Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Phishing Is Big Business

    Written by

    Dennis Fisher
    Published March 7, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The raid was like something out of a Michael Mann movie: Police in four Brazilian states swept through the homes and businesses of dozens of suspects, tagging evidence that included cash, PCs and piles of stolen merchandise. Police said the suspects were involved in a sophisticated, organized criminal ring responsible for stealing cash and property worth more than $30 million. When the October roundup ended, Brazilian authorities had more than 50 suspects in custody.

      But in a South American country that sees its share of raids related to drug trafficking and kidnapping, this was no routine monthly roundup of local narcotrafficante. This was a massive, coordinated operation targeting the heart of Brazils burgeoning phishing underworld.

      Phishing, which first appeared more than 10 years ago, has grown from humble roots to become the international electronic crime of choice for amateurs and professionals alike.

      In its simplest form, phishing involves sending out fake e-mail messages that ask recipients to enter personal information, such as bank account numbers, PINs or credit card numbers, into forms on Web sites that are designed to mimic bank or e-commerce sites.

      /zimages/5/28571.gifClick here to read more about a Phishing-related redirect on eBay.

      Once users fall for the trick, the criminals behind the scams use the information they gather to withdraw money directly from victims bank accounts, have new credit cards made under false names and go on frantic shopping sprees.

      Alternatively, scammers will sell or trade stolen credit card numbers in online forums, where a single stolen account number typically fetches a dollar or two.

      Phishers move fast. From establishing fake sites and sending e-mails to the collection of information and the actual thefts, a typical phishing attack takes less than a week. Many fake sites are online for just two or three days, and most of the actual phishing activity takes place in the first 24 hours after messages are sent, experts say.

      The Brazilian phishing gang was using a sophisticated scheme in which thousands of messages were sent to bank customers whose addresses were culled from a list stolen by a bank employee.

      The e-mails told customers that they needed to update online banking credentials and included an attachment that was actually a Trojan. Once a user opened the attachment, the Trojan modified the PCs host file to point the machine to a malicious Web site instead of the legitimate banking site.

      The allure of such scams is easy to see: With a bare amount of technical skill, huge sums of money can be won with only a slight risk of being caught.

      Next Page: Organized crime takes a hand.

      Organized Crime Takes a


      Hand”>

      The ratio of risk to reward has drawn the attention of several organized crime groups in Brazil and in Eastern Europe, where the Russian mafia and its offshoots have assembled crews of crackers, fences and code writers who handle everything from creating and sending fraudulent e-mails to converting ill-gotten goods into hard currency, according to law enforcement officials and security experts involved in fighting phishing.

      “We see a lot of organization in the phishing gangs, but its just one piece of the game for them,” said Larry Johnson, special agent in charge of the Criminal Investigative Division at the U.S. Secret Service, in Washington, which, along with the FBI, investigates electronic fraud.

      “These groups are involved in hacking, setting up botnets, writing viruses. But there is a hierarchy like in traditional Mafia groups. The more successful you are, the higher up you go, and the more access you have, the better status you have,” Johnson said.

      Phishing scams began in the mid-1990s as a way to steal Internet access. Back then, when ISPs such as America Online Inc. charged by the minute for dial-up access, scammers would send e-mails purporting to come from AOLs member services department and ask recipients to verify user names and passwords. The scammers would then log on using the victims accounts and run up huge access bills.

      /zimages/5/28571.gifClick here to read how the private sector and the feds are teaming up against phishing.

      With the advent of flat-rate broadband connections, the scam fell by the wayside, only to be replaced in the early part of this decade by myriad credit card and bank account schemes. But it wasnt until 2003 that the current wave of phishing attacks began in earnest.

      The success of online banking and bill-paying services meant millions of customers were comfortable entering account numbers and other sensitive information on Web sites.

      As a result, few people thought twice when they received e-mails that seemed to come from Bank of America Corp. or PayPal Inc., asking for account information.

      In January 2003, the Anti-Phishing Working Group, a consortium of security vendors, banks and other concerned parties, recorded 176 unique phishing attacks. By December 2004, the group was seeing more than 1,700 unique attacks. What began as a nuisance had turned into an epidemic in less than two years.

      “A very large volume of activity came out of nowhere in 2003. These groups that were doing it now were well-organized and had a way to distribute the stolen goods,” said Ken Dunham, director of malicious code at iDefense Inc., a security intelligence services company in Reston, Va. “Some of these people are very proficient. The expense is low, and the risk is low, and the ability to make money is very high. Phishing is seriously underreported [by victims]. Its a huge business.”

