[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20110083182A1 - Phishing solution method - Google Patents

Phishing solution method Download PDF

Info

Publication number
US20110083182A1
US20110083182A1 US12/905,609 US90560910A US2011083182A1 US 20110083182 A1 US20110083182 A1 US 20110083182A1 US 90560910 A US90560910 A US 90560910A US 2011083182 A1 US2011083182 A1 US 2011083182A1
Authority
US
United States
Prior art keywords
warning
fraudulent
source image
mails
image file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/905,609
Inventor
Warner Allen Brandt Emdee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capital One Financial Corp
Original Assignee
Capital One Financial Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capital One Financial Corp filed Critical Capital One Financial Corp
Priority to US12/905,609 priority Critical patent/US20110083182A1/en
Publication of US20110083182A1 publication Critical patent/US20110083182A1/en
Assigned to CAPITAL ONE FINANCIAL CORPORATION reassignment CAPITAL ONE FINANCIAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EMDEE, WARNER ALLEN BRANDT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/063Content adaptation, e.g. replacement of unsuitable content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Definitions

  • This application relates generally to preventing fraudulent hacking activities on computer networks, and more particularly to preventing phishing activities on the Internet.
  • Phishing is one of the fastest growing forms of fraud that is prevalent on the Internet today. Phishing attacks typically involve sending fraudulent e-mails to individuals in order to solicit sensitive information such as confidential personal information, account numbers, social security numbers, and passwords from the recipients. The e-mails appear to come from a legitimate company such as a bank, retailer or other e-commerce business. The information obtained from unsuspecting individuals are used for fraudulent purposes, for example, to access the person's account or use the person's identity information to facilitate further fraud with other parties—for instance, to deceive other parties into believing that they are dealing with that person.
  • Phishing attacks typically use a false “from” address, copies of company logos, Web links, and graphics to make the e-mails look like the genuine e-mails from the companies with which the recipients of the e-mails have business dealings, thus taking advantage of customer trust in the company's identity and brand names.
  • phishing attacks use the company's logo from the company's website or the company's website links in the e-mails or communications. It is apparent then that such phishing attacks result in serious damages to the company's reputation to say nothing of the undermining effect it has on general e-commerce business.
  • a method for preventing or deterring phishing attacks includes identifying a source image file that was used fraudulently in a spoofed e-mail.
  • the source image file is renamed.
  • the content of the original source image file is then replaced with a warning message.
  • the warning message may be in a form of graphics image, text, or the like or combinations thereof.
  • the warning message file is installed on a web server so that it can be accessed as the original file.
  • the traffic to the warning message file is monitored, for example, to assess the number of fraudulent e-mails.
  • FIG. 1 is a flow diagram illustrating a method for providing a phishing solution in one embodiment.
  • FIG. 2 is an example of an HTML page that includes a link to the source image.
  • FIG. 3 illustrates an example of an e-mail that embeds the source link that was changed into a warning.
  • the method and apparatus relates to deterring or preventing phishing activities.
  • Phishing refers to the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • the e-mail directs the user to visit a Web site where the user is asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
  • the Web site is bogus (counterfeit or faked) and set up only to steal the user's information.
  • the spoofed e-mails In order to convince the users that the spoofed e-mail is genuine, the spoofed e-mails typically embed source link of a legitimate company's logo, for instance, acquired from a corporate web site. Because HTML (hypertext markup language) code is publicly accessible through a browser, the phishing scammers can easily mimic the source link of a company's logo from the HTML code of a legitimate corporate web site, and embed that link into the fraudulent email. When the user opens that spoofed e-mail, the corporate logo appears as if the e-mail came from that company.
  • HTML hypertext markup language
  • FIG. 1 is a flow diagram illustrating a method for providing a phishing solution of the present disclosure in one embodiment.
  • a company or enterprise's logo or the like was used in a fraudulent e-mail, for example, to steal information from the e-mail recipient. This information may have been provided, for instance, by the recipients of the fraudulent e-mail who reported to the company that they had received such e-mails. Other methods may be employed to discover whether the source link was used fraudulently.
  • the source image for example, a logo image file used in the e-mail is identified.
  • the logo image file may have been obtained from a company's web site source code, typically viewable using a browser.
