=Paper= {{Paper |id=Vol-190/paper-11 |storemode=property |title=Phishing with Consumer Electronics - Malicious Home Routers |pdfUrl=https://ceur-ws.org/Vol-190/paper11.pdf |volume=Vol-190 |authors=Alex Tsow }} ==Phishing with Consumer Electronics - Malicious Home Routers== https://ceur-ws.org/Vol-190/paper11.pdf
     Phishing with Consumer Electronics – Malicious Home
                          Routers

                                                          Alex Tsow
                                                     School of Informatics
                                                      Indiana University
                                                   atsow@indiana.edu

ABSTRACT                                                          these systems eludes scan by malware detectors, and remains
This short paper describes an attack that exploits the on-        unrecognized by the consumer public as a potential host for
line marketplace’s susceptibility to covert fraud, opaqueness     malicious behavior.
of embedded software, and social engineering to hijack ac-           Bugs due to time-to-market pressure, evolving data stan-
count access and ultimately steal money. The attacker in-         dards, and security fixes demand field upgradability for em-
troduces a fatal security flaw into a trusted embedded sys-       bedded software. Moreover, there are several consumer em-
tem (e.g. computer motherboard, network interface card,           bedded systems for which there are open source firmware
network router, cell phone), distributes it through the on-       distributions: home network appliances (routers, storage,
line marketplace at a plausible bargain, and then exploits        print servers), cell phones (Motorola), computer mother-
the security flaw to steal information. Unlike conventional       boards (the Linux BIOS project, slimline Open Firmware),
fraud, consumer risk far exceeds the price of the good.           and digital music players (iPodLinux, RockBox). Admit-
   As proof of concept, the firmware on a wireless home           tedly some of these projects lag behind the current mar-
router is replaced by an open source embedded operating           ket, but several new cell phones and network appliances are
system. Once installed, its DNS server is reconfigured to         presently supported. While open source firmware is not a
selectively spoof domain resolution. This instance of ma-         requirement for compromising embedded systems, it confers
licious embedded software is discussed in depth, including        the attacker with an expedient platform for experimentation
implementation details, attack extensions, and countermea-        and development.
sures.                                                               Eliminating open source projects does not eliminate the
                                                                  attack. Insiders can collude with an attacker providing ac-
                                                                  cess to technical blueprints, passwords, signing keys, and
1.   INTRODUCTION                                                 proprietary interfaces. In some ways this makes the attack
   Phishing attacks combine technology and social engineer-       more effective, because the technical secrecy will be pro-
ing to gain access to restricted information. The most com-       moted as grounds for trust.
mon phishing attacks today send mass email directing the             This paper demonstrates an instance of the hardware “spoof-
victim to a web site of some perceived authority. These           ing” by maliciously reconfiguring a wireless home router.
web sites typically spoof online banks, government agencies,      The router implements a pharming attack in which DNS
electronic payment firms, and virtual marketplaces. The           lookups are selectively misdirected to malicious web sites.
fraudulent web page collects information from the victim          Opportune targets for pharming attacks include the usual
under the guise of “authentication,” “security,” or “account      phishing subjects: online banks, software update services,
update.” Some of these compromised hosts simply down-             electronic payment services, etc.
load malware onto clients rather than collect information            Besides stealing online authentication credentials, a spoofed
directly.                                                         server has access to data stored as cookies for a particular
   In the generalized view of phishing, the delivery mecha-       domain. Cookies regularly contain innocuous data, however
nism need not be email, the veil of legitimacy need not come      a visit to one poorly coded (yet legitimate) web site could
from an online host, and the bait need not be credential          store clear text personal information in cookies. Less sensi-
confirmation. This paper identifies a phishing variant that       tive private information like internet searches, names, email
distributes attractively priced “fake” hardware through the       and IP addresses commonly show up in cookie repositories.
online marketplace. The “fake” hardware is a communica-              Target web sites use SSL (via https) in conjunction with
tions device in which its embedded software has been mali-        certified public keys to authenticate themselves to their clients.
ciously modified; e.g. a cell phone that discloses its current    In principle this should prevent successful pharming attacks,
GPS coordinates at the behest of the attacker.                    however the requisite human computer interaction technol-
   Demand for security has lead to the integration of cryp-       ogy for effective use of this cryptographic protocol is not
tography in many communications systems. The resulting            well understood, let alone widely deployed. Users frequently
systems are based on powerful microcomputers that, when           overlook browser frame padlocks indicating an https ses-
co-opted, can execute sophisticated resource-expensive at-        sion [7, 16]. Other times a padlock in the browser display
tacks. The embedded software, or firmware, that controls          area suffices to convince users of a secure connection. In
Copyright is held by the author/owner(s).
