skip to main content
10.1145/2556288.2557330acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking

Published:26 April 2014Publication History

ABSTRACT

With so much of our lives digital, online, and not entirely under our control, we risk losing access to our communications, reputation, and data. Recent years have brought a rash of high-profile account compromises, but account hijacking is not limited to high-profile accounts. In this paper, we report results of a survey about people's experiences with and attitudes toward account hijacking. The problem is widespread; 30% of our 294 participants had an email or social networking account accessed by an unauthorized party. Five themes emerged from our results: (1) compromised accounts are often valuable to victims, (2) attackers are mostly unknown, but sometimes known, to victims, (3) users acknowledge some responsibility for keeping their accounts secure, (4) users' understanding of important security measures is incomplete, and (5) harm from account hijacking is concrete and emotional. We discuss implications for designing security mechanisms to improve chances for user adoption.

References

  1. Aaron, G. & Rasmussen, R., 'Global Phishing Survey: Trends and Domain Name Use in 2H2012,' Anti-Phishing Working Group, (2013).Google ScholarGoogle Scholar
  2. Adams, A., & Sasse, M.A., Users are not the enemy, Communications of the ACM, 42(12), (Dec 1999), 40--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. The Associated Press, 'Twitter feeds of UK's Guardian newspaper hacked,' (Apr 29, 2013).Google ScholarGoogle Scholar
  4. Beautement, A., Sasse, M.A., & Wonham, M., 'The compliance budget: managing security behaviour in organisations.' Proceedings of the Workshop on New Security Paradigms, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bonneau, J., 'The Gawker hack: how a million passwords were lost,' Light Blue Touchpaper Blog, (Dec 15, 2010).Google ScholarGoogle Scholar
  6. Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., & Sleeper, M., 'Improving Computer Security Dialogs,' Proceedings of INTERACT '11, (2011), 18--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bridis, T., 'Hacker impersonated Palin, stole e-mail password,' Associated Press, (Sep 18, 2008).Google ScholarGoogle Scholar
  8. Bright, P., 'Military Meltdown Monday : 90K military usernames, hashes released,' arstechnica, (Jul 12, 2011).Google ScholarGoogle Scholar
  9. Bright, P., 'Anonymous speaks: the inside story of the HBGary hack,' (Feb 15, 2011).Google ScholarGoogle Scholar
  10. Buhrmester, M., Kwang, T., & Gosling, S.D., 'Amazon's Mechanical Turk A New Source of Inexpensive, Yet High-Quality, Data,' Perspectives on Psychological Science, 6(1), (2011), 3--5.Google ScholarGoogle ScholarCross RefCross Ref
  11. Camp, L.J., 'Mental Models of Privacy and Security,' IEEE Technology & Society, (2006).Google ScholarGoogle Scholar
  12. Cranor, L.F., 'A Framework for Reasoning About the Human in the Loop,' Proceedings of the Conference on Usability, Psychology, & Security: UPSEC '08, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Doyle, K., 'Second LulzSec hacker sentenced,' ITWeb, (Aug 12, 2013).Google ScholarGoogle Scholar
  14. Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov, K., & Herley, C., 'Does My Password Go up to Eleven' The Impact of Password Meters on Password Selection, Proceedings of the Conference on Human Factors in Computing Systems: CHI '13, (2013), 237988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Florencio, D. & Herley, C., "Where do security policies come from'" Proceedings of the Symposium on Usable Privacy & Security: SOUPS '10, (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Google Consumer Surveys, http://www.google.com/insights/consumersurveys/how.Google ScholarGoogle Scholar
  17. Grosse, E. & Upadhay, M., 'Authentication at Scale.' IEEE Security and Privacy, vol. 11, (Jan/Feb 2013), 1522. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Harbach, M., Fahl, S., Rieger, M., & Smith, M., 'On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards,' Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013), 245--64.Google ScholarGoogle Scholar
  19. Honan, M., 'How Apple and Amazon Security Flaws Led to my Epic Hacking,' Wired, (Aug 6, 2012).Google ScholarGoogle Scholar