  • HTML source code used to display a company's web page may include a “ ⁇ img src>” command with a location or link to a company's logo image or the like. Because the source HTML pages are available on the Web browser, anyone or automated method looking at the page can access this link.
  • the method identifies at 104 the source image or link, for example, a logo image file, that was used in the fraudulent e-mail. This may be done, for example, by examining the fraudulent e-mails used in phishing attacks. These e-mails, for example, would have the link to the file that contains the source image of the company logo embedded in them. Once the name of the file or the link used in the fraudulent e-mail is determined, a new source file for the company's logo is created at 106 . At 108 , the content of the original file is replaced with a warning.
  • the source image or link for example, a logo image file
  • the warning for example, can be a graphic image, text, combination of image and image, or any other form that tells the recipient that the e-mail is fraudulent and that they should not reply to the e-mail.
  • any subsequent fraudulent emails sent with a link to this source image file would contain a warning message instead of a company logo that a fraud perpetuator intended.
  • FIG. 3 illustrates an example of an e-mail that embeds the source link that was changed into a warning according to the method described above.
  • the e-mail 300 is a sample fraudulent e-mail that was sent with an image source changed from a company logo to a warning 302 .
  • the senders of this e-mail 300 accessed an image source link of what they believed to contain a company logo. However, according to the method of the present disclosure in one embodiment, the contents of that image source link was replaced with a warning 302 instead. If the image source was not changed, the warning 302 would have contained a company logo of an enterprise, for example, a bank.
  • a new name may be used.
  • the original content that is, the company logo
  • the new source image logo is installed for the corporate Web site.
  • the new source image logo for example, is the same logo but has a different file name.
  • the web traffic that is hitting the old image (that is, the image replaced with warning) is monitored and recorded for tracking purposes. Monitoring and tracking traffic may be performed by monitoring web logs that access the source image.
  • FIG. 2 is a block diagram illustrating the method of deterring phishing in one embodiment.
  • a company typically sets up a server directory 206 that allows users or processes to access its files legitimately, including image files.
  • An example is a web server directory that includes various files accessible by web browsers 202 to display web page contents.
  • a file 210 may contain data that represents company's identity or logo or the like. As explained above, because anyone or any process can access the file 210 , it is also prone to fraudulent uses. Thus, for example, a fraudulent e-mail 204 may embed or otherwise include a link to this file 210 such that when the e-mail is displayed to the recipient, the content of the file 210 is also displayed with the e-mail message.
  • the phishing solution method of the present disclosure when it detects that this file 210 is not being used legitimately, replaces the contents of the file 210 from the company's logo image to a warning.
  • the warning may include a graphics image, text, sound, and/or any other type of alert that tells the recipient that the e-mail is fraudulent.
  • a new file 208 is created that contains the original company logo or the like.
  • a legitimate web browser 202 accessing a company logo to display as part of the web page will henceforth access the new image source file 208 .
  • the company's website implementation may be changed or enhanced by allowing only the main page with the original logo, for example, as a bait.
  • a company may have several different websites offering different products and services.
  • hot linking the process of displaying content from another website
  • the coding methods for preventing hot linking are well known to those skilled in the art and therefore will not be described here in detail.
  • the main home page would still have the company logo unprotected from hot linking, therefore making it the likely source of phishing attempts. This would concentrate the phishing attacks to one location making them easier to track and thwart. This will increase the effectiveness of the anti-phishing solution.
  • logo images are sourced with the session layer to prevent easy hijacking of the company logo.
  • the web server will look at what is known as the HTTP referer (also known as HTTP referrer), which is the referring address for the HTTP request. If this request does not come from the company's domain, the server will deny the request.
  • HTTP referer also known as HTTP referrer
  • the referrer address will show the mail server for the email service it was delivered to, and therefore, will be denied by the company's web server.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for preventing phishing attacks is provided. The method in one aspect includes identifying a source image file that was used fraudulently, replacing the content of the source image file with a warning, and allowing the source image file having the warning to be accessed.

