Abusing Notification Services on Smartphones for Phishing and Spamming

نویسندگان

  • Zhi Xu
  • Sencun Zhu
چکیده

Notification service is a popular functionality provided by almost all modern smartphone platforms. To facilitate customization for developers, many smartphone platforms support highly customizable notifications, which allow the third party applications to specify the trigger events, the notification views to be displayed, and the allowed user operations on the notification views. In this paper, we show that notification customization may allow an installed trojan application to launch phishing attacks or anonymously post spam notifications. Through our studies on four major smartphone platforms, we show that both Android and BlackBerry OS are vulnerable under the phishing and spam notification attacks. iOS and Windows Phone allow little notification customization, thus launching the phishing and spam attacks will expose the identity of the trojan application. Attack demonstrations on all platforms are presented. To prevent the phishing and spam notification attacks while still allowing notification customization, we propose a Semi-OS-Controlled notification view design principle and a Notification Logging service. Moreover, to protect applications from fraudulent views, we propose a view authentication framework, named SecureView, which enables the third party applications to add the authentication image and text to their sensitive views (e.g. the account login view). The implementation and demonstrations of proposed defense approaches on Android are also presented in the paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Blind Men and the DNS (abstract)

Domain names have been used to provide a simple identification label for hosts, services, applications, and networks on the Internet [12]. They have also been long misused for types of abuse: phishing, malware distribution, spamming, and botnet command-and-control (C&C), among others. Underlying these abuses, we find profitable business models that provide the incentives for these abusers to co...

متن کامل

Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks

With the convergence of Internet and telephony, new applications (e.g., WhatsApp) have emerged as an important means of communication for billions of users. These applications are becoming an attractive medium for attackers to deliver spam and carry out more targeted attacks. Since such applications rely on phone numbers, we explore the feasibility, automation, and scalability of phishing attac...

متن کامل

Social Phishing

Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...

متن کامل

“Phishing in the middle of the stream” Today’s threats to online banking

Malicious applications that steal financial account information have increased dramatically over the last year, potentially resulting in a direct loss of hard currency to affected victims. While the primary target continues to be online financial systems, the methods used to gather the sensitive information vary. Attacks spread from simply spamming e-mails with links to fake web sites, which is...

متن کامل

Anonymous Resolution of DNS Queries

The use of the DNS as the underlying technology of new resolution name services can lead to privacy violations. The exchange of data between servers and clients flows without protection. Such an information can be captured by service providers and eventually sold with malicious purposes (i.e., spamming, phishing, etc.). A motivating example is the use of DNS on VoIP services for the translation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012