                                                                  some contexts people “click through” warning after warning
WWW2006, May 22–26, 2006, Edinburgh, UK.                          to proceed with a browsing session.
.
  Furthermore, many trustworthy web sites (news organi-           3.    PHISHING WITH MALICIOUS HARD-
zations, search engines) do not use SSL since they do not               WARE
collect personal data. Semantic attacks, a more subtle ma-
nipulation, employ disinformation through reputable chan-
nels. For example, one attack uses multiple trusted news
                                                                  3.1   Adversarial Model
sources to report “election postponed” based on the client’s         We make four assumptions about an attacker, A, who
browsing habits.                                                  compromises firmware in an embedded system: A has un-
  A router serving the home, small office, or local hotspot       restricted physical access to the target device for a short
environment mediates all communications between its clients       period of time. A can control all messages that the device
and the internet. Anyone connecting to the internet through       receives and intercept all messages that the device sends. A
this router is a potential victim, regardless of platform. In     has in-depth knowledge of the device’s hardware/software
home and small office settings, victims are limited in num-       architecture. A knows access passcodes necessary to change
ber, however the storefront hotspot presents a gold mine of       the device’s firmware.
activity – potentially yielding hundreds of victims per week.        This model gives rise to multiple contexts along each of the
                                                                  four attack requirements. Each property could be generally
                                                                  attainable or available to insiders only. The following table
2.   RELATED WORKS                                                classifies example scenarios according to this decomposition:
   One of the first mass attacks on embedded software was                         Insider access           General access
performed by the Chernobyl virus in 1999 [5]. The goal            Physical        Device at work           Device at home
of this malware is purely destruction. It attempts to erase       I/O             Proprietary     inter- Ethernet/USB
the hard disk and overwrite the BIOS at specified dates.                          faces
Cell phones have also become targets for worms [4] with the       Technical
first reports in the wild in 2004. The same author in 2003                        closed source            open source
                                                                  Blueprints
predicted infectious malware for the Linksys line of home         Passcodes       requires OEM Signed arbitrary firmware
routers, switches and wireless access points [3].                                 firmware
   Arbaugh, Farber, and Smith [2] implement a cryptographic       For instance, A may have insider access to cell phones through
access control system, AEGIS, to ensure that only sanc-           a coatchecking job. The target cell phones run on open
tioned bootstrapping firmware can be installed on the host        source firmware, but require a proprietary wire to upload
platform.                                                         software. In this instance, the phone’s owner has not locked
   This paper explores a variant of email based phishing [9],     the phone with a password. This illustrates an insider /
where distribution occurs through online market places and        insider / public / public case of the firmware attack.
hardware is “spoofed” by maliciously compromising its em-
bedded software. While much work has been done to detect          3.2   Spoofing honest electronics
web site spoofing and to create secure authentication pro-
                                                                    Embedded software is an effective place to hide malicious
tocols, their effective interaction with human agents is a
                                                                  behavior. It is outside the domain of conventional malware
subject of ongoing research:
                                                                  detection. Spyware, virus, and worm detection typically
   Wu, Miller, and Garfinkel [16] present a user study show-
                                                                  take place on client file systems and RAM. New malware
ing that people regularly disregard toolbar warnings when
                                                                  detection efforts analyze internet traffic to stop its spread.
the content of the page is good enough. Another user study
                                                                  Neither of these methods detect malicious embedded soft-
by Dhamija, Tygar, and Hearst [7] shows that https and
                                                                  ware. The first model simply doesn’t (or can’t) scan the
browser frame padlock icons (among other indicators) fre-
                                                                  EEPROM of a cell phone, a network router, or other em-
quently escape consideration in user assessments of web page
                                                                  bedded systems. The second model reduces the spread of
authenticity. In other work, they propose and implement dy-
                                                                  infectious malware, but does not diagnose infected systems.
namic security skins [6] which uses a combination of visual
                                                                    Many embedded systems targeted at the consumer market
hashing and photographic images to create an evident and
                                                                  have an appliance-like status. They are expected to function
trusted path between the user and login window.
