Redacting URLs as an email-phishing preventative?XKCD #936: Short complex password, or long dictionary passphrase?Report an email address being used by a phisherLegit zix email vs phishingIs this a phishing email?Strange phishing emailAn authentication protocol to prevent phishing & solve the problem of password reuse?Bogus Instagram account using my email, never been verified, has over 1000 followersEmail phishing, understand mail header

Why are superuser permissions needed to acess /data partition?

Why has no one requested the tape of the Trump/Ukraine call?

Ethics: Is it ethical for a professor to conduct research using a student's ideas without giving them credit?

Fitting data in polar coordinates

Does a resurrected wizard remember their prepared spells?

How to play proper time when other instrument is playing out of time?

Days in indexed month

What is an example of a sequence which "thins out" and is finite?

What does this docker log entry mean?

How to exit read-only mode

What is the "Data Language" paper referenced in RFC 309?

Can a website incur liability for linking to a funding campaign for a lawsuit against it?

Arabia and the Middle Ages

Was it possible for a message from Paris to reach London within 48 hours in 1782?

What kind of planet could have giant sand worms?

What should I tell a customer when my co-worker fails to show up to a meeting?

What events still occur within a transaction that gets rolled back?

Sort and Table a Sentence by Word Lengths

Can the treble clef be used instead of the bass clef in piano music?

Why is the core ChaCha primitive not good for use in a collision-resistant compression function (crypto hash)?

Why was ambassador Sondland involved in Ukraine?

How can I check password strength client-side?

When to use Sitecore.Context.Items and why?

If you discard Immortal Phoenix, does it return to your hand?



Redacting URLs as an email-phishing preventative?


XKCD #936: Short complex password, or long dictionary passphrase?Report an email address being used by a phisherLegit zix email vs phishingIs this a phishing email?Strange phishing emailAn authentication protocol to prevent phishing & solve the problem of password reuse?Bogus Instagram account using my email, never been verified, has over 1000 followersEmail phishing, understand mail header






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;









21


















In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:




Click here to see our new report on property taxes:



[URL removed]




If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)



While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.



I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.



(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)










share|improve this question






















  • 32





    Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

    – MechMK1
    Aug 24 at 21:38






  • 10





    I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

    – Marc Rochkind
    Aug 24 at 22:29






  • 10





    Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

    – MechMK1
    Aug 25 at 12:04






  • 9





    Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

    – RozzA
    Aug 25 at 21:05






  • 5





    If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

    – Vality
    Aug 26 at 18:53

















21


















In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:




Click here to see our new report on property taxes:



[URL removed]




If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)



While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.



I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.



(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)










share|improve this question






















  • 32





    Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

    – MechMK1
    Aug 24 at 21:38






  • 10





    I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

    – Marc Rochkind
    Aug 24 at 22:29






  • 10





    Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

    – MechMK1
    Aug 25 at 12:04






  • 9





    Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

    – RozzA
    Aug 25 at 21:05






  • 5





    If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

    – Vality
    Aug 26 at 18:53













21













21









21


2






In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:




Click here to see our new report on property taxes:



[URL removed]




If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)



While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.



I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.



(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)










share|improve this question
















In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:




Click here to see our new report on property taxes:



[URL removed]




If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)



While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.



I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.



(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)







email phishing






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Aug 27 at 16:40









David K

1,2972 gold badges4 silver badges8 bronze badges




1,2972 gold badges4 silver badges8 bronze badges










asked Aug 24 at 20:56









Marc RochkindMarc Rochkind

3272 silver badges3 bronze badges




3272 silver badges3 bronze badges










  • 32





    Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

    – MechMK1
    Aug 24 at 21:38






  • 10





    I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

    – Marc Rochkind
    Aug 24 at 22:29






  • 10





    Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

    – MechMK1
    Aug 25 at 12:04






  • 9





    Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

    – RozzA
    Aug 25 at 21:05






  • 5





    If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

    – Vality
    Aug 26 at 18:53












  • 32





    Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

    – MechMK1
    Aug 24 at 21:38






  • 10





    I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

    – Marc Rochkind
    Aug 24 at 22:29






  • 10





    Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

    – MechMK1
    Aug 25 at 12:04






  • 9





    Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

    – RozzA
    Aug 25 at 21:05






  • 5





    If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

    – Vality
    Aug 26 at 18:53







32




32





Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

– MechMK1
Aug 24 at 21:38





Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.

