Redacting URLs as an email-phishing preventative?XKCD #936: Short complex password, or long dictionary passphrase?Report an email address being used by a phisherLegit zix email vs phishingIs this a phishing email?Strange phishing emailAn authentication protocol to prevent phishing & solve the problem of password reuse?Bogus Instagram account using my email, never been verified, has over 1000 followersEmail phishing, understand mail header
Why are superuser permissions needed to acess /data partition?
Why has no one requested the tape of the Trump/Ukraine call?
Ethics: Is it ethical for a professor to conduct research using a student's ideas without giving them credit?
Fitting data in polar coordinates
Does a resurrected wizard remember their prepared spells?
How to play proper time when other instrument is playing out of time?
Days in indexed month
What is an example of a sequence which "thins out" and is finite?
What does this docker log entry mean?
How to exit read-only mode
What is the "Data Language" paper referenced in RFC 309?
Can a website incur liability for linking to a funding campaign for a lawsuit against it?
Arabia and the Middle Ages
Was it possible for a message from Paris to reach London within 48 hours in 1782?
What kind of planet could have giant sand worms?
What should I tell a customer when my co-worker fails to show up to a meeting?
What events still occur within a transaction that gets rolled back?
Sort and Table a Sentence by Word Lengths
Can the treble clef be used instead of the bass clef in piano music?
Why is the core ChaCha primitive not good for use in a collision-resistant compression function (crypto hash)?
Why was ambassador Sondland involved in Ukraine?
How can I check password strength client-side?
When to use Sitecore.Context.Items and why?
If you discard Immortal Phoenix, does it return to your hand?
Redacting URLs as an email-phishing preventative?
XKCD #936: Short complex password, or long dictionary passphrase?Report an email address being used by a phisherLegit zix email vs phishingIs this a phishing email?Strange phishing emailAn authentication protocol to prevent phishing & solve the problem of password reuse?Bogus Instagram account using my email, never been verified, has over 1000 followersEmail phishing, understand mail header
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;
In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:
Click here to see our new report on property taxes:
[URL removed]
If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)
While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.
I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.
(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)
email phishing
|
show 5 more comments
In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:
Click here to see our new report on property taxes:
[URL removed]
If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)
While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.
I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.
(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)
email phishing
32
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
10
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
10
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
9
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
5
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53
|
show 5 more comments
In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:
Click here to see our new report on property taxes:
[URL removed]
If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)
While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.
I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.
(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)
email phishing
In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but eliminating them entirely. For example, something like this:
Click here to see our new report on property taxes:
[URL removed]
If there really is a new report, and if the city staffer really wants to see it, he or she can go to the website and track down the report. If the user goes to the website through a password manager or a bookmark, there's no way the bogus site will be reached instead of the real site. (A phishing attack involving a site that the user is unfamiliar with, and therefore has no login for, wouldn't be a phishing attack.)
While not all phishing attacks involve URLs in emails, my guess is that 99% of them probably do.
I'd appreciate some comments on whether you think this would be effective in reducing phishing attacks. I'm less interested in whether the absence of URLs presents an inconvenience, as I know it does.
(Forcing the email client to operate in text mode only removes the linkage; the URL is still there.)
email phishing
email phishing
edited Aug 27 at 16:40
David K
1,2972 gold badges4 silver badges8 bronze badges
1,2972 gold badges4 silver badges8 bronze badges
asked Aug 24 at 20:56
Marc RochkindMarc Rochkind
3272 silver badges3 bronze badges
3272 silver badges3 bronze badges
32
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
10
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
10
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
9
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
5
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53
|
show 5 more comments
32
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
10
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
10
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
9
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
5
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53
32
32
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
10
10
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
10
10
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
9
9
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
5
5
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53
|
show 5 more comments
4 Answers
4
active
oldest
votes
First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- Go to security SE question 215871
- bitly 2ZoZiTS
- Link sent to your personal mail
- Please call to 555-0123 so I can give you the actual url
- Search "Redacting URLs as an email-phishing preventative?" in Google
- See last active question
- hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo
- Url sent in an attachment
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
- Send them through a url shortener. The user will have no idea where it is getting sent
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually findbitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)
– Ángel
Aug 25 at 18:36
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
|
show 5 more comments
This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.
16
Great answer. Type inwww (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.
– MechMK1
Aug 24 at 21:40
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
|
show 9 more comments
In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.
Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.
add a comment
|
(Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)
At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.
You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.
