Attack Spectrum and Countermeasures
Attack Spectrum and Countermeasures
Countermeasures
K. Vignesh Viswanathan - 106116046
Introduction
● The diversity of available OSN platforms opens doors for a variety of attacks
on privacy of the users, integrity of their profiles, and the availability of the
user-provided contents.
● Technical realization behind an attack may strongly depend on the
functionality and in particular on the use of different protection mechanisms
within the OSN platform. Therefore, not every attack technique will have the
same impact when used against different OSN platforms.
● Since OSN providers typically have full control over the network resources,
no meaningful protection appears possible if the attacks are mounted by the
provider itself.
Plain Impersonation
● A special type of impersonation attack that occurs within the same OSN
platform.
● The goal of the adversary here is to create a profile for some user that is
already in possession of some valid profile in the same network.
● Adversary can create confusion through impersonation of other registered
users and possibly gain access to the private information communicated to
that users.
● Tools like iCloner used.
● Deploy mechanisms that are able to detect similarities between different
profiles, in particular with regard to the personal information that is visible to
the OSN users.
Example of Profile Cloning
1) CEO Fraud
● It is a scam in which cybercriminals spoof company email accounts and
impersonate executives to try and fool an employee in accounting or HR into
executing unauthorized wire transfers, or sending out confidential tax
information.
● The scam has resulted in siphoning of 26 billion dollars.
Profile Hijacking
● The goal of the adversary mounting a profile hijacking attack is to obtain
control over some existing profile within an OSN platform.
● Profile hijacking is successful if the adversary can obtain passwords of
other users.
● OSN providers typically deploy protection against such attacks by restricting
the number of login attempts or by using techniques that require human
interaction such as CAPTCHAs.
● Tools like an iCloner can bypass CAPTCHAs. Adversaries can also use
phishing or obtain password for other online services.
● The OSN functionality can be misused to distribute messages aiming to lure
users to fake login websites.
● Password access can be changed by OSN provider.
Examples
● Type of impersonation where some profile that exists within one OSN
platform is cloned into another OSN platform.
● This attack can be realized via registration of a profile using some new email
address.
● The significance of porting is that users may be completely unaware that
their profiles have been ported.
● Thwarting isn’t easy. Profile similarity tools that work across platforms need
to be used.
ID Theft