– MechMK1
Aug 24 at 21:38




10




10





I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

– Marc Rochkind
Aug 24 at 22:29





I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.

– Marc Rochkind
Aug 24 at 22:29




10




10





Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

– MechMK1
Aug 25 at 12:04





Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.

– MechMK1
Aug 25 at 12:04




9




9





Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

– RozzA
Aug 25 at 21:05





Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.

– RozzA
Aug 25 at 21:05




5




5





If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

– Vality
Aug 26 at 18:53





If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.

– Vality
Aug 26 at 18:53










4 Answers
4






active

oldest

votes


















59



















First of all, it would be a usability nightmare.



Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.



The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:



  • security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

  • https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

  • Go to security SE question 215871

  • bitly 2ZoZiTS

  • Link sent to your personal mail

  • Please call to 555-0123 so I can give you the actual url

  • Search "Redacting URLs as an email-phishing preventative?" in Google

  • See last active question

  • hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo

  • Url sent in an attachment

Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.



Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.



Also things like recovery links for forgotten passwords would not work at all for your users, either.



But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.



(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)



Some examples:



  • Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.

  • If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.

  • Send them through a url shortener. The user will have no idea where it is getting sent

  • The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.

A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.






share|improve this answer























  • 5





    In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

    – Matthieu M.
    Aug 25 at 12:16







  • 1





    (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

    – dave_thompson_085
    Aug 25 at 15:36







  • 24





    hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

    – Ángel
    Aug 25 at 18:36






  • 1





    Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

    – Ángel
    Aug 26 at 22:40






  • 1





    @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

    – Ángel
    Aug 26 at 22:45


















24



















This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.






share|improve this answer





















  • 16





    Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

    – MechMK1
    Aug 24 at 21:40






  • 2





    @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

    – Marc Rochkind
    Aug 24 at 22:27






  • 11





    @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

    – MechMK1
    Aug 25 at 12:10






  • 4





    @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

    – IllusiveBrian
    Aug 25 at 22:37






  • 3





    @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

    – Delioth
    Aug 26 at 20:09


















7



















In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.



Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.






share|improve this answer

































    0



















    (Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)



    At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.



    You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.



    As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.






    share|improve this answer



























      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "162"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: false,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: null,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      noCode: true, onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );














      draft saved

      draft discarded
















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215871%2fredacting-urls-as-an-email-phishing-preventative%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown


























      4 Answers
      4






      active

      oldest

      votes








      4 Answers
      4






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      59



















      First of all, it would be a usability nightmare.



      Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.



      The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:



      • security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • Go to security SE question 215871

      • bitly 2ZoZiTS

      • Link sent to your personal mail

      • Please call to 555-0123 so I can give you the actual url

      • Search "Redacting URLs as an email-phishing preventative?" in Google

      • See last active question

      • hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo

      • Url sent in an attachment

      Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.



      Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.



      Also things like recovery links for forgotten passwords would not work at all for your users, either.



      But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.



      (And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)



      Some examples:



      • Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.

      • If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.

      • Send them through a url shortener. The user will have no idea where it is getting sent

      • The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.

      A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.






      share|improve this answer























      • 5





        In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

        – Matthieu M.
        Aug 25 at 12:16







      • 1





        (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

        – dave_thompson_085
        Aug 25 at 15:36







      • 24





        hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

        – Ángel
        Aug 25 at 18:36






      • 1





        Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

        – Ángel
        Aug 26 at 22:40






      • 1





        @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

        – Ángel
        Aug 26 at 22:45















      59



















      First of all, it would be a usability nightmare.



      Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.



      The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:



      • security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • Go to security SE question 215871

      • bitly 2ZoZiTS

      • Link sent to your personal mail

      • Please call to 555-0123 so I can give you the actual url

      • Search "Redacting URLs as an email-phishing preventative?" in Google

      • See last active question

      • hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo

      • Url sent in an attachment

      Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.



      Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.



      Also things like recovery links for forgotten passwords would not work at all for your users, either.



      But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.



      (And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)



      Some examples:



      • Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.

      • If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.

      • Send them through a url shortener. The user will have no idea where it is getting sent

      • The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.

