Spoofing attack
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.[1]
Internet
Spoofing and TCP/IP
Many of the protocols in the
Domain name spoofing
The term 'Domain name spoofing' (or simply though less accurately, 'Domain spoofing') is used generically to describe one or more of a class of phishing attacks that depend on falsifying or misrepresenting an internet domain name.[3][4] These are designed to persuade unsuspecting users into visiting a web site other than that intended, or opening an email that is not in reality from the address shown (or apparently shown).[5] Although website and email spoofing attacks are more widely known, any service that relies on domain name resolution may be compromised.
Referrer spoofing
Some websites, especially pornographic
Poisoning of file-sharing networks
"
E-mail address spoofing
The sender information shown in
E-mail address spoofing is done in quite the same way as writing a forged return address using
Geolocation
Telephony
Caller ID spoofing
Public telephone networks often provide
Global navigation satellite system spoofing
A
Even though GNSS is one of the most relied upon navigational systems, it has demonstrated critical vulnerabilities towards spoofing attacks. GNSS satellite signals have been shown to be vulnerable due to the signals’ being relatively weak on Earth’s surface.[13] A reliance on GNSS could result in the loss of life, environmental contamination, navigation accidents, and financial costs.[14][15][16] However, since 80% of global trade is moved through shipping companies, relying upon GNSS systems for navigation remains unavoidable.[17][18]

All GNSS systems, such as the US GPS, Russia's GLONASS, China's BeiDou, and Europe's Galileo constellation, are vulnerable to this technique.[19] In order to mitigate some of the vulnerabilities the GNSS systems face concerning spoofing attacks, the use of more than one navigational system at once is recommended.[20]
The December 2011
In 2019, the British oil tanker Stena Impero was the target of a spoofing attack that directed the ship into Iranian waters where it was seized by Iranian forces. Consequently, the vessel including its crew and cargo were used as pawns in a geopolitical conflict. Several shipping companies with vessels navigating around Iranian waters are instructing vessels to transit dangerous areas with high speed and during daylight.[28]
On October 15, 2023, Israel Defense Forces (IDF) announced that GPS had been “restricted in active combat zones in accordance with various operational needs,” but has not publicly commented on more advanced interference. In April 2024, however, researchers at University of Texas at Austin detected false signals and traced their origin to a particular air base in Israel run by the IDF.[29]
Russian GPS spoofing
In June 2017, approximately twenty ships in the
The mobile systems named
Incidents involving Russian GPS spoofing include during a November 2018 NATO exercise in Finland that led to ship collision (unconfirmed by authorities).[33] and a 2019 incident of spoofing from Syria by the Russian military that affected the civil airport in Tel Aviv.[34][35]
In December of 2022 significant GPS interference in several Russian cities was reported by the GPSJam service; the interference was attributed to defensive measures taken by Russian authorities in the wake of the invasion of Ukraine.[19]
GPS spoofing with SDR
Since the advent of software-defined radio (SDR), GPS simulator applications have been made available to the general public. This has made GPS spoofing much more accessible, meaning it can be performed at limited expense and with a modicum of technical knowledge.[36] Whether this technology applies to other GNSS systems remains to be demonstrated.
Preventing GNSS spoofing
The Department of Homeland Security, in collaboration with the National Cybersecurity and Communications Integration Center (
- Obscure antennas. Install antennas where they are not visible from publicly accessible locations or obscure their exact locations by introducing impediments to hide the antennas.
- Add a sensor/blocker. Sensors can detect characteristics of interference, jamming, and spoofing signals, provide local indication of an attack or anomalous condition, communicate alerts to a remote monitoring site, and collect and report data to be analyzed for forensic purposes.[38]
- Extend data spoofing whitelists to sensors. Existing data spoofing whitelists have been and are being implemented in government reference software, and should also be implemented in sensors.
- Use more GNSS signal types. Modernized civil GPS signals are more robust than the L1 signal and should be leveraged for increased resistance to interference, jamming, and spoofing.
- Reduce latency in recognition and reporting of interference, jamming, and spoofing. If a receiver is misled by an attack before the attack is recognized and reported, then backup devices may be corrupted by the receiver before hand-over.