                                                                  correctly out of the box with a minimum of setup. Firmware
   Stamm and Jakobsson [14] conduct an experiment that
                                                                  may be upgraded at service centers or by savvy owners, how-
distributes a link to a clever video clip through a social net-
                                                                  ever consumer products must be able to work well enough
work. The link require users to accept self signed Java policy
                                                                  for the technically disinterested user. Because of these pre-
certificate1 for the full viewing experience; 50% of those vis-
                                                                  vailing consumer attitudes, malicious appliances are beyond
iting the site accepted it. Browser warnings do not indicate
                                                                  the scope of conceivability for many, and therefore endowed
the resulting scope of access and mislead users about the
                                                                  with a level of trust absent from personal computers.
authenticity of the certificate.
                                                                    Field upgradeable embedded systems generally exhibit no
   Cookie theft is one of the more worrisome results of pharm-
                                                                  physical evidence of modification after a firmware upgrade.
ing. Attackers can spoof users by presenting stolen cookies
                                                                  There is no red light indicating that non OEM software con-
to a server; even worse, cookie sometimes directly store per-
                                                                  trols the system. By all physical examination the compro-
sonal information. Attempts to provide user authentication,
                                                                  mised hardware appears in new condition.
data integrity, and confidentiality within the existing cookie
paradigm are discussed in [13]. Unfortunately, the strong         3.3   Distribution
authentication methods depend on prior server knowledge
of a user’s public key.                                              The online marketplace provides a powerful distribution
                                                                  medium for maliciously compromised hardware. While more
1                                                                 expensive than email distribution, it is arguably more effec-
  This allows embedded Java applets a level access on par
with the user’s, including writing and executing programs.        tive. High percentages of phishing related email are effec-
tively marked as spam due to header analysis, destroying         core processor, 16 MB of RAM, 4 MB of flash memory,
their credibility. However, online advertisements are avail-     802.11g network interface, and a 4 port fast ethernet switch.
able to millions. Only interested users look at the posting.     The factory embedded software is a version of Linux. Inde-
It is unnecessary to coerce attention since the victim ap-       pendent review of the corresponding source code has spawned
proaches the seller.                                             the OpenWRT project [12], an enthusiast developed Linux
   Online marketplaces connect buyers with sellers. They do      distribution for the Linksys WRT54G(S) series of routers.
not authenticate either party’s identity, product warranty or
quality. Consequently, the vast majority of auctions carry       4.2    Basic Pharming attack
a caveat emptor policy. Merchandise frequently sells “as           Once installed, OpenWRT supports login via ssh. This
is” with minimal disclosure about its true condition. One        shell provides a standard UNIX interface with file editing
could improve trust by offering a shill return policy: re-       through vi. DNS spoofing is one of the most expedient
turns accepted within 14 days for a 15% restocking fee ($10      attacks to configure. OpenWRT uses the dnsmasq server
minimum, shipping non-refundable). If the victim uses the        to manage domain name resolution and DHCP leases. The
product, the attacker potentially benefits from the stolen       malicious configuration sets the
information, and gets to redeploy the system on another
victim.                                                                     address=/victimdomain.com/X.X.X.X
   Reputation systems in the online marketplace help buy-
ers and sellers gauge the trustworthiness in the caveat emp-     option to resolve the victimdomain.com to the dotted quad
tor context. These systems principally measure transaction       X.X.X.X. All subsequent requests for victimdomain.com re-
satisfaction: Did the buyer pay in a timely manner? Did          solve to X.X.X.X. In addition to address, the option
the seller deliver in a timely manner? Was the item fun-                    alias=,[,]
damentally misrepresented? Phishing with malicious em-
bedded systems clearly violates this last criterion, however     rewrites downstream DNS replies matching  mod-
stealthy malware may never be known to the victim. Cou-          ulo the mask as  (replacing numbers for mask bits
pled with pressure to reciprocate positive feedback, the vic-    only); this enables the router to hijack entire subnets.