      A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.






      share|improve this answer























      • 5





        In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

        – Matthieu M.
        Aug 25 at 12:16







      • 1





        (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

        – dave_thompson_085
        Aug 25 at 15:36







      • 24





        hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

        – Ángel
        Aug 25 at 18:36






      • 1





        Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

        – Ángel
        Aug 26 at 22:40






      • 1





        @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

        – Ángel
        Aug 26 at 22:45













      59















      59











      59









      First of all, it would be a usability nightmare.



      Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.



      The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:



      • security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • Go to security SE question 215871

      • bitly 2ZoZiTS

      • Link sent to your personal mail

      • Please call to 555-0123 so I can give you the actual url

      • Search "Redacting URLs as an email-phishing preventative?" in Google

      • See last active question

      • hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo

      • Url sent in an attachment

      Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.



      Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.



      Also things like recovery links for forgotten passwords would not work at all for your users, either.



      But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.



      (And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)



      Some examples:



      • Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.

      • If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.

      • Send them through a url shortener. The user will have no idea where it is getting sent

      • The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.

      A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.






      share|improve this answer
















      First of all, it would be a usability nightmare.



      Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.



      The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:



      • security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative

      • Go to security SE question 215871

      • bitly 2ZoZiTS

      • Link sent to your personal mail

      • Please call to 555-0123 so I can give you the actual url

      • Search "Redacting URLs as an email-phishing preventative?" in Google

      • See last active question

      • hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo

      • Url sent in an attachment

      Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.



      Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.



      Also things like recovery links for forgotten passwords would not work at all for your users, either.



      But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.



      (And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)



      Some examples:



      • Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.

      • If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.

      • Send them through a url shortener. The user will have no idea where it is getting sent

      • The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.

      A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.







      share|improve this answer















      share|improve this answer




      share|improve this answer








      edited Aug 26 at 9:04









      A. Hersean

      5,8373 gold badges14 silver badges27 bronze badges




      5,8373 gold badges14 silver badges27 bronze badges










      answered Aug 25 at 1:19









      ÁngelÁngel

      13.3k3 gold badges20 silver badges47 bronze badges




      13.3k3 gold badges20 silver badges47 bronze badges










      • 5





        In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

        – Matthieu M.
        Aug 25 at 12:16







      • 1





        (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

        – dave_thompson_085
        Aug 25 at 15:36







      • 24





        hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

        – Ángel
        Aug 25 at 18:36






      • 1





        Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

        – Ángel
        Aug 26 at 22:40






      • 1





        @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

        – Ángel
        Aug 26 at 22:45












      • 5





        In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

        – Matthieu M.
        Aug 25 at 12:16







      • 1





        (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

        – dave_thompson_085
        Aug 25 at 15:36







      • 24





        hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

        – Ángel
        Aug 25 at 18:36






      • 1





        Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

        – Ángel
        Aug 26 at 22:40






      • 1





        @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

        – Ángel
        Aug 26 at 22:45







      5




      5





      In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

      – Matthieu M.
      Aug 25 at 12:16






      In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.

      – Matthieu M.
      Aug 25 at 12:16





      1




      1





      (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

      – dave_thompson_085
      Aug 25 at 15:36






      (1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"

      – dave_thompson_085
      Aug 25 at 15:36





      24




      24





      hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

      – Ángel
      Aug 25 at 18:36





      hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find bitly 2ZoZiTS to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)

      – Ángel
      Aug 25 at 18:36




      1




      1





      Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

      – Ángel
      Aug 26 at 22:40





      Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).

      – Ángel
      Aug 26 at 22:40




      1




      1





      @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

      – Ángel
      Aug 26 at 22:45





      @Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.

      – Ángel
      Aug 26 at 22:45













      24



















      This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.






      share|improve this answer





















      • 16





        Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

        – MechMK1
        Aug 24 at 21:40






      • 2





        @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

        – Marc Rochkind
        Aug 24 at 22:27






      • 11





        @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

        – MechMK1
        Aug 25 at 12:10






      • 4





        @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

        – IllusiveBrian
        Aug 25 at 22:37






      • 3





        @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

        – Delioth
        Aug 26 at 20:09















      24



















      This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.






      share|improve this answer





















      • 16





        Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

        – MechMK1
        Aug 24 at 21:40






      • 2





        @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

        – Marc Rochkind
        Aug 24 at 22:27






      • 11





        @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

        – MechMK1
        Aug 25 at 12:10






      • 4





        @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

        – IllusiveBrian
        Aug 25 at 22:37






      • 3





        @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

        – Delioth
        Aug 26 at 20:09













      24















      24











      24









      This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.