Description

    RELATED APPLICATION
  • This application is a continuation application of U.S. application Ser. No. 11/121,524 which was filed May 4, 2005, the contents of which are incorporated herein by reference as if set forth in full.
  • TECHNICAL FIELD
  • This application relates generally to preventing fraudulent hacking activities on computer networks, and more particularly to preventing phishing activities on the Internet.
  • BACKGROUND
  • Phishing is one of the fastest growing forms of fraud that is prevalent on the Internet today. Phishing attacks typically involve sending fraudulent e-mails to individuals in order to solicit sensitive information such as confidential personal information, account numbers, social security numbers, and passwords from the recipients. The e-mails appear to come from a legitimate company such as a bank, retailer or other e-commerce business. The information obtained from unsuspecting individuals are used for fraudulent purposes, for example, to access the person's account or use the person's identity information to facilitate further fraud with other parties—for instance, to deceive other parties into believing that they are dealing with that person.
  • Phishing attacks typically use a false “from” address, copies of company logos, Web links, and graphics to make the e-mails look like the genuine e-mails from the companies with which the recipients of the e-mails have business dealings, thus taking advantage of customer trust in the company's identity and brand names. To trick the recipient into believing that the source of the communication is the genuine company, phishing attacks use the company's logo from the company's website or the company's website links in the e-mails or communications. It is apparent then that such phishing attacks result in serious damages to the company's reputation to say nothing of the undermining effect it has on general e-commerce business.
  • SUMMARY
  • A method for preventing or deterring phishing attacks is provided. In one aspect, the method includes identifying a source image file that was used fraudulently in a spoofed e-mail. The source image file is renamed. The content of the original source image file is then replaced with a warning message. The warning message may be in a form of graphics image, text, or the like or combinations thereof. The warning message file is installed on a web server so that it can be accessed as the original file. In another aspect, the traffic to the warning message file is monitored, for example, to assess the number of fraudulent e-mails.
  • Further features as well as the structure and operation of various embodiments are described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a flow diagram illustrating a method for providing a phishing solution in one embodiment.
  • FIG. 2 is an example of an HTML page that includes a link to the source image.
  • FIG. 3 illustrates an example of an e-mail that embeds the source link that was changed into a warning.
  • DETAILED DESCRIPTION
  • The method and apparatus relates to deterring or preventing phishing activities. Phishing refers to the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where the user is asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus (counterfeit or faked) and set up only to steal the user's information.
  • In order to convince the users that the spoofed e-mail is genuine, the spoofed e-mails typically embed source link of a legitimate company's logo, for instance, acquired from a corporate web site. Because HTML (hypertext markup language) code is publicly accessible through a browser, the phishing scammers can easily mimic the source link of a company's logo from the HTML code of a legitimate corporate web site, and embed that link into the fraudulent email. When the user opens that spoofed e-mail, the corporate logo appears as if the e-mail came from that company.
  • The method disclosed in the present application in one embodiment deters this fraudulent e-mail or at least notifies the recipients of the possible fraud. FIG. 1 is a flow diagram illustrating a method for providing a phishing solution of the present disclosure in one embodiment. At 102, it is determined that a company or enterprise's logo or the like was used in a fraudulent e-mail, for example, to steal information from the e-mail recipient. This information may have been provided, for instance, by the recipients of the fraudulent e-mail who reported to the company that they had received such e-mails. Other methods may be employed to discover whether the source link was used fraudulently.
  • At 104, the source image, for example, a logo image file used in the e-mail is identified. The logo image file, for instance, may have been obtained from a company's web site source code, typically viewable using a browser. For Example, HTML source code used to display a company's web page may include a “<img src>” command with a location or link to a company's logo image or the like. Because the source HTML pages are available on the Web browser, anyone or automated method looking at the page can access this link.