As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.
add a comment
|
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "162"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215871%2fredacting-urls-as-an-email-phishing-preventative%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
4 Answers
4
active
oldest
votes
4 Answers
4
active
oldest
votes
active
oldest
votes
active
oldest
votes
First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- Go to security SE question 215871
- bitly 2ZoZiTS
- Link sent to your personal mail
- Please call to 555-0123 so I can give you the actual url
- Search "Redacting URLs as an email-phishing preventative?" in Google
- See last active question
- hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo
- Url sent in an attachment
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
- Send them through a url shortener. The user will have no idea where it is getting sent
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually findbitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)
– Ángel
Aug 25 at 18:36
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
|
show 5 more comments
First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- Go to security SE question 215871
- bitly 2ZoZiTS
- Link sent to your personal mail
- Please call to 555-0123 so I can give you the actual url
- Search "Redacting URLs as an email-phishing preventative?" in Google
- See last active question
- hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo
- Url sent in an attachment
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
- Send them through a url shortener. The user will have no idea where it is getting sent
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually findbitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)
– Ángel
Aug 25 at 18:36
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
|
show 5 more comments
First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- Go to security SE question 215871
- bitly 2ZoZiTS
- Link sent to your personal mail
- Please call to 555-0123 so I can give you the actual url
- Search "Redacting URLs as an email-phishing preventative?" in Google
- See last active question
- hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo
- Url sent in an attachment
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
- Send them through a url shortener. The user will have no idea where it is getting sent
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.
First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
- Go to security SE question 215871
- bitly 2ZoZiTS
- Link sent to your personal mail
- Please call to 555-0123 so I can give you the actual url
- Search "Redacting URLs as an email-phishing preventative?" in Google
- See last active question
- hotel tango tango papa sierra colon double slash sierra echo charlie uniform romeo india tango yankee dot sierra tango alpha charlie kilo echo xray charlie hotel alpha november golf echo dot charlie oscar mike slash quebec uniform echo sierra tango india oscar november sierra slash two one five eight seven one slash romeo echo delta alpha charlie tango india november golf dash uniform romeo lima sierra dash alpha sierra dash alpha november dash echo mike alpha india lima dash papa hotel india sierra hotel india november golf dash papa romeo echo victor echo november tango alpha tango india victor echo
- Url sent in an attachment
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
- Send them through a url shortener. The user will have no idea where it is getting sent
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.
edited Aug 26 at 9:04
A. Hersean
5,8373 gold badges14 silver badges27 bronze badges
5,8373 gold badges14 silver badges27 bronze badges
answered Aug 25 at 1:19
ÁngelÁngel
13.3k3 gold badges20 silver badges47 bronze badges
13.3k3 gold badges20 silver badges47 bronze badges
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually findbitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)
– Ángel
Aug 25 at 18:36
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
|
show 5 more comments
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually findbitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)
– Ángel
Aug 25 at 18:36
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
5
5
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
In the line of proxies, I would note that it is not uncommon for companies to proxy all web traffic, not only e-mail links. For example, my previous work-place would prevent accessing certain categories of websites: hacking, gambling, etc... Combined with a root certificate installed on all company-provided computers, they would be able to display a webpage mentioning why the website was blocked and the procedure to ask for either a complete lift of the block or for an exemption for a particular user or group of users. Doing so means that there is no need to change links in e-mails.
– Matthieu M.
Aug 25 at 12:16
1
1
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
(1) you don't need any question text for SX; [scheme:]security.stackexchange.com/q/215871 is enough. Or security.stackexchange.com/q/215871/free-super-sexy-cat-videos! to reach/motivate a different audience. (2) and for signed emails or attachments, after redaction users won't even be able to open them because of Big Scary Warning "this message/data apparently forged -- do not believe it or act on it"
– dave_thompson_085
Aug 25 at 15:36
24
24
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find
bitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)– Ángel
Aug 25 at 18:36
hehe. The point is that the OP would be making the emails have no links, so his users would get creative. I actually find
bitly 2ZoZiTS
to be one of the more usable options I gave, and find likely it would get get adopted in such office. (PS: did you read the first line of my answer?)– Ángel
Aug 25 at 18:36
1
1
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
Sorry @Joelty. It should have said "suit", not "suir". I was referring to a phishing that was designed for the people which are in that environment. By Kerckhoffs's principle, assume that an attacker knows perfectly how you are stripping the urls and what methods are employees using instead, as well as if he was an employee himself (note it would probably not be hard to get someone from this large organization to rant about what you were doing).
– Ángel
Aug 26 at 22:40
1
1
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
@Joelty excluding emails originated inside the organization from this stripping would remove such annoyance from 80-90% of the mail volume. Still, there will be communications with clients, providers, etc. A phishing email does not try to pose as an internal mail, so while being a less drastic measure, I'm not convinced it would still be appropriate.
– Ángel
Aug 26 at 22:45
|
show 5 more comments
This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.
16
Great answer. Type inwww (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.
– MechMK1
Aug 24 at 21:40
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
|
show 9 more comments
This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.
16
Great answer. Type inwww (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.
– MechMK1
Aug 24 at 21:40
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
|
show 9 more comments
This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.
This isn't a good idea. First of all, "somewhat inconvenient" is a huge understatement. Also, AviD's rule of usability applies here: instead of URLs that computers understand, you'll have instructions on how to type in a URL, which will foil the ability of email scanners to detect that the URL goes to a phishing site.
answered Aug 24 at 21:32
Joseph SibleJoseph Sible
4,4961 gold badge13 silver badges25 bronze badges
4,4961 gold badge13 silver badges25 bronze badges
16
Great answer. Type inwww (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.
