Phishing, Fraudulent, and Malicious Websites

Phishing, Fraudulent, and Malicious Websites

<p>Whether we like it or not&comma; we are all living in the Information Age&period; We have nothing left but adapt to rapidly developing information technology&comma; no matter who we are and what we do for living&period;<&sol;p>&NewLine;<p>The Internet&comma; in particular&comma; means for us boundless opportunities in life and business &&num;8211&semi; but also lots of dangers unheard of just a decade ago&period; We should be aware of these dangers if we want to use the huge potential of the Internet and to avoid the hazards it brings us&period;<&sol;p>&NewLine;<blockquote><p><strong>Warning&colon; There are Websites You&&num;8217&semi;d Better Not Visit<&sol;strong><&sol;p><&sol;blockquote>&NewLine;<h2>Phishing websites<&sol;h2>&NewLine;<p>Thanks to authors of numerous articles on this topic&comma; &&num;8220&semi;classic&&num;8221&semi; phishing technique is relatively well known&period; This scam involves setting bogus websites and luring people to visit them&comma; as a rule&comma; by links in emails&period; <strong>Phishing website<&sol;strong> is disguised to look like a legitimate one &&num;8212&semi; of a bank or a credit card company&comma; and users are invited to provide their identifying information&period; Sites of this kind are used solely to steal users&&num;8217&semi; passwords&comma; PIN numbers&comma; SSNs and other <span style&equals;"line-height&colon; 1&period;5&semi;">confidential information&period;<&sol;span><&sol;p>&NewLine;<p>At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks&period; The more people got aware of the scam&comma; the less spelling mistakes these messages contained&comma; and the more these <em>fraudulent websites<&sol;em> resembled legitimate ones&period; Phishers are getting smarter&period; They eagerly learn&semi; there is enough money involved here to turn criminals into earnest students&period;<&sol;p>&NewLine;<h2>Keyloggers and Trojans<&sol;h2>&NewLine;<p>Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing&period; This technique includes contaminating a PC with a Trojan horse program&period; The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites&period; Then the keylogger comes to life to do what it was created for &&num;8212&semi; to steal information&period;<&sol;p>&NewLine;<p>It seems that this technique is actually a separate <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;scam&sol;">scam<&sol;a> aimed at stealing personal information and such attacks are on the rise&period; Security vendor <a href&equals;"https&colon;&sol;&sol;www&period;symantec&period;com&sol;">Symantec<&sol;a> warns about commercialisation of malware &&num;8212&semi; <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;cyber-criminals-how-protect-your-business&sol;">cyber-criminals<&sol;a> prefer cash to fun&comma; so various kinds of information-stealing software are used more actively&period;<&sol;p>&NewLine;<h2>Fraudulent websites are on the rise<&sol;h2>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;forcepoint&period;com">Websense Security Labs<&sol;a> &&num;8212&semi; a well-known authority in information security &&num;8212&semi; noticed a dramatic rise in the number of fraudulent websites as far back as in the second half of 2004&period; These sites pose as ones for e-commerce&semi; they encourage users to apply for a reward or purchase something&comma; of course never delivering the product or paying money&period; The most popular areas for such fraud are online pharmacies&comma; lottery scams&comma; and loan &sol; <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;mortgage&sol;" title&equals;"mortgage" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"43">mortgage<&sol;a> sites&period; Experts predict there will be more fake merchants in future and their scams will become more sophisticated&period;<&sol;p>&NewLine;<h2>A Hybrid Scam<&sol;h2>&NewLine;<p>In April <a href&equals;"http&colon;&sol;&sol;www&period;pandasecurity&period;com&sol;"><strong>Panda Software<&sol;strong><&sol;a> warned Internet users of a new particularly brazen scam aimed at stealing confidential information&period; The technique used here looks like a hybrid between phishing and a fraudulent website&period;<&sol;p>&NewLine;<p><em>Panda Software<&sol;em> identified several websites offering cheap airline tickets which in fact weren&&num;8217&semi;t selling anything&semi; the aim was to cheat users out of credit card details&period;<&sol;p>&NewLine;<p><em><strong>This scam is very simple<&sol;strong><&sol;em>&semi; the thieves simply wait until some unsuspecting user who is searching for&comma; say&comma; airline ticket offers&comma; finds their