  • The method, in one embodiment, identifies at 104 the source image or link, for example, a logo image file, that was used in the fraudulent e-mail. This may be done, for example, by examining the fraudulent e-mails used in phishing attacks. These e-mails, for example, would have the link to the file that contains the source image of the company logo embedded in them. Once the name of the file or the link used in the fraudulent e-mail is determined, a new source file for the company's logo is created at 106. At 108, the content of the original file is replaced with a warning. The warning, for example, can be a graphic image, text, combination of image and image, or any other form that tells the recipient that the e-mail is fraudulent and that they should not reply to the e-mail. Thus, any subsequent fraudulent emails sent with a link to this source image file would contain a warning message instead of a company logo that a fraud perpetuator intended.
  • FIG. 3 illustrates an example of an e-mail that embeds the source link that was changed into a warning according to the method described above. The e-mail 300 is a sample fraudulent e-mail that was sent with an image source changed from a company logo to a warning 302. The senders of this e-mail 300 accessed an image source link of what they believed to contain a company logo. However, according to the method of the present disclosure in one embodiment, the contents of that image source link was replaced with a warning 302 instead. If the image source was not changed, the warning 302 would have contained a company logo of an enterprise, for example, a bank.
  • With respect to the genuine company logo for use for example on the company website, a new name may be used. For instance, the original content, that is, the company logo, may be renamed as another file or link and that file or link may be used in displaying or operating the company website. Referring to FIG. 1, at 110, the new source image logo is installed for the corporate Web site. The new source image logo, for example, is the same logo but has a different file name.
  • In the meantime, in one embodiment, at 112, the web traffic that is hitting the old image (that is, the image replaced with warning) is monitored and recorded for tracking purposes. Monitoring and tracking traffic may be performed by monitoring web logs that access the source image.
  • FIG. 2. is a block diagram illustrating the method of deterring phishing in one embodiment. A company typically sets up a server directory 206 that allows users or processes to access its files legitimately, including image files. An example is a web server directory that includes various files accessible by web browsers 202 to display web page contents. A file 210 may contain data that represents company's identity or logo or the like. As explained above, because anyone or any process can access the file 210, it is also prone to fraudulent uses. Thus, for example, a fraudulent e-mail 204 may embed or otherwise include a link to this file 210 such that when the e-mail is displayed to the recipient, the content of the file 210 is also displayed with the e-mail message.
  • In order to deter this type of fraudulent usage, the phishing solution method of the present disclosure in one embodiment, when it detects that this file 210 is not being used legitimately, replaces the contents of the file 210 from the company's logo image to a warning. The warning may include a graphics image, text, sound, and/or any other type of alert that tells the recipient that the e-mail is fraudulent. For legitimate uses, a new file 208 is created that contains the original company logo or the like. Thus, a legitimate web browser 202 accessing a company logo to display as part of the web page will henceforth access the new image source file 208.
  • In another embodiment, the company's website implementation may be changed or enhanced by allowing only the main page with the original logo, for example, as a bait. A company may have several different websites offering different products and services. On these pages, hot linking (the process of displaying content from another website) would be prevented. The coding methods for preventing hot linking are well known to those skilled in the art and therefore will not be described here in detail. The main home page would still have the company logo unprotected from hot linking, therefore making it the likely source of phishing attempts. This would concentrate the phishing attacks to one location making them easier to track and thwart. This will increase the effectiveness of the anti-phishing solution.
  • In all other pages, logo images are sourced with the session layer to prevent easy hijacking of the company logo. The web server will look at what is known as the HTTP referer (also known as HTTP referrer), which is the referring address for the HTTP request. If this request does not come from the company's domain, the server will deny the request. When the company's images are displayed in a phishing e-mail, the referrer address will show the mail server for the email service it was delivered to, and therefore, will be denied by the company's web server.
  • The method of the present disclosure may be implemented and run on a general-purpose computer. The embodiments described above are illustrative examples and it should not be construed that the present invention is limited to these particular embodiments. Thus, various changes and modifications may be effected by one skilled in the art without departing from the spirit or scope of the invention as defined in the appended claims.