These installation and operation strategies and development opportunities can significantly enhance the ability of GPS receivers and associated equipment to defend against a range of interference, jamming, and spoofing attacks. A system and receiver agnostic detection software offers applicability as cross-industry solution. Software implementation can be performed in different places within the system, depending on where the GNSS data is being used, for example as part of the device's firmware, operating system, or on the application level.[citation needed]
A method proposed by researchers from the Department of Electrical and Computer Engineering at the University of Maryland, College Park and the School of Optical and Electronic Information at Huazhong University of Science and Technology that aims to help mitigate the effects of GNSS spoofing attacks by using data from a vehicles controller area network (CAN) bus. The information would be compared to that of received GNSS data and compared in order to detect the occurrence of a spoofing attack and to reconstruct the driving path of the vehicle using that collected data. Properties such as the vehicles speed and steering angle would be amalgamated and regression modeled in order to achieve a minimum error in position of 6.25 meters.[39] Similarly, a method outlined by researchers in a 2016 IEEE Intelligent Vehicles Symposium conference paper discuss the idea of using cooperative adaptive cruise control (CACC) and vehicle to vehicle (V2V) communications in order to achieve a similar goal. In this method, the communication abilities of both cars and radar measurements are used to compare against the supplied GNSS position of both cars to determine the distance between the two cars which is then compared to the radar measurements and checked to make sure they match. If the two lengths match within a threshold value, then no spoofing has occurred, but above this threshold, the user is notified so that s/he can take action.[40]
Voice spoofing
Information technology plays an increasingly large role in today's world, and different authentication methods are used for restricting access to informational resources, including voice biometrics. Examples of using speaker recognition systems include internet banking systems, customer identification during a call to a call center, as well as passive identification of a possible criminal using a preset "blacklist".[41]
Technologies related to the synthesis and modeling of speech are developing very quickly, allowing one to create voice recordings almost indistinguishable from real ones. Such services are called
A large number of scientists are busy developing algorithms that would be able to distinguish the synthesized voice of the machine from the real one. On the other hand, these algorithms need to be thoroughly tested to make sure that the system really works.[42] However, an early study has shown that feature design and masking augmentation have a significant impact on the ability to detect spoofed voice.[43]
Facial recognition spoofing
Facial recognition technology is widely employed in various areas, including immigration checks and phone security, as well as on popular platforms like Airbnb and Uber to verify individuals' identities. However, the increased usage has rendered the system more susceptible to attacks, given the widespread integration of facial recognition systems in society. Some online sources and tutorials detail methods for tricking facial recognition systems through practices known as face spoofing or presentation attacks, which can pose risks in terms of unauthorized access. To mitigate these dangers, measures such as liveness checks (verifying blinking), deep learning, and specialized cameras like 3D cameras have been introduced to prevent facial recognition spoofing. It is important to implement comprehensive security procedures like these to protect against face spoofing attempts and uphold the overall security and integrity of systems relying on facial recognition authentication.[44]
See also
- Domain name spoofing – class of phishing attacks that depend on falsifying or misrepresenting an internet domain name
- DNS spoofing – Cyberattack using corrupt DNS data
- Email spoofing – Creating email spam or phishing messages with a forged sender identity or address
- IP address spoofing – Creating IP packets using a false IP address
- IDN homograph attack – Visually similar letters in domain names, mixing letters from different alphabets to trick an unsuspecting user into trusting and clicking on a link, also known as "script spoofing".
- Website spoofing – Creating a website, as a hoax, with the intention of misleading readers
- LAND attack – Denial of Service attack using spoofed network packets
- MAC spoofing – Changing a factory-assigned MAC address
- Phishing – Form of social engineering (most often by telephone or email).
- Stream cipher attacks – Methods to break a stream cipher
Standard facilities that might be subverted
- Protocol spoofing – Benign simulation of a protocol (in order to use another, more appropriate one).
References
- S2CID 15611849.
- ISSN 2079-9292.
- ^ "Canadian banks hit by two-year domain name spoofing scam". Finextra. 9 January 2020.
- ^ "Domain spoofing". Barracuda Networks.
- ^ Tara Seals (August 6, 2019). "Mass Spoofing Campaign Abuses Walmart Brand". threatpost.
- ISBN 0-13-146315-2.
- doi:10.1002/navi.65.
- ^ "VPNs Are Primarily Used to Access Entertainment". GlobalWebIndex Blog. 2018-07-06. Retrieved 2019-04-12.
- ^ Hintze, Haley (2019-03-09). "California Online Poker Pro Forfeits Over $90,000 for Geolocation-Evading New Jersey Play". Flushdraw.net. Retrieved 2019-04-12.
- ^ Schneier, Bruce (3 March 2006). "Caller ID Spoofing". schneier.com. Retrieved 16 January 2011.
- ^ a b Coffed, Jeff (February 2014). "The Threat of GPS Jamming The Risk to an Information Utility" (PDF). Exelis.
