Security engineer by day (and often by night too…)
This blog is where I try to share my mental models about security that I find useful.
You can follow what I’m doing on any of these platforms below. Currently most active on Bluesky
👇🏻
People expect companies/services to tell them when untoward things could be happening to their accounts:
These examples are things you should probably be notified about. But, if you go overboard with these warnings, you might find phishers triggering them intentionally.
Imagine receiving this warning email:
There was a failed login attempt from $Country on your $eShop account.
Eek. Well, you’re not in $Country, and you weren’t just logging into your account… Is someone trying to credential-stuff you?
As you’re trying to remember whether you actually used a unique password on this account, your phone rings. The caller introduces themselves as from the $eShop security team where they’ve just blocked a takeover of your account. To secure your account, they need to walk you through the reset process over the phone.
Hopefully, you’re suspicious—this is a common phishing lure—but everything seems to check out:
So you oblige and go through an account reset process with them. They assure you they’ve successfully stopped the attack and your account is now secure. Phew!
But, later, you check your account and find a bunch of fraudulent purchases 😣
The caller was of course not from the $eShop security team. Instead, they were compromising your account using the details you gave them over the phone.
But, the failed login email—the key part of their believability—was completely genuine. How? Simple:
This perfectly sensible sounding security feature (warning that someone might be trying to log into your account) is easily abused by a phisher to attack your account.
And can you blame them? The ability to send a scary-sounding warning to any user sounds like a feature built for phishers.
As a phisher
I want to be able to send scary-sounding, legitimate-looking emails to my targets
So that they’re more likely to believe my pretense and give me their credentials
Why was this a bad security warning? Because it had all the properties that make it easy to abuse.
It was easy to trigger by attackers.
“You’ve logged in on a new device” isn’t very abusable—by that point, the attacker already has control over your account.
But a failed login email is extremely abusable—attackers can trigger it without knowing anything more than your username or email address.
It contained predictable, and worse, controllable content.
The phisher was so believable because they could control (and hence know the value of) the country from which the failed login was attempted. Including more details, like the IP address of the failed login, would only make them more believable.
The timing was predictable.
Would the phisher have been so believable if they called before the warning email arrived or hours afterwards?
Probably not.
Either they’d seem like every other tech support scam (with no warning email to back them up), or you’d have already checked out your account yourself, finding it perfectly safe.
(note: just adding a delay isn’t sufficient. A fixed one hour delay on the warning requires slightly more planning from attackers but is otherwise just as abusable.)
🐟
Dealing with phishing sites manually? Check out Phish Report! It automatically finds contact information for the hosting provider and domain registrar and templates the abuse reports for you.
Security engineer by day (and often by night too…)
This blog is where I try to share my mental models about security that I find useful.
You can follow what I’m doing on any of these platforms below. Currently most active on Bluesky
👇🏻