site offering dirt-cheap airline tickets&period; Really pleased with himself and looking forward to the trip&comma; the user fills in the form&comma; entering his credit card number&comma; expiry date and verification value &lpar;CVV&rpar;&period;<&sol;p>&NewLine;<p>As soon as these details have been entered&comma; an error page appears&semi; it tells the user that the transaction has been unsuccessful&comma; and offers instructions on how to pay for the ticket by postal money order&period; So the user may well be fooled twice&period; He loses his credit card details&comma; putting them right into the hands of cyber-crooks&comma; and then loses money&comma; if decides to buy the ticket by money order&period;<&sol;p>&NewLine;<p>Of course&comma; these sites have already been disabled&comma; but who knows whether &lpar;or better to say when&rpar; other ones will appear again&comma; this time offering all kinds of products&period;<&sol;p>&NewLine;<p><em>Malicious websites<&sol;em> are especially dangerous&period; <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;white-collar-crime&sol;">Cyber-criminals<&sol;a> create them exclusively to execute malicious code on the visitors&&num;8217&semi; computers&period; Sometimes hackers infect legitimate sites with malicious code&period;<&sol;p>&NewLine;<p><em>Bad news for blog readers<&sol;em>&colon; blogs can be contaminated&comma; too&period; Since January&comma; <a href&equals;"https&colon;&sol;&sol;www&period;forcepoint&period;com">Websense Security Labs<&sol;a> has discovered hundreds of these &&num;8220&semi;toxic&&num;8221&semi; blogs set by hackers&period;<&sol;p>&NewLine;<p><em>When unsuspecting users visit malicious sites<&sol;em>&comma; various nasty applications are downloaded and executed on their computers&period; Unfortunately&comma; more and more often these applications contain keyloggers&&num;8211&semi;software programs for intercepting data&period;<&sol;p>&NewLine;<p><strong>Keyloggers<&sol;strong>&comma; as it is clear from the name of the program&comma; log keystrokes &&num;8211&semi;but that&&num;8217&semi;s not all&period; They capture everything the user is doing &&num;8212&semi; keystrokes&comma; mouse clicks&comma; files opened and closed&comma; sites visited&period; A little more sophisticated programs of this kind also capture text from windows and make screenshots &lpar;record everything displayed on the screen&rpar; &&num;8211&semi; so the information is captured even if the user doesn&&num;8217&semi;t type anything&comma; just opens the views the file&period;<&sol;p>&NewLine;<p>In February and March 2005&comma; <a href&equals;"https&colon;&sol;&sol;www&period;forcepoint&period;com">Websense Security Labs<&sol;a> researched and identified about 8-10 new keylogger variants and more than 100 malicious websites which are hosting these keyloggers EACH WEEK&period; From November of 2004 through December 2004 these figures were much smaller&colon; 1-2 new keylogger variants and 10-15 new malicious websites per week&period; There is by all means a disturbing tendency&&num;8211&semi;the number of brand-new keyloggers and malicious website is growing&comma; and growing rapidly&period;<&sol;p>&NewLine;<h2>What a user can do to avoid these sites&quest;<&sol;h2>&NewLine;<p>As for <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;phishing&sol;"><strong>phishing<&sol;strong><&sol;a>&comma; the best advice is not to click any links in any email&comma; especially if it claims to be from a bank&period;<br &sol;>&NewLine;Opening an attachment of a spam message can also trigger the execution of malicious program&comma; for example a keylogger or a keylogger-containing Trojan horse&period;<&sol;p>&NewLine;<p>As for<strong> fraudulent websites<&sol;strong>&comma; maybe buying goods only from trusted vendors will help &&num;8212&semi; even if it is a bit more expensive&period;<&sol;p>&NewLine;<p>As for <strong>malicious websites<&sol;strong>&&num;8230&semi; &&num;8220&semi;Malicious websites that host adult entertainment and shopping content can exploit Internet Explorer vulnerabilities to run code remotely without user interaction&period;&&num;8221&semi;&lpar;a quote from the Websense&&num;8217&semi;s report&rpar;&period; What can a user do about it&quest; Not much&comma; but avoiding adult sites and buying only from known and trusted online stores will reduce the risk&period;<&sol;p>&NewLine;<p><strong>Hackers<&sol;strong> also attract traffic to malicious websites by sending a link through spam or spim &lpar;the analog of spam for instant messaging &lpar;IM&rpar;&period; So a good advice never follow links in spam is worth remembering once more&period;<&sol;p>&NewLine;

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.