Brad Wardman’s research while affiliated with Arizona State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
  • Article
  • Full-text available

December 2021

·

38 Reads

·

25 Citations

IEEE Security and Privacy Magazine

Penghui Zhang

·

Adam Oest

·

Haehyun Cho

·

[...]

·

Gail-Joon Ahn

Phishing websites with advanced evasion techniques are a critical threat to Internet users because they delay detection by current antiphishing systems. We present CrawlPhish, a framework for automatically detecting and categorizing the client-side (e.g., JavaScript) evasion used by phishing websites.

Download


Figure 1: High-level stages of a typical phishing attack.
Figure 2: Golden Hour framework design.
Figure 3: Visibility of phishing websites targeting the organization in our dataset.
Figure 4: Distribution of Golden Hour web events by month.
Figure 5: Histogram of Compromised Visitor traac to phishing websites, annotated with attack stages.

+4

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and E ectiveness of Phishing Attacks at Scale

August 2020

·

688 Reads

·

143 Citations

Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on gaps in detection to reach a signi cant volume of daily victims. In this paper, we isolate and identify these detection gaps by measuring the end-to-end life cycle of large-scale phishing attacks. We develop a unique framework-Golden Hour-that allows us to passively measure victim tra c to phishing pages while proactively protecting tens of thousands of accounts in the process. Over a one year period, our network monitor recorded 4.8 million victims who visited phishing pages, excluding crawler tra c. We use these events and related data sources to dissect phishing campaigns: from the time they rst come online, to email distribution , to visitor tra c, to ecosystem detection, and nally to account compromise. We nd the average campaign from start to the last victim takes just 21 hours. At least 7.42% of visitors supply their credentials and ultimately experience a compromise and subsequent fraudulent transaction. Furthermore, a small collection of highly successful campaigns are responsible for 89.13% of victims. Based on our ndings, we outline potential opportunities to respond to these sophisticated attacks.




A Practical Analysis of the Rise in Mobile Phishing

January 2018

·

84 Reads

·

9 Citations

Phishing attacks continue to evolve in order to bypass mitigations applied within the industry. These attacks are also changing due to the attacker’s desire for a greater return on investment from their attacks against the common internet user. The digital landscape has been ever-changing since the emergence of mobile technologies. The intersection of the internet and the growing mobile user-base fueled the natural progression of phishers to target mobile-specific users. This research investigates mobile-specific phishing attacks through the dissection of phishing kits used for the attacks, presentation of real world phishing campaigns, and observations about PayPal’s insight into mobile web-based phishing numbers. © Springer International Publishing AG, part of Springer Nature 2018.


REAPER: an automated, scalable solution for mass credential harvesting and OSINT

June 2016

·

147 Reads

·

14 Citations

Releases of usernames and passwords, referred to as credential dumps, have become an increasingly popular shared resource over the past decade, especially within underground communities. The sharing of compromised credentials by cybercriminals is done in order to demonstrate technical capability, increase reputation, and to augment one's legitimacy within criminal communities. There has been minimal research demonstrating standardized methods for identifying the distribution of credential dumps or the origin(s) of where a dump first surfaced. There has also been a lack of research related to the open source intelligence that can be obtained through tracing the distribution of dumps across the Internet. This research presents a method called REAPER which demonstrates how to leverage unique data points within credential dumps to identify its distribution, while also providing an in-depth look into the intelligence that can be gained by observing the criminal activities associated with the credentials dumped.



New tackle to catch a phisher

March 2014

·

57 Reads

·

7 Citations

International Journal of Electronic Security and Digital Forensics

Organisations continue to pursue new strategies to thwart phishing attacks as well as investigate the criminals behind these scams. In order to address these issues, a novel algorithm named syntactical fingerprinting is proposed which automatically identifies phishing websites and implies the provenance of these websites using the structural components that compose the website. Syntactical fingerprinting demonstrates the ability to accurately identify newly observed phishing websites through an experiment on a custom dataset consisting of 49,840 URLs collected over three months by the UAB phishing data mine. An additional experiment was run over a different set of website content in early 2011 which exhibits the use of syntactical fingerprinting as a distance metric for clustering phishing websites. Finally, varying the threshold value used by syntactical fingerprinting demonstrates the capability for phishing investigators to identify not only the source of phishing websites, but individual phishers as well.