Claims (16)

1. A method for deterring fraudulent e-mails, comprising:
identifying a source image file from a web server directory that was used fraudulently in the fraudulent e-mails by examining the fraudulent e-mails used in a phishing attack;
transferring a source image in the source image file to a new file;
replacing the content of the source image file on the web server directory with a warning; and
allowing the source image file having the warning to be accessed on the web server directory, and
monitoring a number of accesses to the source image file having the warning
wherein the steps of the method are implemented by a computer.
2. The method of claim 1, wherein the source image file used fraudulently is identified as being embedded in a fraudulent e-mail.
3. The method of claim 1, wherein the warning includes graphics image or text or combinations thereof.
4. The method of claim 1, wherein a link to the source image file is embedded in a fraudulent e-mail.
5. The method of claim 1, wherein the source image file is copied from a legitimate Web site source code.
6. A method of deterring fraudulent e-mails, comprising:
identifying an enterprise identifying object in a Web page on a web server directory as being a subject of fraudulent use in the fraudulent emails by examining the fraudulent e-mails used in a phishing attack;
replacing the object on the web server directory with a warning object, the warning object having the same name as the object;
installing the warning object on the web server directory to be accessed;
renaming the enterprise identifying object on the web server directory; and
installing the renamed enterprise identifying object on the Web page on the web server directory, and
monitoring a number of accesses to the warning object,
wherein the steps of the method are implemented by a computer.
7. The method of claim 6, wherein the enterprise identifying object is a link to an image of a company logo.
8. The method of claim 6, wherein the enterprise identifying object is a file having an image of a company logo.
9. A method of deterring fraudulent e-mails, the method comprising:
identifying an enterprise identifying object in a Web page as being a subject of fraudulent use in the fraudulent emails by examining the fraudulent e-mails used in a phishing attack;
replacing the object with a warning object, the warning object having the same name as the object;
installing the warning object to be accessed;
renaming the enterprise identifying object; and
installing the renamed enterprise identifying object on the Web page, and
monitoring a number of accesses to the warning object,
wherein the method resides on a non-transitory program storage device readable by machine, embodying a program of instructions executable by the machine.
10. The program storage device of claim 9, wherein the enterprise identifying object includes at least a company logo.
11. The program storage device of claim 9, wherein the warning object includes at least a warning message.
12. The program storage device of claim 9, wherein the warning object includes at least a graphics animation providing a warning message.
13. The method of claim 1, further including: determining a referring address of a requestor requesting the new file; and denying the request if the referring address does not match a known address.
14. The method of claim 13, wherein the determining and the denying steps are performed for web pages other than a main home page.
15. The program storage device of claim 9, further including: determining a referring address of a requestor requesting the renamed enterprise identifying object; and denying the request if the referring address does not match a known address.
16. The program storage device of claim 15, wherein the determining and the denying steps are performed for web pages other than a main home page.
US12/905,609 2005-05-04 2010-10-15 Phishing solution method Abandoned US20110083182A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/905,609 US20110083182A1 (en) 2005-05-04 2010-10-15 Phishing solution method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/121,524 US7841003B1 (en) 2005-05-04 2005-05-04 Phishing solution method
US12/905,609 US20110083182A1 (en) 2005-05-04 2010-10-15 Phishing solution method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/121,524 Continuation US7841003B1 (en) 2005-05-04 2005-05-04 Phishing solution method

Publications (1)

Publication Number Publication Date
US20110083182A1 true US20110083182A1 (en) 2011-04-07

Family

ID=43087416

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/121,524 Active 2029-06-08 US7841003B1 (en) 2005-05-04 2005-05-04 Phishing solution method
US12/905,609 Abandoned US20110083182A1 (en) 2005-05-04 2010-10-15 Phishing solution method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/121,524 Active 2029-06-08 US7841003B1 (en) 2005-05-04 2005-05-04 Phishing solution method

Country Status (1)