  20. Honan, M., 'Mat Honan: How I Resurrected My Digital Life After an Epic Hacking,' Wired, (Aug 17, 2012).Google ScholarGoogle Scholar
  21. Kittur, A., Chi, E.H., & Suh, B., 'Crowdsourcing User Studies With Mechanical Turk,' Proceedings of the Conference on Human Factors in Computing Systems: CHI '08, (2008), 453--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Landis, J.R. & Koch, G.G., 'The measurement of observer agreement for categorical data,' Biometrics 33, (1977), 159--74.Google ScholarGoogle ScholarCross RefCross Ref
  23. Mazurek, M.L., Arsenault, J.P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L.F., Ganger, G.R., & Reiter, M.K., 'Access control for home data sharing: Attitudes, needs and practices,' Proceedings of the Conference on Human Factors in Computing Systems: CHI '10, (Apr 2010), 645--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. McDonald, P., Mohebbi, M., & Slatkin, B., 'Comparing Google Consumer Surveys to Existing Probability and Non-Probability Based Internet Surveys,' Google Whitepaper, Retrieved from http://www.google.com/insights/consumersurveys/static /consumer_surveys_whitepaper.pdf.Google ScholarGoogle Scholar
  25. Microsoft, Microsoft Security Intelligence Report, Vol. 14, (2012), Retrieved from http://www.microsoft.com/security/sir/default.aspx.Google ScholarGoogle Scholar
  26. O'Mahony, J., 'Financial Times hacked by Syrian Electronic Army,' (May 17, 2013).Google ScholarGoogle Scholar
  27. Onion Inc.'s Tech Team. 'How the Syrian Electronic Army Hacked The Onion,' (May 8, 2013).Google ScholarGoogle Scholar
  28. Paolacci, G., Chandler, J., & Ipeirotis, P., 'Running experiments on Amazon Mechanical Turk,' Judgment & Decision Making, 5(5), (2010), 411--9.Google ScholarGoogle Scholar
  29. Perlroth, N. & Shear, M.D., 'In Hacking, A.P. Twitter Feed Sends False Report of Explosions,' The New York Times: The Caucus, (Apr 23, 2013).Google ScholarGoogle Scholar
  30. Rader, E., Wash, R., & Brooks, B., 'Stories as Informal Lessons about Security,' Proceedings of the Symposium on Usable Privacy and Security: SOUPS '12, (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Rainie, L., Kiesler, S., Kang, R., & Madden, M., 'Anonymity, Privacy, and Security Online,' Pew Research Center, (Sep 2013).Google ScholarGoogle Scholar
  32. Schechter, S., Egelman, S., and Reeder, R.W., 'It's Not What You Know, but Who You Know: A Social Approach to Last-Resort Authentication,' Proceedings of the Conference on Human Factors in Computing Systems: CHI '09, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Schechter, S., & Reeder, R.W., '1 + 1 = You: Measuring the Comprehensibility of Metaphors for Configuring Backup Authentication,' Proceedings of the Symposium on Usable Privacy & Security: SOUPS '09, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Schonfeld, E., 'Twitter's @Ev Confirms Hacker Targeted Personal Accounts; Attack Was 'Highly Distressing,'' (Jul 14, 2009).Google ScholarGoogle Scholar
  35. Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N., & Cranor, L.F., 'Encountering stronger password requirements: user attitudes and behaviors.' Proceedings of the Symposium on Usable Privacy & Security: SOUPS '10, (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sosik, V.S., Bursztein, E., Consolvo, S., Huffaker, D., Kossinets, G., Liao, K., McDonald, P., & Sedley, A., 'Online Microsurveys for User Experience Research,' CHI '14 Extended Abstracts on Human Factors in Computing Systems, (2014 to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wash, R., 'Folk Models of Home Computer Security,' Proceedings of the Symposium on Usable Privacy & Security: SOUPS '10, (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Whitten, A. & Tygar, J.D. 'Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,' Proceedings of the USENIX Security Symposium, (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. "My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          April 2014
          4206 pages
          ISBN:9781450324731
          DOI:10.1145/2556288

          Copyright © 2014 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 April 2014

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '14 Paper Acceptance Rate465of2,043submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader