Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Study: Phishers Get More Sophisticated

    Written by

    Matthew Broersma
    Published May 20, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A technical study of phishing techniques published this week by the Honeynet Project has found that large numbers of users are still being readily tricked into visiting fake sites designed to harvest banking and financial details, despite massive efforts to educate consumers.

      The study found that, far from being carried out by isolated hackers, such scams appear to be the work of highly organized groups employing huge networks of compromised systems—called botnets—and using increasingly sophisticated techniques.

      Phishing is a type of online scam that attempts to collect information such as credit card and bank account details by luring users to malicious Web sites counterfeiting those of well-known, trusted institutions. Popular targets include major banks and e-commerce sites such as eBay or PayPal. Users are typically lured to the sites via authentic-looking e-mails that appear as if they come from the institution; these are sent out in bulk from the same types of compromised systems used to host the fake sites.

      Security experts have warned of a dramatic increase in phishing activity for months, but the Honeynet study offers a new level of technical detail into the workings of such scams, as well as fresh evidence of the growing scale of the problem.

      The project drew its analysis from honey pots, or systems set up to present attractive targets for attackers—for instance with older operating systems that contain well-known vulnerabilities. A honey net is a large network of such systems. The study is based on analysis of multiple attacks against honey pots deployed by the German and U.K. Honeynet Projects.

      Researchers said they were surprised at the ease with which hundreds of users were lured to the fake sites set up using the honey nets. A site set up on the U.K. honey net, mimicking a bank, received 265 visits in four days. The German system was used to redirect traffic to a fake site in China, and researchers observed the redirection of 721 unique IP addresses within a period of about 36 hours.

      “We were surprised by how many users were apparently being tricked into accessing such content through phishing e-mails,” the study said.

      /zimages/6/28571.gifClick here to read about reports that phishing attacks may be declining.

      The way the scams were set up hinted at groups of well-organized, technically advanced scammers, researchers said. In some cases users began trying to access a site before it had been completely set up, suggesting the spam e-mails promoting the bogus site were being sent from an entirely different server. “Well-constructed and officially branded pre-built fake Web sites are routinely being deployed onto compromised servers—often targeting multiple organizations via separate micro sites, with separate Web server document roots, along with the necessary tools to propagate spam e-mails to potential phishing victims,” the study said.

      Researchers found evidence that the scammers were making use of botnets, or large networks of remotely controlled systems, for sending spam, hosting sites or redirecting traffic. During a five-month period late in 2004, the German Honeynet Project observed 100 separate botnets. Scammers also appeared to be using intermediaries to transfer funds internationally, in order to escape detection by financial authorities.

      While security professionals are well aware of the scale of phishing scams, the ordinary people targeted by the scammers often havent even heard the term before, according to Carole Theriault, a security consultant with Sophos plc. “Phishing is essentially a con trick, its an age-old technique using new technology,” she said. “They look good, and when people see these they cant imagine that its some guy trying to get in their pocket and get their cash.”

      Technical solutions can only go so far toward preventing the problem, she said. “By definition there is no malware in it. It goes after the bug in peoples brains that makes them want to believe the experts,” she said. “Being vigilant is paramount in stopping this.”

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matthew Broersma
      Matthew Broersma

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.