Country Link
US (2) US7841003B1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150180896A1 (en) * 2013-02-08 2015-06-25 PhishMe, Inc. Collaborative phishing attack detection
US20150200963A1 (en) * 2012-09-07 2015-07-16 Computer Network Information Center, Chinese Academy Of Sciences Method for detecting phishing website without depending on samples
US9344449B2 (en) 2013-03-11 2016-05-17 Bank Of America Corporation Risk ranking referential links in electronic messages
US9621566B2 (en) 2013-05-31 2017-04-11 Adi Labs Incorporated System and method for detecting phishing webpages
US9667645B1 (en) 2013-02-08 2017-05-30 PhishMe, Inc. Performance benchmarking for simulated phishing attacks
US9906539B2 (en) 2015-04-10 2018-02-27 PhishMe, Inc. Suspicious message processing and incident response
US10469510B2 (en) * 2014-01-31 2019-11-05 Juniper Networks, Inc. Intermediate responses for non-html downloads

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8050983B1 (en) 2006-10-31 2011-11-01 Amazon Technologies, Inc. Inhibiting inappropriate communications between users involving tranactions
KR101086451B1 (en) * 2011-08-30 2011-11-25 한국전자통신연구원 Apparatus and method for defending a modulation of the client screen
US9053326B2 (en) 2013-02-08 2015-06-09 PhishMe, Inc. Simulated phishing attack with sequential messages
US9398038B2 (en) 2013-02-08 2016-07-19 PhishMe, Inc. Collaborative phishing attack detection
US9253207B2 (en) 2013-02-08 2016-02-02 PhishMe, Inc. Collaborative phishing attack detection
US9262629B2 (en) 2014-01-21 2016-02-16 PhishMe, Inc. Methods and systems for preventing malicious use of phishing simulation records
CN104917649B (en) * 2015-06-05 2021-09-24 重庆智韬信息技术中心 Method for reverse security audit of communication data
US9825974B2 (en) * 2015-07-22 2017-11-21 Bank Of America Corporation Phishing warning tool
US10601865B1 (en) * 2015-09-30 2020-03-24 Fireeye, Inc. Detection of credential spearphishing attacks using email analysis
US10498761B2 (en) * 2016-08-23 2019-12-03 Duo Security, Inc. Method for identifying phishing websites and hindering associated activity
US10609072B1 (en) * 2016-11-07 2020-03-31 United Services Automobile Association (Usaa) Phishing scheme detection and termination
US12028373B2 (en) 2021-04-14 2024-07-02 Bank Of America Corporation Information security system and method for preventing communications from detected phishing domains
US11991207B2 (en) 2022-03-14 2024-05-21 Bank Of America Corporation Anti-phish, personalized, security token for use with electronic communications
US11991172B2 (en) 2022-03-29 2024-05-21 Bank Of America Corporation Double anti-phish, personalized, security token for use with electronic communications
US11930005B2 (en) 2022-04-05 2024-03-12 Bank Of America Corporation Anti-phish, personalized, security token to authenticate electronic communications in the meta verse
US12003646B2 (en) 2022-04-18 2024-06-04 Bank Of America Corporation Storage locations for anti-phish, personalized, security tokens for use with electronic communications

