other"...
The data is really straightforward. We have unique ids for each site/campaign the URL of the site along with a URL to extra descriptive info PhishTank has on the site/campaign. We also know when the site was submitted/discovered and other details, such as the network/internet space the site is in:
glimpse(xdf$details[1])
## List of 1
## $ :'data.frame': 1 obs. of 6 variables:
## ..$ ip_address : chr "209.132.252.7"
## ..$ cidr_block : chr "209.132.252.0/24"
## ..$ announcing_network: chr "7296 468"
## ..$ rir : chr "arin"
## ..$ country : chr "US"
## ..$ detail_time : chr "2018-12-23T01:46:16+00:00"
We’re going to focus on recent phishing sites (in this case, ones that are less than a week old) and those that use SSL certificates:
filter(xdf, verified == "yes") %>%
filter(online == "yes") %>%
mutate(diff = as.numeric(difftime(Sys.Date(), verification_time), "days")) %>%
filter(diff <= 7) %>%
{ all_ct <<- nrow(.) ; . } %>%
filter(grepl("^https", url)) %>%
{ ssl_ct <<- nrow(.) ; . } %>%
mutate(
domain = domain(url),
apex = apex_domain(domain)
) -> recent
Let’s ee how many are using SSL:
(ssl_ct)
## [1] 383
(pct_ssl <- ssl_ct / all_ct)
## [1] 0.2919207
This percentage is lower than a recent “50% of all phishing sites use encryption” statistic going around of late. There are many reasons for the difference:
- PhishTank doesn’t have all phishing sites in it
- We just looked at a week of examples
- Some sites were offline at the time of access attempt
- Diverse attacker groups with varying degrees of competence engage in phishing attacks
Despite the 20% deviation, 30% is still a decent percentage, and a green, “everything’s ??” icon is a still a valued prize so we shall pursue our investigation.
Now we need to retrieve all those certs. This can be a slow operation that so we’ll grab them in parallel. It’s also quite possible the “online”status above data frame glimpse is inaccurate (sites can go offline quickly) so we’ll catch certificate request failures with safely()
and cache the results:
cert_dl <- purrr::safely(openssl::download_ssl_cert)
plan(multiprocess)
if (!file.exists("~/Data/recent.rds")) {
recent <- mutate(recent, cert = future_map(domain, cert_dl))
saveRDS(recent, "~/Data/recent.rds")
} else {
recent <- readRDS("~/Data/recent.rds")
}
Let see how many request failures we had:
(failed <- sum(map_lgl(recent$cert, ~is.null(.x$result))))
## [1] 25
(failed / nrow(recent))
## [1] 0.06527415
As noted in the introduction to the blog, when attackers want to use SSL for the lock icon ruse they can either try to piggyback off of legitimate domains or rely on Let’s Encrypt to help them commit crimes. Let’s see what the top p”apex” domains](https://help.github.com/articles/about-supported-custom-domains/#apex-domains) were in use in the past week:
count(recent, apex, sort = TRUE)
## # A tibble: 255 x 2
## apex n
## <chr> <int>
## 1 000webhostapp.com 42
## 2 google.com 17
## 3 umbler.net 8
## 4 sharepoint.com 6
## 5 com-fl.cz 5
## 6 lbcpzonasegurabeta-viabcp.com 4
## 7 windows.net 4
## 8 ashaaudio.net 3
## 9 brijprints.com 3
## 10 portaleisp.com 3
## # ... with 245 more rows
We can see that a large hosting provider (000webhostapp.com
) bore a decent number of these sites, but Google Sites (which is what the full domain represented by the google.com
apex domain here is usually pointing to) Microsoft SharePoint (sharepoint.com
) and Microsoft forums (windows.net
) are in active use as well (which is smart give the pervasive trust associated with those properties). There are 241 distinct apex domains in this 1-week set so what is the SSL cert diversity across these pages/campaigns?