- ^ Spravil, J., Hemminghaus, C., von Rechenberg, M., Padilla, E., & Bauer, J. (2023). Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring. Journal of Marine Science and Engineering, 11(5), 928-. https://doi.org/10.3390/jmse11050928
- ^ Spravil, J., Hemminghaus, C., von Rechenberg, M., Padilla, E., & Bauer, J. (2023). Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring. Journal of Marine Science and Engineering, 11(5), 928-. https://doi.org/10.3390/jmse11050928
- ^ Androjna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020). Assessing Cyber Challenges of Maritime Navigation. Journal of Marine Science and Engineering, 8(10), 776-. https://doi.org/10.3390/jmse8100776
- ^ Leite Junior, W. C., de Moraes, C. C., de Albuquerque, C. E. P., Machado, R. C. S., & de Sa, A. O. (2021). A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems. Sensors (Basel, Switzerland), 21(9), 3195-. https://doi.org/10.3390/s21093195
- ^ Spravil, J., Hemminghaus, C., von Rechenberg, M., Padilla, E., & Bauer, J. (2023). Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring. Journal of Marine Science and Engineering, 11(5), 928-. https://doi.org/10.3390/jmse11050928
- ISBN 978-3-031-17142-0.
- PMID 34064505.
- ^ ISSN 1059-1028.
- .
- ^ Scott Peterson; Payam Faramarzi (December 15, 2011). "Exclusive: Iran hijacked US drone, says Iranian engineer". Christian Science Monitor.
- ^ Wen, Hengqing; Huang, Peter; Dyer, John; Archinal, Andy; Fagan, John (2004). "Countermeasures for GPS signal spoofing" (PDF). University of Oklahoma. Archived from the original (PDF) on 15 March 2012.
- ^ Humphreys, T.E.; Ledvina, B. M.; Psiaki, M.; O'Hanlon, B. W.; Kintner, P.M. (2008). "Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer" (PDF). Ion GNSS. Retrieved 16 December 2011.
- ^ Jon S. Warner; Roger G. Johnston (December 2003). "GPS Spoofing Countermeasures". Los Alamos Research Paper. LAUR-03-6163. homelandsecurity.org. Archived from the original on 7 February 2012. Retrieved 16 December 2011.
- ^ "Students Hijack Luxury Yacht". Secure Business Intelligence Magazine.
- ^ Leahy, Cory (29 July 2013). "UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea". Ut News. Retrieved 5 February 2015.
- ^ Norwegian Broadcasting Corporation. Archived from the originalon September 25, 2017.
- ^ Androjna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020). Assessing Cyber Challenges of Maritime Navigation. Journal of Marine Science and Engineering, 8(10), 776-. https://doi.org/10.3390/jmse8100776
- ^ Arraf, Jane (April 22, 2024). "Israel fakes GPS locations to deter attacks, but it also throws off planes and ships". NPR. Retrieved 2 June 2024.
- ^ Goward, Dana A. (July 11, 2017). "Mass GPS Spoofing Attack in Black Sea?". The Maritime Executive.
An apparent mass and blatant, GPS spoofing attack involving over 20 vessels in the Black Sea last month has navigation experts and maritime executives scratching their heads.
- Norwegian Broadcasting Corporation (September 14, 2017). "Moscow correspondent Morten Jentoft shows GPS trouble near Kremlin". YouTube. Retrieved September 25, 2017.
- ^ Cranny-Evans, Samuel (14 June 2019). "Russia trials new EW tactics". Janes.com.
- ^ "Russia suspected of jamming GPS signal in Finland". BBC News. 12 November 2018. Retrieved 28 December 2019 – via BBC.
- ^ Times Of Israel (5 August 2019). "Disruption of GPS systems at Ben Gurion Airport resolved after 2 months". Retrieved 29 December 2019 – via Times of Israel.
- ^ JOFFRE, TZVI; BOB, YONAH JEREMY (23 July 2019). "MI6 fears Iran used Russian GPS tech to send UK tanker off course - report". The Jerusalem Post.
- ^ DEFCONConference (27 October 2017). "DEF CON 25 - David Robinson - Using GPS Spoofing to control time". Retrieved 7 April 2018 – via YouTube.
- ^ The Department of Homeland Security. "Improving the Operation and Development of Global Positioning System (GPS) Equipment Used by Critical Infrastructure". Retrieved November 12, 2017.
- ^ Lundberg, Erik; McMichael, Ian (2018). "Novel Timing Antennas for Improved GNSS Resilience" (PDF). Mitre Corporation.
- ^ Wang, Qian & Lu, Zhaojun & Qu, Gang. (2018). Edge Computing based GPS Spoofing Detection Methods. 10.1109/ICDSP.2018.8631600.
- .
- ISBN 978-3-319-11581-8.
- S2CID 214595791.
- S2CID 239050551.
- S2CID 9540938.