– MechMK1
Aug 24 at 21:40
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
|
show 9 more comments
16
Great answer. Type inwww (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.
– MechMK1
Aug 24 at 21:40
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
16
16
Great answer. Type in
www (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.– MechMK1
Aug 24 at 21:40
Great answer. Type in
www (dot) evilattacker (dot) com / malware (dot) exe
to see my full comment.– MechMK1
Aug 24 at 21:40
2
2
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
@Joseph Sible: Don't agree. Any instructions on how to form a URL eventually need an actual URL to be entered into a browser's address bar, after being worked over by the user, where security software (the equivalent of the email scanner you mention) can operate. What I'm trying to avoid is mindless clicking.
– Marc Rochkind
Aug 24 at 22:27
11
11
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
@MarcRochkind You don't see the big picture. Your scheme may prevent trash-level spam like "Hello this is microsft pls send cc info or ur Pc will be closed thank u", but any kind of targeted attack will still bounce off. In all likelihood, users will probably find some workaround on how to excange links, because that's what users are best at. But I feel like all the industry wisdom in the world can't convince you that your approach is flawed, so I might as well not bother.
– MechMK1
Aug 25 at 12:10
4
4
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
@MarcRochkind Your comment about the laptop is interesting. On its face, it would seem like a laptop with a password is at least as secure as one without, since the worst the user can do is write the password on a sticky note stuck to the laptop. However, the user that does that probably also uses the same password for multiple sites, so that user would be better off without the password on their laptop (or, you know, with training and administrative controls about insecure password storage and reuse).
– IllusiveBrian
Aug 25 at 22:37
3
3
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
@MarcRochkind Except... with your scheme, that user will never be able to change their password, since you'll be filtering out those reset links. Additionally, most or all solutions you'll come up with to filter out the URLs will fail to filter out a url which looks like a normal URL but has extra (non-displaying) html in the middle (which will show up to the user as a copy-paste-able url, but isn't a link because of the extra html shoved in there).
– Delioth
Aug 26 at 20:09
|
show 9 more comments
In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.
Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.
add a comment
|
In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.
Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.
add a comment
|
In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.
Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.
In addition to humans being able to describe URLs in English to work around the filter, this would break all sorts of automated e-mail verification, account check, and password reset systems that rely on you being able to receive a URL sent by e-mail in order to verify ownership of the address. Some of these systems provide a code that can be copy-pasted into a form, but many provide only a URL.
Your users under this system would not be able to open new accounts at a variety of web sites, and might be locked out of their existing accounts as soon as the service provider demands e-mail verification for e.g. logging in on a new device.
answered Aug 26 at 20:34
interfectinterfect
2851 silver badge4 bronze badges
2851 silver badge4 bronze badges
add a comment
|
add a comment
|
(Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)
At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.
You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.
As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.
add a comment
|
(Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)
At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.
You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.
As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.
add a comment
|
(Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)
At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.
You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.
As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.
(Disclaimer: I work on one of the top email security solutions. This post is intended to be vendor-neutral.)
At least the leading two enterprise-grade email security gateways offer the ability to rewrite URLs through an extra layer of security run at the time a user clicks the link. This is a safer approach than completely redacting the link. These solutions incorporate extra security checks as well as reporting for remediation in the event that one of the clicked links ends up being malicious, allowing your infosec team to perform damage control.
You could implement a poor-man's version of this by setting up your own URL Shortening service, rewriting links from suspected phish (or everything, though that may annoy your users) and checking the mapping against URI DNSBLs either during the redirection or else periodically with a cron job.
As Ángel's answer states, rewrites only work for URIs your system can recognize. This will never be comprehensive, but hopefully it's a very close match to what your users' mail clients will render as clickable links.
answered Aug 28 at 19:19
Adam KatzAdam Katz
4,4241 gold badge13 silver badges28 bronze badges
4,4241 gold badge13 silver badges28 bronze badges
add a comment
|
add a comment
|
Thanks for contributing an answer to Information Security Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215871%2fredacting-urls-as-an-email-phishing-preventative%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
32
Removing all URLs impacts usability greatly and still doesn't prevent phishing entirely. The reason why relying on human behaviour instead of technology is considered best practice is because it has had the best results so far. My suggestion to you is to invest in good phishing training, rather than chasing a magical silver bullet.
– MechMK1
Aug 24 at 21:38
10
I think there is much evidence that "phishing training" has been a huge failure. We need to continue to research technical solutions.
– Marc Rochkind
Aug 24 at 22:29
10
Do you have any evidence for that claim that it was a "huge failure"? Because all the data I have is the "before/after" analysis and in some of the best cases, it's something like a 90%/20% result.
– MechMK1
Aug 25 at 12:04
9
Really bad idea because now I cannot reset any forgotten passwords. Just do what schools do, use a proxy.
– RozzA
Aug 25 at 21:05
5
If you do not care about features or usability but only preventing phishing at any cost why not redact the entire email? Or just not give people email at all, that would be even more secure, at an additional inconvenience.
– Vality
Aug 26 at 18:53