Social phishing

被引:525
作者
Jagatic, Tom N. [1 ]
Johnson, Nathaniel A.
Jakobsson, Markus
Menczer, Filippo
机构
[1] MIT, Cambridge, MA 02139 USA
[2] Indiana Univ, Div Enterprise Software, Bloomington, IN 47405 USA
关键词
(Edited Abstract);
D O I
10.1145/1290958.1290968
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several suspected Internet users, called pishers, post a friendly e-mail for other users, aiming at acquiring sensitive information from a victim fraudulently, by acting as a friend. A phisher fraudulently identifies himself as a large banking corporation, or popular online auction site, claiming to possess significant knowledge about the concerned fields. Gartner Group conducted a survey of a number of such Internet users, who were cheated by phishers. The survey revealed that about 19% of the victims had clicked on a link in a phishing e-mail message, while 3% admitted having given personal and financial information to these phishers. The phisher is able to gain the trust of victims, by obtaining information about their bidding history, or shopping preferences, their banking institutions, and their names.
引用
收藏
页码:94 / 100
页数:7
相关论文
共 11 条
[1]   Friends and neighbors on the Web [J].
Adamic, LA ;
Adar, E .
SOCIAL NETWORKS, 2003, 25 (03) :211-230
[2]  
Chou N., 2004, P 11 ANN NETW DISTR
[3]  
Dhamija R., 2005, SOUPS 05, P77, DOI DOI 10.1145/1073001.1073009
[4]  
Emigh A, 2005, ONLINE IDENTITY THEF
[5]  
FERGUSON AJ, 2005, EDUCAUSE Q, V28, P1
[6]  
FINN P, 2005, IEEE TECHNOLOGY SOC
[7]  
GARFINKEL S, 2005, S US PRIV SEC JUL 6
[8]  
*GARTN GROUP, 2004, GARTN STUD FINDS SIG
[9]  
GRIFFITH V, 2006, RSA CRYPTOBYTES, V8, P1
[10]  
JAKOBSSON M, 2005, PHISHING COUNTER MEA