tim will very likely rate the transaction positively. Unlike        Anti-phishing tools have limited utility in the presence
other fraudulent online sales, this attack’s stealthiness will   of phoney domain name resolution. The three prevailing
ensure high trust ratings for the seller. Also unlike conven-    approaches to detecting phoney web sites are server stored
tional fraud, the buyer’s risk far exceeds the purchase price    reputation databases, locally constructed white lists, and in-
and delivery fees. The attacker recoups his loss on the “good    formation oriented detection. The first two methods depend
deal” when exploiting the security hole to access private in-    exclusively on domain name resolution for database lookup
formation.                                                       and white/black list lookup. Pharming renders these meth-
                                                                 ods entirely ineffective because the pre-resolution links are
4.    A HOME PHARMING APPLIANCE                                  correct. The information or content based analysis also de-
   This paper’s central example of hardware spoofing is a        pend heavily on link analysis, but may recognize phishing
wireless home network router. Our prototype implements           attacks in which login fields are presented in a non SSL con-
a basic pharming attack to selectively misresolve the client     nection. However, document obfuscation could reduce the
domain name requests. It is an example where the four ad-        effectiveness of automatic recognition of password requests.
versarial requirements are all publicly attainable. Physical        The system runs a crond background daemon to process
access is achieved through purchase. All communications to       scheduled tasks at particular times of day. For instance,
this device go through open standards: ethernet, WiFi, se-       DNS spoofing could be scheduled to begin at 5pm and end
rial port, and JTAG (a factory diagnostic port). Technical       9am to avoid detection during normal business hours.
details are well documented through open source firmware
projects. Firmware upgrades are neither limited to company
                                                                 4.3    Attack extensions
drivers, nor password protected when new.
                                                                 Self signed certificates
4.1   The system context                                         One variant is to get the victim to accept a self-signed cer-
   In general, we assume that the attacker, A, has com-          tificate. The router may offer a self signed SSL certificate to
plete control over the router’s incoming and outgoing net-       anyone attempting to access its administrative pages. This
work traffic, but cannot decrypt encrypted data. While the       certificate would later be used to start https sessions with
router can control the communications flow as the A desires,     the login pages for the spoofed domains. Since web sites
it is computationally bound. Computationally intensive ex-       change their security policies frequently, spoofed hosts could
tensions to the pharming attack need to carefully schedule       make entry contingent on acceptance of SSL or even Java
processing to avoid implausible timing delays. A controls        policy certificates. Once the victim accepts a Java policy
the appearance and actions of the web administration inter-      certificate, an embedded Javascript or Java applet may place
face. Administrator access to the firmware update feature        malware directly onto the victim’s file system. Router based
would simulate user feedback for the upgrade process and         pharming greatly aids this kind of attack because it can mis-
then claim failure for some made up reason. Other function-      direct any request to a malicious web site. Unlike standard
ality, such as WEP/WPA, firewalling, is left intact in both      phishing attacks that bait the victim into clicking on a link,
function and appearance.                                         the attacker exerts no influence on the victim’s desire to
   As a proof of principle, we replace the firmware on a         request the legitimate URL. We hypothesize that this psy-
Linksys WRT54GS version 4. The Linksys runs a 200Mhz             chological difference results in higher self-signed certificate
Broadcom 5352 SoC that includes a MIPS instruction set           acceptance rate.
Spying                                                               tation, let $5 be a gross upper bound on per router sell-
An easy malicious behavior to configure in the default Open-         ing costs through online marketplaces. To compute a pes-
WRT installation is DNS query logging; it is a simple config-        simistic lower bound on the cost of reselling the malicious
uration flag in the dnsmasq server. SIGUSR1 signals cause            routers, assume that routers sell for an average of $30. Then
dnsmasq to dump its cache to the system log, while SIG-              it costs $50 ($75 new acquisition, plus $5 listing, less $30
INT signals cause the DNS cache to clear. This informa-              selling price) per router to put into circulation. While this
tion approximates the aggregate browsing habits of network           method is expensive, the online marketplace disseminates a
clients. The crond process could coordinate periodic DNS             reliably high number of routers over a wide area.
cache dumps to the system log. The router then posts this            Hit rate
data to the attacker during subsequent misdirection.