We ultimately used openssl::download_ssl_cert
to retrieve the SSL certs of each site that was online, so let’s get the issuer and intermediary certs from them and look at the prevalence of each. We’ll extract the fields from the issuer
component returned by openssl::download_ssl_cert
then just do some basic maths:
filter(recent, map_lgl(cert, ~!is.null(.x$result))) %>%
mutate(issuers = map(cert, ~map_chr(.x$result, ~.x$issuer))) %>%
mutate(
inter = map_chr(issuers, ~.x[1]), # the order is not guaranteed here but the goal of the exercise is
root = map_chr(issuers, ~.x[2]) # to get you working with the data vs build a 100% complete solution
) %>%
mutate(
inter = stri_replace_all_regex(inter, ",([[:alpha:]])+=", ";;;$1=") %>%
stri_split_fixed(";;;") %>% # there are parswers for the cert info fields but this hack is quick and works
map(stri_split_fixed, "=", 2, simplify = TRUE) %>%
map(~setNames(as.list(.x[,2]), .x[,1])) %>%
map(bind_cols),
root = stri_replace_all_regex(root, ",([[:alpha:]])+=", ";;;$1=") %>%
stri_split_fixed(";;;") %>%
map(stri_split_fixed, "=", 2, simplify = TRUE) %>%
map(~setNames(as.list(.x[,2]), .x[,1])) %>%
map(bind_cols)
) -> recent
Let’s take a look at roots:
unnest(recent, root) %>%
distinct(phish_id, apex, CN) %>%
count(CN, sort = TRUE) %>%
mutate(pct = n/sum(n)) %>%
gt::gt() %>%
gt::fmt_number("n", decimals = 0) %>%
gt::fmt_percent("pct")
CN |
n |
pct |
DST Root CA X3 |
96 |
26.82% |
COMODO RSA Certification Authority |
93 |
25.98% |
DigiCert Global Root G2 |
45 |
12.57% |
Baltimore CyberTrust Root |
30 |
8.38% |
GlobalSign |
27 |
7.54% |
DigiCert Global Root CA |
15 |
4.19% |
Go Daddy Root Certificate Authority – G2 |
14 |
3.91% |
COMODO ECC Certification Authority |
11 |
3.07% |
Actalis Authentication Root CA |
9 |
2.51% |
GlobalSign Root CA |
4 |
1.12% |
Amazon Root CA 1 |
3 |
0.84% |
Let’s Encrypt Authority X3 |
3 |
0.84% |
AddTrust External CA Root |
2 |
0.56% |
DigiCert High Assurance EV Root CA |
2 |
0.56% |
USERTrust RSA Certification Authority |
2 |
0.56% |
GeoTrust Global CA |
1 |
0.28% |
SecureTrust CA |
1 |
0.28% |
DST Root CA X3
is (wait for it) Let’s Encrypt! Now, Comodo is not far behind and indeed surpasses LE if we combine the extra-special “enhanced” versions they provide and it’s important for you to read the comments near the lines of code making assumptions about order of returned issuer information above. Now, let’s take a look at intermediaries:
unnest(recent, inter) %>%
distinct(phish_id, apex, CN) %>%
count(CN, sort = TRUE) %>%
mutate(pct = n/sum(n)) %>%
gt::gt() %>%
gt::fmt_number("n", decimals = 0) %>%
gt::fmt_percent("pct")
CN |
n |
pct |
Let’s Encrypt Authority X3 |
99 |
27.65% |
cPanel\, Inc. Certification Authority |
75 |
20.95% |
RapidSSL TLS RSA CA G1 |
45 |
12.57% |
Google Internet Authority G3 |
24 |
6.70% |
COMODO RSA Domain Validation Secure Server CA |
20 |
5.59% |
CloudFlare Inc ECC CA-2 |
18 |
5.03% |
Go Daddy Secure Certificate Authority – G2 |
14 |
3.91% |
COMODO ECC Domain Validation Secure Server CA 2 |
11 |
3.07% |
Actalis Domain Validation Server CA G1 |
9 |
2.51% |
RapidSSL RSA CA 2018 |
9 |
2.51% |
Microsoft IT TLS CA 1 |
6 |
1.68% |
Microsoft IT TLS CA 5 |
6 |
1.68% |
DigiCert SHA2 Secure Server CA |
5 |
1.40% |
Amazon |
3 |
0.84% |
GlobalSign CloudSSL CA – SHA256 – G3 |
2 |
0.56% |
GTS CA 1O1 |
2 |
0.56% |
AlphaSSL CA – SHA256 – G2 |
1 |
0.28% |
DigiCert SHA2 Extended Validation Server CA |
1 |
0.28% |
DigiCert SHA2 High Assurance Server CA |
1 |
0.28% |
