Hello, Michael Barrett here.
Over the few short years that PayPal has been in existence, we’ve been very successful: we now have 78 million active customers globally – more than the population of many countries. We also have an online system that’s designed to make it easy to move money around the globe. And, we have a team of the usual paranoid information security types like me who do our utmost to keep our core online engine safe and secure.
Given all of that, it’s no particular surprise that our brand and our customers were early targets of phishing, and continue to be targets to this day. I have written occasionally on the question of how companies can help their customers protect themselves online, especially from phishing. Perhaps the most detailed of these was in a white paper that I co-wrote, and it gives a pretty good level of detail on our thinking on an entire strategy for addressing phishing: https://www.thepaypalblog.com/2008/04/a-practical-app/
Because of our status, we’re also used often used as an example of whatever particular idea an individual security researcher is arguing for. Alas, that has recently happened when Randy Abrams, Director of Technical Education at ESET, published a blog entry under the sensational title, “PayPal admits to phishing users.” (For the usual infosec crowd who reads thesecuritypractice.com, you all know that ESET is a good and well-recognized anti-virus solution vendor.) You can find the blog entry here: http://www.eset.com/threat-center/blog/2009/12/03/paypal-admits-to-phishing-users#comments
The reason that I’m commenting on this is as follows. In our white paper, we didn’t cover the topic of links in e-mails, but we’ve researched it extensively and have come to certain conclusions about this.
First, we doubt the effectiveness of removing all links in e-mails as a way to eradicate phishing. Every single Internet user on the planet would have to understand that no PayPal e-mails contain links. The whole point of phishing as a crime is that it exploits customer cognitive dissonance around how the Internet and links work.
Thus, even if we didn’t send e-mails with links in them, there would be nothing to prevent criminals from sending phishmails with links, and some small percentage of users would almost certainly fall for those e-mails.
Secondly, the reason that links are so popular in e-mails is because they simplify things for the recipients of the e-mails. In our own analysis of this, we found that there were indeed a certain number of links that we could remove from our e-mails, and we have done so. But, there were others that would be very problematic – sending someone a reference to a transaction, for example. (“Log on, go to your transaction history page, scroll forward three pages, go to the transaction three quarters of the way down the page …”) We have to balance our risk prevention techniques with our customer experience. It’s a delicate balance, and one that we take very seriously.
Instead of removing all links in e-mails, we have embarked on a program to ensure e-mail standardization of legitimate PayPal e-mails. The basic rule that we’re trying to enforce is that links in legitimate PayPal e-mails will always be through paypal.com, and they will always be HTTPS links. We believe that this is defensible territory and that customers can be trained to look for this, although we don’t actively do this much as most users are confused by the link destination URL vs. the link text.
We have indeed done a number of things around consumer education. Our first rule – which Mr. Abrams indeed followed –“forward uncertain PayPal e-mails to firstname.lastname@example.org” is generally a very good one. We also have another one which is effective – “if you’re unsure of the legitimacy of an e-mail, close the e-mail, open a new browser and go to the website concerned (https://www.paypal.comin our case) and just log on there.”
Finally, I will make an admission – we had an error in the system which processes e-mails to email@example.com. It mis-categorized a legitimate e-mail as a spoof one. Of course, we don’t like to make errors. I will explicitly note this though – no harm was done. The infosec crowd very well understands the “crossover error rate” concept. I would much rather that our spoof e-mail processing veers towards extremely low false negative rates, even if it errs occasionally as in this case towards a false positive or two. The consequences of false positives are simply that we look like twits, and those who have the proverbial ax to grind can exploit that. The consequences of false negatives could seriously threaten the online safety of our customers, and so we go to some lengths to ensure that doesn’t happen.