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5781901A (en) * 1995-12-21 1998-07-14 Intel Corporation Transmitting electronic mail attachment over a network using a e-mail page
US20020029250A1 (en) * 2000-08-09 2002-03-07 Jay Reiner Method and apparatus for transmitting an electronic message on electronic letterhead
US6449635B1 (en) * 1999-04-21 2002-09-10 Mindarrow Systems, Inc. Electronic mail deployment system
US20020138583A1 (en) * 2001-03-23 2002-09-26 Norihisa Takayama E-mail transmission apparatus, e-mail transmission method and e-mail transmission program
US6651087B1 (en) * 1999-01-28 2003-11-18 Bellsouth Intellectual Property Corporation Method and system for publishing an electronic file attached to an electronic mail message
US20040034688A1 (en) * 2002-08-16 2004-02-19 Xythos Software, Inc. Transfer and management of linked objects over networks
US20040078422A1 (en) * 2002-10-17 2004-04-22 Toomey Christopher Newell Detecting and blocking spoofed Web login pages
US20050008225A1 (en) * 2003-06-27 2005-01-13 Hiroyuki Yanagisawa System, apparatus, and method for providing illegal use research service for image data, and system, apparatus, and method for providing proper use research service for image data
US20050071748A1 (en) * 2003-04-25 2005-03-31 Alexander Shipp Method of, and system for, replacing external links in electronic documents
US20060101334A1 (en) * 2004-10-21 2006-05-11 Trend Micro, Inc. Controlling hostile electronic mail content
US7096498B2 (en) * 2002-03-08 2006-08-22 Cipher Trust, Inc. Systems and methods for message threat management
US20070101423A1 (en) * 2003-09-08 2007-05-03 Mailfrontier, Inc. Fraudulent message detection
US20070112814A1 (en) * 2005-11-12 2007-05-17 Cheshire Stuart D Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
US20070294762A1 (en) * 2004-05-02 2007-12-20 Markmonitor, Inc. Enhanced responses to online fraud
US7380277B2 (en) * 2002-07-22 2008-05-27 Symantec Corporation Preventing e-mail propagation of malicious computer code
US20080172382A1 (en) * 2004-03-16 2008-07-17 Michael Hugh Prettejohn Security Component for Use With an Internet Browser Application and Method and Apparatus Associated Therewith
US7415726B2 (en) * 2001-12-28 2008-08-19 Mcafee, Inc. Controlling access to suspicious files
US7609818B2 (en) * 2004-09-23 2009-10-27 Verizon Services Corp. Methods and apparatus for reducing data capture and storage requirements for call and transaction related message monitoring and fraud detection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3573718B2 (en) 2001-01-25 2004-10-06 株式会社クローバー・ネットワーク・コム Homepage server device and program with unauthorized use prevention function

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5781901A (en) * 1995-12-21 1998-07-14 Intel Corporation Transmitting electronic mail attachment over a network using a e-mail page
US6651087B1 (en) * 1999-01-28 2003-11-18 Bellsouth Intellectual Property Corporation Method and system for publishing an electronic file attached to an electronic mail message
US6449635B1 (en) * 1999-04-21 2002-09-10 Mindarrow Systems, Inc. Electronic mail deployment system
US20020029250A1 (en) * 2000-08-09 2002-03-07 Jay Reiner Method and apparatus for transmitting an electronic message on electronic letterhead
US20020138583A1 (en) * 2001-03-23 2002-09-26 Norihisa Takayama E-mail transmission apparatus, e-mail transmission method and e-mail transmission program
US7415726B2 (en) * 2001-12-28 2008-08-19 Mcafee, Inc. Controlling access to suspicious files
US7096498B2 (en) * 2002-03-08 2006-08-22 Cipher Trust, Inc. Systems and methods for message threat management
US7380277B2 (en) * 2002-07-22 2008-05-27 Symantec Corporation Preventing e-mail propagation of malicious computer code
US20040034688A1 (en) * 2002-08-16 2004-02-19 Xythos Software, Inc. Transfer and management of linked objects over networks
US20040078422A1 (en) * 2002-10-17 2004-04-22 Toomey Christopher Newell Detecting and blocking spoofed Web login pages
US20050071748A1 (en) * 2003-04-25 2005-03-31 Alexander Shipp Method of, and system for, replacing external links in electronic documents
US20050008225A1 (en) * 2003-06-27 2005-01-13 Hiroyuki Yanagisawa System, apparatus, and method for providing illegal use research service for image data, and system, apparatus, and method for providing proper use research service for image data
US20070101423A1 (en) * 2003-09-08 2007-05-03 Mailfrontier, Inc. Fraudulent message detection
US20080172382A1 (en) * 2004-03-16 2008-07-17 Michael Hugh Prettejohn Security Component for Use With an Internet Browser Application and Method and Apparatus Associated Therewith
US20070294762A1 (en) * 2004-05-02 2007-12-20 Markmonitor, Inc. Enhanced responses to online fraud
US7609818B2 (en) * 2004-09-23 2009-10-27 Verizon Services Corp. Methods and apparatus for reducing data capture and storage requirements for call and transaction related message monitoring and fraud detection
US20060101334A1 (en) * 2004-10-21 2006-05-11 Trend Micro, Inc. Controlling hostile electronic mail content
US20070112814A1 (en) * 2005-11-12 2007-05-17 Cheshire Stuart D Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150200963A1 (en) * 2012-09-07 2015-07-16 Computer Network Information Center, Chinese Academy Of Sciences Method for detecting phishing website without depending on samples
US9276956B2 (en) * 2012-09-07 2016-03-01 Computer Network Information Center Chinese Academy of Sciences Method for detecting phishing website without depending on samples
US9674221B1 (en) 2013-02-08 2017-06-06 PhishMe, Inc. Collaborative phishing attack detection
US9325730B2 (en) * 2013-02-08 2016-04-26 PhishMe, Inc. Collaborative phishing attack detection
US10819744B1 (en) 2013-02-08 2020-10-27 Cofense Inc Collaborative phishing attack detection
US9356948B2 (en) 2013-02-08 2016-05-31 PhishMe, Inc. Collaborative phishing attack detection
US9591017B1 (en) 2013-02-08 2017-03-07 PhishMe, Inc. Collaborative phishing attack detection
US10187407B1 (en) 2013-02-08 2019-01-22 Cofense Inc. Collaborative phishing attack detection
US20150180896A1 (en) * 2013-02-08 2015-06-25 PhishMe, Inc. Collaborative phishing attack detection
US9667645B1 (en) 2013-02-08 2017-05-30 PhishMe, Inc. Performance benchmarking for simulated phishing attacks
US9635042B2 (en) 2013-03-11 2017-04-25 Bank Of America Corporation Risk ranking referential links in electronic messages
US9344449B2 (en) 2013-03-11 2016-05-17 Bank Of America Corporation Risk ranking referential links in electronic messages
US9621566B2 (en) 2013-05-31 2017-04-11 Adi Labs Incorporated System and method for detecting phishing webpages
US10469510B2 (en) * 2014-01-31 2019-11-05 Juniper Networks, Inc. Intermediate responses for non-html downloads
US9906539B2 (en) 2015-04-10 2018-02-27 PhishMe, Inc. Suspicious message processing and incident response
US9906554B2 (en) 2015-04-10 2018-02-27 PhishMe, Inc. Suspicious message processing and incident response