   Cookies can be stolen either through pharming or packet           A gross estimate of phishing success rate is derived from
sniffing. Clients fulfill cookie requests when the origin server’s   the finding that 3% of the 8.9 million identity theft victims
hostname matches the cookie’s Domain attribute and the               attribute the information loss to phishing [10]. This puts
cookie’s Secure attribute is clear. In this case, browser re-        the total phishing victims in 2005 at 267,000, or roughly a
sponds to the cookie request sending values in clear text.           5135 people per week hit rate for the combined efforts of
These cookies are vulnerable to packet sniffing, and need            all phishers. Fraud victims per week triples when expand-
not utilize pharming for theft.                                      ing the cause from phishing to computer-related disclosures
   If the Secure attribute is set, then the connection must          (viruses, hacking, spyware, and phishing). This gives a plau-
meet a standard of trust as determined by the client. For            sible upper bound on phishing’s effectiveness, since people
Mozilla Firefox, this standard is connection via https. The          can not reliably distinguish the cause of information loss
combination of pushing self signed SSL certificates (to sat-         given the lack of transparency in computer technology.
isfy the “secure connection” requirement) and pharming (to              As noted above, the 131 of the wireless routers closely
satisfy the domain name requirement) results in cookie theft         matching the description of this paper’s demonstration sold
through a man in the middle attack.                                  in a week. Other brands use a similarly exploitable archi-
   Other data is also vulnerable to packet sniffing. POP and         tecture (although this is far from universal). Over the same
IMAP email clients frequently send passwords in the clear.           period of time there were 872 auctions for routers matching
Search queries and link request logging (from the packet             the the query “802.11g router.” This indicates high poten-
sniffing level instead of DNS lookup level) can help to build        tial for circulating compromised routers in volume. While
a contextual dossier for subsequent social engineering.              far more expensive pricewise, cost in time should be com-
                                                                     pared to spam based phishing and context aware phishing
Delaying detection of fraudulent transactions                        since one hit (about $2,100 for account misuse) could cover
The 2006 Identity Theft Survey Consumer Report [10] shows            the cost of circulating a week’s worth of routers.
that fraudulent transaction detection strongly influences con-          Assume that each compromised router produces an av-
sumer cost. When the victim monitors account activity                erage of 3 identity theft victims (the occasional hotspot,
through electronic records, the survey found that fraudu-            multiple user households and small offices), and an individ-
lent activity was detected in an average of 10 days – 12 days        ual sells 15 routers a week. Then the number of harvested
earlier than when account activity is monitored through pa-          victims is 45, around .88% of the total number of victims at-
per records. Moreover, fraud amounts were 42% higher for             tributed to phishing. Of course these are made up numbers,
those who monitored their transactions by paper instead of           but illustrates the potential impact due to a single attacker.
electronically.
   The malicious router in the home or small office setting
                                                                     Financial Gain to Attacker
(as opposed to the hotspot setting) provides the primary             Assume that the attacker is able to acquire 45 new victims a
internet access for some set of clients. When such a client          week as stipulated above. In 2005, the average amount per
monitors account activity, either the network router or the          identity fraud instance was $6383. This suggests a yearly
spoofed pharming server can delete fraudulent transactions           gross of
from electronic records, forestalling detection. The result is
                                                                                   45 × 52 × $6, 383 = $14, 936, 220
a more profitable attack.
                                                                     for a modestly sized operation. At 15 routers a week, the
4.4    Sustainability                                                yearly expenditures for circulating the routers is $39,000,
                                                                     based on the cost of $50 above.
Cost to Attacker                                                        Identity theft survey data [15] shows that on average fraud
The startup costs for malicious hardware phishing through            amount due to new account & other fraud ($10,200) is roughly
the online marketplace are high compared to conventional             five times higher than fraud amount due to misuse of exist-
email phishing. Retail price of the router used in this paper        ing accounts ($2,100). A malicious router potentially col-
is $99, however it is commonly discounted 20-30%. Assume             lects far more personal information than email based phish-
that bulk purchases can be made for a price of $75 per unit.         ing due to its omnipresent eavesdropping. This extra infor-
A quick scan of completed auctions at one popular venue              mation makes it easier to pursue the new account & other
between the dates 2/2/2006 and 2/9/06 shows 145 wireless             fraud category than one bite phishing (e.g. email), thereby
routers matching the search phrase “linksys 802.11g router.”         increasing the expected fraud amount per victim. More-
Of these, all but 14 sold. Thus there is a sufficiently large        over, multiple accounts are subject to hijacking, and the
market for wireless routers to make the logistics of selling         router may elude blame for the information disclosure for
them a full time job.                                                quite some time given the opaqueness of computer technol-
   Listing fees are insignificant. For the sake of compu-            ogy, opening the victim to multiple frauds a year.