Don Dominio / MrDomain RSA DV CA |
1 |
0.28% |
GlobalSign Extended Validation CA – SHA256 – G3 |
1 |
0.28% |
GlobalSign Organization Validation CA – SHA256 – G2 |
1 |
0.28% |
RapidSSL SHA256 CA |
1 |
0.28% |
TrustAsia TLS RSA CA |
1 |
0.28% |
USERTrust RSA Domain Validation Secure Server CA |
1 |
0.28% |
NA |
1 |
0.28% |
LE is number one again! But, it’s important to note that these issuer CommonName
s can roll up into a single issuing organization given just how messed up integrity and encryption capability is when it comes to web site certs, so the raw results could do with a bit of post-processing for a more complete picture (an exercise left to intrepid readers).
FIN
There are tons of avenues to explore with this data, so I hope this post whet your collective appetites sufficiently for you to dig into it, especially if you have some dowm-time coming.
Let me also take this opportunity to resissue guidance I and many others have uttered this holiday season: be super careful about what you click on, which sites you even just visit, and just how much you really trust the site, provider and entity behind the form about to enter your personal information and credit card info into.
GDPR Unintended Consequences Part 1 — Increasing WordPress Blog Exposure
I pen this mini-tome on “GDPR Enforcement Day”. The spirit of GDPR is great, but it’s just going to be another Potempkin Village in most organizations much like PCI or SOX. For now, the only thing GDPR has done is made GDPR consulting companies rich, increased the use of javascript on web sites so they can pop-up useless banners we keep telling users not to click on and increase the size of email messages to include mandatory postscripts (that should really be at the beginning of the message, but, hey, faux privacy is faux privacy).
Those are just a few of the “unintended consequences” of GDPR. Just like Let’s Encrypt & “HTTPS Everywhere” turned into “Let’s Enable Criminals and Hurt Real People With Successful Phishing Attacks”, GDPR is going to cause a great deal of downstream issues that either the designers never thought of or decided — in their infinite, superior wisdom — were completely acceptable to make themselves feel better.
Today’s installment of “GDPR Unintended Consequences” is WordPress.
WordPress “powers” a substantial part of the internet. As such, it is a perma-target of attackers.
Since the GDPR Intelligentsia provided a far-too-long lead-time on both the inaugural and mandated enforcement dates for GDPR and also created far more confusion with the regulations than clarity, WordPress owners are flocking to “single button install” solutions to make them magically GDPR compliant (
#protip
that’s not “a thing”). Here’s a short list of plugins and active installation counts (no links since I’m not going to encourage attack surface expansion):I’m somewhat confident that a fraction of those publishers follow secure coding guidelines (it may be a small fraction). But, if I was an attacker, I’d be poking pretty hard at a few of those with six-figure installs to see if I could find a usable exploit.
GDPR just gave attackers a huge footprint of homogeneous resources to attempt at-scale exploits. They will very likely succeed (over-and-over-and-over again). This means that GDPR just increased the likelihood of losing your data privacy…the complete opposite of the intent of the regulation.
There are more unintended consequences and I’ll pepper the blog with them as the year and pain progresses.