Why phishing works
Top Cited Papers
- 22 April 2006
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 581-590
- https://doi.org/10.1145/1124772.1124861
Abstract
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users. We first analyzed a large set of captured phishing attacks and developed a set of hypotheses about why these strategies might work. We then assessed these hypotheses with a usability study in which 22 participants were shown 20 web sites and asked to determine which ones were fraudulent. We found that 23% of the participants did not look at browser-based cues such as the address bar, status bar and the security indicators, leading to incorrect choices 40% of the time. We also found that some visual deception attacks can fool even the most sophisticated users. These results illustrate that standard security indicators are not effective for a substantial fraction of users, and suggest that alternative approaches are needed.Keywords
This publication has 8 references indexed in Scilit:
- The battle against phishingPublished by Association for Computing Machinery (ACM) ,2005
- An overview of online trust: Concepts, elements, and implicationsComputers in Human Behavior, 2005
- How do users evaluate the credibility of Web sites?Published by Association for Computing Machinery (ACM) ,2003
- Reflections on the dimensions of trust and trustworthiness among online consumersACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2002
- Users' conceptions of risks and harms on the webPublished by Association for Computing Machinery (ACM) ,2002
- Users' conceptions of web securityPublished by Association for Computing Machinery (ACM) ,2002
- A Trust Model for Consumer Internet ShoppingInternational Journal of Electronic Commerce, 2001
- What makes Web sites credible?Published by Association for Computing Machinery (ACM) ,2001