Voice of the customer

September 2013

·

32 Reads

·

2 Citations

Phishers continue to target customers of all factions of the Internet industry in an attempt to gain personal information that can be used for profit. Typical organizational responses to these attacks are the removal of the malicious content through website takedown and user education. The latter response is extremely important as it is the organization's direct communication to the customer about these attacks. The purpose of this study is to survey a number of organizations that are highly targeted in phishing attacks and measure their effectiveness in communication to their customers. This study performs an evaluation of seven organizations', across a variety of industry sectors, communication through website content, customer service phone calls, and email abuse reporting. The outcomes of this study are suggestions that can be incorporated by all of the organizations to provide a better customer experience.


Citations (19)


... The use of web domains for distributing scams, and attacks remains a potent channel for abusers and has been widely researched over the last decade. These include studies such as traditional phishing attacks [31][32][33][34][35][36], Technical Support Scams [37,38], and beyond such as Squattingbased attacks [39][40][41][42][43][44], and Malvertisement [45][46][47]. For instance, in PhishFarm [31], the author studied how malicious actors evade the anti-phishing engines in distributing various forms of scams and abuses in web domains. ...

Reference:

Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing

IEEE Security and Privacy Magazine

... Firewall, browser) [6], [7], [8]. While content/network log based techniques are important, they have several limitations: (1) they have a blind spot for cloaked webpages, which is a technique attackers increasingly utilize [9]; (2) they require huge amounts of computational resources to analyze billions of webpage contents; (3) there is limited visibility to malicious domains in the wild and (4) by the time malicious webpage contents or network traces are available, it is difficult, if not impossible, to prevent the attack from happening. Note that MANTIS 1 is designed to augment, not replace, contentbased detection methods. ...

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing

... For the same reasons, HTTPS-only was used in Albakry et al. [1], Volkamer et al. [56] and Peteleka et al. [40]. Ultimately, as shown in Oest et al. [39], almost 86% of successful phishing attacks use HTTPS. Thus, we have 12 different phishing cases to be considered (4 URL obfuscation techniques x 3 link-types). ...

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and E ectiveness of Phishing Attacks at Scale

... Prior studies [28,44,46,48,49,51] have explored various aspects of phishing websites, such as ccTLD, URL patterns and visual content. Specifically, Moura et al. [46] analyzed phishing domains mimicking target brand webpages but focused solely on three European ccTLDs: .nl, ...

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists

... As shown in Table 1 [55]. These sources have been used to better understand the phishing ecosystem [36,39,[48][49][50][51]. Particularly, APWG is a global industry association of anti-phishing entities, including banks and financial services companies, Internet service providers, law enforcement agencies, and security vendors. ...

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

... They found that lexical classification of malicious URLs can rival other conventional methods in accuracy levels. Their dataset was created utilising a technique called Deep MD5 Hashing ( Wardman et al., 2010). The technique is used to compare the contents of known malicious websites to those being tested by comparing their Kulczynski 2 coefficients to check for their similarity (Kulczy´nskiKulczy´nski, 1928). ...

Reeling in Big Phish with a Deep MD5 Net
  • Citing Article
  • January 2010

The Journal of Digital Forensics Security and Law

... Defacement is another technique used by attackers to manipulate the content of web pages by changing the underlying code. This form of cyber intrusion is frequently leveraged to undermine an organization's website [4]. Malware techniques in malicious URLs are the methods that cybercriminals use to distribute and execute malware through deceptive website addresses. ...

Phorecasting Phishing Attacks: A New Approach for Predicting the Appearance of Phishing Websites
  • Citing Article
  • January 2016

International Journal of Cyber-Security and Digital Forensics

... Only a few approaches target OSINT for identities. (Butler et al., 2016) present REAPER, a tool for automated mass credential harvesting. Related to that, (Fang et al., 2019;Peng et al., 2019;Bermudez Villalva et al., 2018) describe the effects of a password leak. ...

REAPER: an automated, scalable solution for mass credential harvesting and OSINT
  • Citing Conference Paper
  • June 2016

... It is not clear how broadly their system may be applied, as the advance fee fraud they focused on has a fairly large text body, which may be atypical of scam email. [Stallings et al. 2012] cover the same use-case, but make use of email headers to build clusters of scam originators using WHOIS data. Using this approach, they identified 12 email addresses which were key in registering spam-origin domains. ...

“WHOIS” Selling All The Pills
  • Citing Article
  • December 2012

The International Journal of Forensic Computer Science