  Consider a worst case estimate where: no victim is robbed           nels should be evident to the consumer, and moreover should
more than once, the fraud amount is due to account mis-               implement effective access control. These processors have
use ($2,100), and the distribution costs are high ($120 per           sufficient power to check digital signatures. One solution
router, i.e. free to victim). The yearly gross is still $4,914,000,   uses a hard-wired bootstrapping process to check digitally
with a distribution cost of $81,000.                                  signed firmware against an onboard manufacturer public
  In summary the startup costs are high for this attack,              key, just as in [2]. This addition limits firmware changes
however the stream of regular victims and magnitude of cor-           to those sanctioned by the manufacturer.
responding fraud dwarf the distribution costs.                           In the absence of tamper proof or tamper evident hard-
                                                                      ware, a knowledgeable and determined attacker could re-
Management of non-monetary risks                                      place the chips holding either the bootstrapping program or
The attacker may incur substantial non-monetary risks when            the manufacturer’s public key (assuming that these are not
implementing this scheme. The primary concern is expo-                integrated into the SoC silicon). Moreover, part of the ap-
sure. Purchasing routers in bulk could raise suspicion. The           peal for many technologically savvy consumers is the ability
plan above entails a relatively modest number (15) of router          to control the hardware in novel ways. One solution makes
purchases per week. A computer criminal need not sell                 the digital signature check bypassable using an circuit board
the routers through a single personal account. The dili-              jumper, while using a tamper evident exterior. Third party
gent attacker will control many accounts, possibly reusing            firmware is still installable, yet the hardware can no longer
the accounts of her victims to buy and sell small numbers             be represented as within factory specification. This solution
of routers.                                                           also appeals to a meticulous customer who sees third party
   Another concern is the relatively long attack lifetime. Phish-     firmware as more trustworthy.
ing servers remain online for about 5 to 6 days before van-
ishing [1], yet the malicious firmware resides on the router          5.2    Pharming countermeasures
indefinitely. This does not imply that the malicious hosts               In context of identity theft, the principal threat is accept-
referenced by the router’s pharming attack also stay online           ing a self-signed SSL certificate. Once accepted, the spoofed
indefinitely. Although the pharming attack implemented in             host’s login page can be an exact copy of the authentic page
the demonstration is static, compromised routers can com-             over an SSL connection. The semi-weary user, while fooled
municate with agents of the attacker through ssh connec-              by the certificate, observes the https link in the address bar
tions for dynamic updates to compromised host listings. The           and the padlock icon in the browser frame and believes that
fraudulent hosts retain their short online lifetimes under this       the transaction is legitimate. An immediate practical solu-
scheme.                                                               tion is to set the default policy on self signed certificates to
   If the attacker has a large network of compromised routers,        reject. A finer grained approach limits self signed certificate
then her apprehension by law enforcement should begin the             rejection to a client side list of critical web sites.
reversion of compromised without revealing their IP ad-                  Many phishing toolbars check for an https session when a
dresses. She can use a botnet to implement a dead (wo)man’s           login page is detected. This detection is not straightforward.
switch. In normal circumstances the botnet receives periodic          HTML obfuscation techniques can hide the intended use of
“safety” messages. In the absence of these messages, the              web pages by using graphics in place of text, changing the
botnet spams appropriately disguised “revert” commands to             names of the form fields, and choosing perverse style sheets.
the IPv4 address space. The reversion to factory firmware             This includes many of the same techniques that phishers use
need not be complete though. While manufacturer firmware              to subvert content analysis filters on mass phishing email.
often has sufficient vulnerabilities, the reversion could con-           The DNS protocol is very efficient at the cost of high vul-
figure the manufacturer firmware for straightforward rein-            nerability. Every machine in the DNS hierarchy is trusted
fection (e.g., set firewall policy to accept remote adminis-          to return correct results. Erroneous or malicious results are
tration through an unusual port). This has the advantage              forwarded without scrutiny. Secure DNS, or DNSSEC [8,
of not disclosing the nature of the malware to investigators.         11], is a proposal where each level of reference and lookup is
It will simply appear vulnerable.                                     digitally signed by trusted servers. The client starts out with
   The biggest concern is actually executing the identity fraud.      the public key of a DNS server it trusts. Server traversal pro-
Cash transfers out of existing accounts are quick, but tend           ceeds as usual, but with the addition of digital signatures for
to be for lower dollar values than new account fraud as noted         each delegation of name lookup. The lookup policy forces
earlier. New account fraud seems more promising for actu-             servers to only report on names for which they have au-
ally purchasing goods since the attacker will be able to con-         thority, eliminating cache poisoning. This method returns
trol the registered mailing address and avoid detection for           a client checkable certificate of name resolution. If imple-
a longer period of time. For maximal impact, the fraudster            mented as stated, the system will be very difficult to sub-
should empty the existing accounts last using cash transfers.         vert. However, there is substantial overhead in all the sig-
                                                                      nature checking. A real implementation will need to imple-
5.    COUNTERMEASURES                                                 ment caching at some level for efficiency. What servers are
  Malicious firmware poses some serious threats, however,             trustable for lookups outside their authority? One should
we are not helpless to prevent them. This section examines            not trust public or open wireless access points since they
some methods to counter the general problem, and then                 are controlled by unknown agents. Home routers which are
some methods that mitigate the malicious network router.              under the physical control of the user should be trusted.