Also Published As

Publication number Publication date
US7841003B1 (en) 2010-11-23

Similar Documents

Publication Publication Date Title
US20110083182A1 (en) Phishing solution method
US11924242B2 (en) Fraud prevention via distinctive URL display
US8996697B2 (en) Server authentication
Van der Merwe et al. Characteristics and responsibilities involved in a phishing attack
US20090282479A1 (en) Method and system for misuse detection
US20100313253A1 (en) Method, system and process for authenticating the sender, source or origin of a desired, authorized or legitimate email or electrinic mail communication
JP2006313517A (en) Safety on internet
JP2019528509A (en) System and method for detecting online fraud
US7590698B1 (en) Thwarting phishing attacks by using pre-established policy files
KR100835033B1 (en) Phishing Blocking Method Using Trusted Network
US8443192B2 (en) Network security method
Singh Detection of Phishing e-mail
Suriya et al. An integrated approach to detect phishing mail attacks: a case study
Singh et al. Phishing: A computer security threat
Butler Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishers
Mihai Overview on phishing attacks
HAZAM Extending Zero Trust to the End-User Ecosystem.
Usha et al. Phishing-A Challenge in the Internet
Singleton Don't get “hooked” by phishing scams
Murphy et al. Phishing, Pharming, and Vishing: Fraud in the Internet Age
Oberoi et al. An Anti-Phishing Application for the End User
Kanthety Prevention of Phishing Attacks using Link-Guard Algorithm
Cliff Fighting back against phishing; In the past year, attacks have grown in volume and sophistication, but online merchants are on the offensive with consumer education and new authentication tools
Lankford The Phishing Line
Jagani et al. Protect the internet consumer’s identity against attacks by phishers

Legal Events

Date Code Title Description
AS Assignment

Owner name: CAPITAL ONE FINANCIAL CORPORATION, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMDEE, WARNER ALLEN BRANDT;REEL/FRAME:026847/0521

Effective date: 20050503

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION