Extrapolating from a few hundred IPs, each issuing 105 requests per month, creating nearly 40,000 HTTP requests per month for the Luring attack, each potentially resulting in the victim’s site loss from customers switching to one of the competitor’s sites. Before we get into the details of how attackers use the Tor networks to mount Luring attacks, here’s a brief explanation of what luring attacks are.
Picture a guy, we’ll call him Phil, signing into his online dating account and finding a new message from an attractive woman (no guy ever pauses and wonders how they got so lucky! Linda, the woman, messages Phil flirtatiously claiming that she is attracted to him and that she would like to know him better (serendipity right? Then, Linda says—just one small thing, since this is my sister’s account, please contact me under the same name in another dating site here, linking to another dating site (seems innocuous, what could go wrong? At the same time, Annika and Michaela are also messaging in an identical fashion to other users on the same site (alarm bells going off yet? Figure 1 – Promoted site As you probably guessed, “Linda,” “Annika” or “Michaela,” are all part of a Luring attack campaign, mounted by a competing dating site to lure users from the victim site to the attacker site.
We assist busy professionals who are too busy for online dating or would prefer not meeting someone at the bar.
If you are serious about establishing a long term committed relationship, we are ideal for you.
We help busy professionals who don't have time to online date or don't want to meet someone in a bar.
If you are looking to enter a serious long term relationship, you've come to the right place.
As shown in Figure below, the attackers obfuscate URLs to avoid URL detectors in mechanisms aimed to prevent exactly this kind of attack.