      For victims, however, its a nightmare come true. Lori Lee-Savage, an administrative assistant who lives in College Park, Md., was Christmas shopping in December when her ATM card was declined for a small purchase. When she contacted her bank, the manager told her she was overdrawn by nearly $200.

      Baffled, Lee-Savage eventually discovered that someone had stolen her bank account number and online banking credentials and begun draining her account.

      The thieves had new checks made, complete with a false name and address in Georgia. They stole $3,100 before Lee-Savage discovered the problem. The bank reimbursed the losses, except for about $300 in overdraft penalties. Lee-Savage still doesnt know exactly when she gave her information away.

      “I know the e-mail scams are fakes, but with the way technology improves, the scam artists are way ahead,” Lee-Savage said. “Im pretty thankful it was only $3,000.”

      To maximize earning power and reduce chances of arrest, phishing groups have begun hiring so-called money mules, bank employees who are willing to move dirty money among accounts to launder it and make it more difficult to trace.

      Some crews have also set up what amount to phishing sweatshops, where people are forced to do the grunt work, such as coding, for tiny cuts of the profits, Dunham said.

      Phishing came into its own with the organizational resources and manpower of the Russian mafia and Brazilian gangs, and the elusiveness of these groups has made arrests and prosecutions rare. Many in the security industry say the government and federal law enforcement agencies need to commit more resources to the problem.

      “We need to create an identity theft task force to create clarity and focus on this,” said Bill Conner, CEO of Entrust Inc., a security vendor in Addison, Texas, that works closely with federal officials on security issues. “Its got to be cross-departmental in the government. There will be innovation required to solve this.”

      Next Page: Law enforcement officials say theyre doing the best they can.

      Law Enforcement Doing Its


      Best”>

      Law enforcement officials said theyre doing the best they can under the circumstances. “The sites come and go really fast. We usually target an informant or look for data on an attack in one of the Internet groups where we have people,” said the Secret Services Johnson.

      “Its tough to track. Were making a lot of inroads with international prosecution, but there are countries where we dont have agreements. Then we have to have a dialogue to educate law enforcement,” Johnson said.

      In one of the few phishing-related arrests in recent months in the United States, law enforcement officials in Massachusetts took down Andrew Schwarmkoff, a suspected member of a Russian organized-crime group who is charged with running an extensive and profitable phishing scheme.

      When he was arrested in October, Schwarmkoff was found with about $15,000 in cash, several thousand dollars worth of stolen merchandise and personal data belonging to more than 100 victims, according to law enforcement authorities.

      Such cases have the attention of legislators. Congress has introduced a series of bills this year targeting online identity theft. Last week, Sen. Patrick Leahy, D-Vt., launched legislation aimed at phishing.

      The ranking Democrat on the Senate Judiciary Committee said wire fraud and ID theft laws are not adequate in this battle because they depend on someone being defrauded first, and phishing scams are often too difficult to track once a victim is identified. The Anti-Phishing Act of 2005 would criminalize fraudulent Web sites created for the purpose of crime.

      Meanwhile, federal law enforcement agencies have begun working with private organizations in a bid to respond more quickly to new attacks.

      One such group is the Internet Crime Prevention & Control Institute, a cooperative effort between Zero Spam Network Corp. and the University of Miami. Staffed by Miami undergraduate and graduate students and Zero Spam employees, the ICPCI works closely with the Secret Services Electronic Crimes Task Force and ISPs in the United States and abroad to identify and block traffic to machines hosting phishing sites.

      /zimages/5/28571.gifClick here to read about the Phish Report Network, a planned Phishing early warning service.

      Bill Franklin, president of Zero Spam, in Coral Gables, Fla., and his team at the ICPCI, also in Coral Gables, often work directly with CERT teams and service providers in countries such as China, South Korea and Brazil to choke off traffic flowing to phishing sites.

      Because many scam sites are hosted by tiny ISPs in remote areas, its often faster and simpler to locate the peering points of the service provider that hosts a phishing site and ask the ISP to block the site, Franklin said. Security teams and most ISPs in foreign countries have proved cooperative and effective at taking down phishing sites, he said.

      “Six or eight months ago, it might take 10 or 14 days to get a site taken down, and by then the damage was done,” said Franklin. “Now, I can get someone on the phone any time of the day or night who knows who I am and what to do. We can have sites down in a few hours.”

      Blocking traffic or taking sites down is one thing, but finding and prosecuting those responsible for the scams is the real goal, and that has proved difficult.

      But despite the continued flood of phishing e-mails, the Secret Services Johnson is optimistic that the problem may have peaked. “I think a lot of people have reached the conclusion that it will go away once everyone is educated,” Johnson said. “Its starting to taper off in terms of success rate.”

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×