论文标题
娱乐和利润打字:越野分析弹出型骗局
Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam
论文作者
论文摘要
如今,可以在互联网上找到许多不同类型的骗局。在线罪犯总是在寻找新的创意方式来欺骗互联网用户,无论是以彩票骗局的形式,下载用于智能手机或假赌博网站的骗局应用程序。本文对一种特定的在线骗局交付方法进行了一项大规模研究:关于错别字域的弹出骗局。 TypoSquatting描述了注册域的概念,该域与现有的域非常相似,同时故意包含常见的打字错误;在浏览预期的网站的信念下,这些域被用来欺骗在线用户。弹出式骗局使用JavaScript警报框来提供一条消息,该消息非常有效地吸引用户的注意力,因为它们是阻止用户界面元素。 我们在使用奥地利IP地址的雄伟的百万列表中衍生出的打字域中的研究,该地址在1219个不同的打字URL上揭示了总共2577个弹出消息,其中1538个是恶意的。这些不同的URL(403)中约有三分之一是针对的,并仅向一个特定的HTTP用户代理显示弹出消息。根据我们的扫描,我们提供了深入的分析以及对不同定位参数(用户代理和语言)的详细分类,该分类触发了各种弹出型骗局。此外,与2018年底进行的先前扫描相比,我们阐述了当前弹出型骗局特征的差异,并检查了IDN同型攻击的使用以及使用与美国和日本的IP地址的其他扫描有关消息本地化的应用。
Today, many different types of scams can be found on the internet. Online criminals are always finding new creative ways to trick internet users, be it in the form of lottery scams, downloading scam apps for smartphones or fake gambling websites. This paper presents a large-scale study on one particular delivery method of online scam: pop-up scam on typosquatting domains. Typosquatting describes the concept of registering domains which are very similar to existing ones while deliberately containing common typing errors; these domains are then used to trick online users while under the belief of browsing the intended website. Pop-up scam uses JavaScript alert boxes to present a message which attracts the user's attention very effectively, as they are a blocking user interface element. Our study among typosquatting domains derived from the Majestic Million list utilising an Austrian IP address revealed on 1219 distinct typosquatting URLs a total of 2577 pop-up messages, out of which 1538 were malicious. Approximately a third of those distinct URLs (403) were targeted and displayed pop-up messages to one specific HTTP user agent only. Based on our scans, we present an in-depth analysis as well as a detailed classification of different targeting parameters (user agent and language) which triggered varying kinds of pop-up scams. Furthermore, we expound the differences of current pop-up scam characteristics in comparison with a previous scan performed in late 2018 and examine the use of IDN homograph attacks as well as the application of message localisation using additional scans with IP addresses from the United States and Japan.