Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    Phishing Scams Get Savvier

    Written by

    Dennis Fisher
    Published May 2, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A new breed of sophisticated e-mail attack that is difficult to detect and defend against is further proof that cyber-criminals and scam artists are getting more serious about their efforts to steal information.

      The new attack is an enhanced form of phishing, scams that are defined as attempts to steal credit card data and other sensitive information through social-engineering efforts. Phishing scams typically employ phony e-mail messages that purport to come from banks or popular Web sites such as eBay or PayPal. The messages try to lure recipients into entering account information and passwords into bogus forms hosted on malicious Web sites.

      Scammers are now taking phishing to the next level. Instead of relying on victims gullibility, they are using technological tricks borrowed from crackers and virus writers to exploit software vulnerabilities and plant Trojans on compromised computers.

      An example of this new approach is an e-mail message that began circulating last week with the purpose of installing a Trojan known as Sepuc. The e-mail has no subject line and no text in the body of the message. When the user opens the message, code hidden in the e-mail attempts to exploit a known vulnerability in Microsoft Corp.s Internet Explorer to force a download from a remote machine.

      This file, in turn, downloads several other pieces of code and eventually installs a Trojan capable of harvesting data from the PC and sending it to a remote machine, experts say. The most worrisome aspect of this attack is that, unlike previous scams, victims would likely have no idea that they had done anything wrong.

      “If it works successfully, its just a blank e-mail, and you dont see anything else. Its a whole new trend for this stuff,” said Bill Franklin, president of Zero Spam Network Corp., in Miami. Franklin has been tracking the new attacks since receiving and thwarting such malicious missives last week. “Having your account information compromised and not knowing it is the scary part. This is the best thing Ive ever seen like this,” he said.

      Phishing is a relatively recent phenomenon, having popped up within the past year. But it is becoming more popular with online criminals. In September, MessageLabs Inc., a New York-based e-mail security company, saw 279 phishing-related e-mail messages. By March, that number had jumped to 215,643. Likewise, the Anti-Phishing Working Group, a volunteer consortium that monitors online scams, reported last week that it tracked 402 unique phishing scams in March, an increase of 43 percent from February.

      /zimages/2/28571.gifClick here to read more about phishing.

      Most typical phishing e-mail messages are poorly constructed and rife with misspelled words and, as such, are easily identifiable as fakes. But the Sepuc attack and a more sophisticated new version of the eBay scam, which also exploits an IE flaw to install a keystroke logger on compromised PCs to steal user names and passwords, dont immediately strike recipients as malicious.

      Phish fry

      Characteristics of new attacks:

      • Use software vulnerabilities to force PCs to download code
      • Install Trojans on compromised machines to gather data
      • Harvest user names and passwords for distribution to attackers
      • Compromise machines without users knowledge

      The increasing sophistication of the new attacks is not just the result of criminals getting better at their craft; theyre also starting to cooperate with crackers and virus writers to swap ideas and methods.

      “These worlds are starting to collide. The code behind these newer attacks is very polished and, in some cases, even has comments in it,” said Dan Maier, a member of the Anti-Phishing Working Group, in Redwood City, Calif. “Theyre sharing code with crackers, using spamming techniques. Its a scary combination.”

      Maier said he has also seen attacks recently in which users who click on a link to a fraudulent Web site are redirected through several sites, some of which attempt to load Trojans or back doors onto the users machines. So, even if the user is smart enough not to enter any personal information into the Web form, his or her data still could be at risk, said Maier, who also serves as director of product marketing at Tumbleweed Communications Corp., a secure e-mail provider also in Redwood City.

      /zimages/2/28571.gifFor insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      This fact is not lost on federal law enforcement officials, who have made identity theft and phishing high priorities and are investigating the new breed of attacks, sources say. The attacks also have gotten the attention of banks and other financial institutions that end up dealing with the aftereffects of the fraud that results from these scams.

      “Their concern is more for their reputations than the actual financial losses. Theyre dealing with peoples trust here,” said Eli Katz, director of the active risk monitoring practice for Unisys Corp., based in Blue Bell, Pa. “These organizations are walking a fine line with phishing. They want people to be aware, but they dont want them to be so paranoid that they stop doing business with them.

      “The same concept used here could be used to fake any authority, like a companys HR department,” Katz said. “You could do a lot of damage with something like that.”

      /zimages/2/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis.
      Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page: http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo2.gif

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×