                                                                      Their compromise exposes clients worse vulnerabilities than
5.1    General countermeasures                                        just pharming (e.g. packet sniffing, mutation, rerouting,
  Accessibility to firmware is obscure, but not secure. These         eavesdropping). While widespread DNSSEC deployment
properties discourage trust. The firmware upgradability chan-         coupled with the correct trust policies (i.e. no errant or
malicious servers are trusted) will eliminate pharming, the      [16] Min Wu, Robert Miller, and Simson Garfinkel. Do
compromised router achieve the same effect by rerouting un-           security toolbars actually prevent phishing attacks? In
encrypted http traffic to a man-in-the-middle host.                   CHI, 2006.

6.   CONCLUSION
  This paper serves as a call to action. Maliciously compro-
mised embedded systems are implementable today (e.g. our
demonstration). They are dangerous because of the damage
they can inflict and because of misplaced consumer trust.
Their distribution through online auctions is a plausibly sus-
tainable enterprise.

7.   ACKNOWLEDGEMENTS
   I would like to thank Markus Jakobsson for recommend-
ing a project on malicious embedded firmware. My conver-
sations with Bhanu Nagendra Pisupati resulted in choosing
wireless routers as a promising target. I have Jean Camp’s
influence to thank for framing the feasibility in economic
terms.

8.   REFERENCES
 [1] APWG. Phishing activity trends report. Technical
     report, Anti-Phishing Working Group, December 2005.
 [2] W. A. Arbaugh, D. J. Farber, and J. M. Smith. A
     secure and reliable bootstrap architecture. In SP ’97:
     Proceedings of the 1997 IEEE Symposium on Security
     and Privacy, pages 65–71, Washington, DC, USA,
     1997. IEEE Computer Society.
 [3] Ivan Arce. The rise of the gadgets. IEEE Security &
     Privacy, September/October 2003.
 [4] Ivan Arce. The shellcode generation. IEEE Security &
     Privacy, September/October 2004.
 [5] CERT. Incident note IN-99-03.
     http://www.cert.org/incident notes/IN-99-03.html,
     April 1999.
 [6] Rachna Dhamija and J. D. Tygar. The battle against
     phishing: Dynamic security skins. In SOUPS ’05:
     Proceedings of the 2005 symposium on Usable privacy
     and security, pages 77–88, New York, NY, USA, 2005.
     ACM Press.
 [7] Rachna Dhamija, J. D. Tygar, and Marti Hearst. Why
     phishing works. http://www.sims.berkeley.edu/
     ∼rachna/papers/why phishing works.pdf.

 [8] D. Eastlake. Domain name security extensions. RFC
     2535, March 1999.
 [9] Markus Jakobsson and Steve Myers. Phishing and
     Counter-measures: Understanding the Increaseing
     Problem of Electronic Identity Theft. Wiley, 2006.
[10] Javelin Strategy & Research. Identity theft survey
     report (consumer version), 2006.
[11] Trevor Jim. Sd3: A trust management system with
     certified evaluation. In IEEE Symposium on Security
     and Privacy, pages 106–115, 2001.
[12] Openwrt. http://www.openwrt.org.
[13] Joon S. Park and Ravi Sandhu. Secure cookies on the
     web. IEEE Internet Computing, 4(4):36–44, 2000.
[14] Sid Stamm and Markus Jakobsson. Case study:
     Signed applets. In Phishing and ... [9].
[15] Synovate. Federal trade commission identity theft
     survey report, 2003.