Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts

Hiroki Nakano,Daiki Chiba,Takashi Koide,Naoki Fukushi,Takeshi Yagi,Takeo Hariu,Katsunari Yoshioka,Tsutomu Matsumoto
DOI: https://doi.org/10.48550/arXiv.2303.15847
2023-06-06
Abstract:The rise in phishing attacks via e-mail and short message service (SMS) has not slowed down at all. The first thing we need to do to combat the ever-increasing number of phishing attacks is to collect and characterize more phishing cases that reach end users. Without understanding these characteristics, anti-phishing countermeasures cannot evolve. In this study, we propose an approach using Twitter as a new observation point to immediately collect and characterize phishing cases via e-mail and SMS that evade countermeasures and reach users. Specifically, we propose CrowdCanary, a system capable of structurally and accurately extracting phishing information (e.g., URLs and domains) from tweets about phishing by users who have actually discovered or encountered it. In our three months of live operation, CrowdCanary identified 35,432 phishing URLs out of 38,935 phishing reports, 31,960 (90.2%) of these phishing URLs were later detected by the anti-virus engine. We analyzed users who shared phishing threats by categorizing them into two groups: experts and non-experts. As a results, we discovered that CrowdCanary extracts non-expert report-specific information, like company brand name in tweets, phishing attack details from tweet images, and pre-redirect landing page information.
Cryptography and Security,Social and Information Networks
What problem does this paper attempt to address?