      share|improve this answer














      This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.







      share|improve this answer













      share|improve this answer




      share|improve this answer










      answered Aug 24 at 21:32









      Joseph SibleJoseph Sible

      4,4961 gold badge13 silver badges25 bronze badges




      4,4961 gold badge13 silver badges25 bronze badges










      • 16





        Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

        – MechMK1
        Aug 24 at 21:40






      • 2





        @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

        – Marc Rochkind
        Aug 24 at 22:27






      • 11





        @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

        – MechMK1
        Aug 25 at 12:10






      • 4





        @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

        – IllusiveBrian
        Aug 25 at 22:37






      • 3





        @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

        – Delioth
        Aug 26 at 20:09












      • 16





        Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

        – MechMK1
        Aug 24 at 21:40






      • 2





        @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

        – Marc Rochkind
        Aug 24 at 22:27






      • 11





        @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

        – MechMK1
        Aug 25 at 12:10






      • 4





        @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

        – IllusiveBrian
        Aug 25 at 22:37






      • 3





        @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

        – Delioth
        Aug 26 at 20:09







      16




      16





      Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

      – MechMK1
      Aug 24 at 21:40





      Great answer. Type in www (dot) evilattacker (dot) com / malware (dot) exe to see my full comment.

      – MechMK1
      Aug 24 at 21:40




      2




      2





      @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

      – Marc Rochkind
      Aug 24 at 22:27





      @Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.

      – Marc Rochkind
      Aug 24 at 22:27




      11




      11





      @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

      – MechMK1
      Aug 25 at 12:10





      @MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.

      – MechMK1
      Aug 25 at 12:10




      4




      4





      @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

      – IllusiveBrian
      Aug 25 at 22:37





      @MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).

      – IllusiveBrian
      Aug 25 at 22:37




      3




      3





      @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

      – Delioth
      Aug 26 at 20:09





      @MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).

      – Delioth
      Aug 26 at 20:09











      7



















      In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.



      Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.






      share|improve this answer






























        7



















        In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.



        Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.






        share|improve this answer




























          7















          7











          7









          In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.



          Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.






          share|improve this answer














          In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.



          Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.







          share|improve this answer













          share|improve this answer




          share|improve this answer










          answered Aug 26 at 20:34









          interfectinterfect

          2851 silver badge4 bronze badges




          2851 silver badge4 bronze badges
























              0



















              (Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)



              At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.



              You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.



              As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.






              share|improve this answer






























                0



















                (Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)



                At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.



                You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.



                As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.






                share|improve this answer




























                  0















                  0











                  0









                  (Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)



                  At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.



                  You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.



                  As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.






                  share|improve this answer














                  (Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)



                  At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.



                  You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.



                  As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.







                  share|improve this answer













                  share|improve this answer




                  share|improve this answer










                  answered Aug 28 at 19:19









                  Adam KatzAdam Katz

                  4,4241 gold badge13 silver badges28 bronze badges




                  4,4241 gold badge13 silver badges28 bronze badges































                      draft saved

                      draft discarded















































                      Thanks for contributing an answer to Information Security Stack Exchange!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215871%2fredacting-urls-as-an-email-phishing-preventative%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown









                      Popular posts from this blog

                      Tamil (spriik) Luke uk diar | Nawigatjuun

                      Align equal signs while including text over equalitiesAMS align: left aligned text/math plus multicolumn alignmentMultiple alignmentsAligning equations in multiple placesNumbering and aligning an equation with multiple columnsHow to align one equation with another multline equationUsing \ in environments inside the begintabularxNumber equations and preserving alignment of equal signsHow can I align equations to the left and to the right?Double equation alignment problem within align enviromentAligned within align: Why are they right-aligned?

                      Training a classifier when some of the features are unknownWhy does Gradient Boosting regression predict negative values when there are no negative y-values in my training set?How to improve an existing (trained) classifier?What is effect when I set up some self defined predisctor variables?Why Matlab neural network classification returns decimal values on prediction dataset?Fitting and transforming text data in training, testing, and validation setsHow to quantify the performance of the classifier (multi-class SVM) using the test data?How do I control for some patients providing multiple samples in my training data?Training and Test setTraining a convolutional neural network for image denoising in MatlabShouldn't an autoencoder with #(neurons in hidden layer) = #(neurons in input layer) be “perfect”?