News - Security

 

Phishing Scams Gets Savvier - E-week Magazine - Dennis Fisher - May 2, 2004
'
A new breed of sophisticated e-mail attack that is difficult to detect and defend against is further proof that cyber-criminals and scam artists are getting more serious about their efforts to steal information.

The new attack is an enhanced form of phishing, scams that are defined as attempts to steal credit card data and other sensitive information through social-engineering efforts. Phishing scams typically employ phony e-mail messages that purport to come from banks or popular Web sites such as eBay or PayPal. The messages try to lure recipients into entering account information and passwords into bogus forms hosted on malicious Web sites.

Scammers are now taking phishing to the next level. Instead of relying on victims' gullibility, they are using technological tricks borrowed from crackers and virus writers to exploit software vulnerabilities and plant Trojans on compromised computers.

An example of this new approach is an e-mail message that began circulating last week with the purpose of installing a Trojan known as Sepuc. The e-mail has no subject line and no text in the body of the message. When the user opens the message, code hidden in the e-mail attempts to exploit a known vulnerability in Microsoft Corp.'s Internet Explorer to force a download from a remote machine.

This file, in turn, downloads several other pieces of code and eventually installs a Trojan capable of harvesting data from the PC and sending it to a remote machine, experts say. The most worrisome aspect of this attack is that, unlike previous scams, victims would likely have no idea that they had done anything wrong.

"If it works successfully, it's just a blank e-mail, and you don't see anything else. It's a whole new trend for this stuff," said Bill Franklin, president of Zero Spam Network Corp., in Miami. Franklin has been tracking the new attacks since receiving and thwarting such malicious missives last week. "Having your account information compromised and not knowing it is the scary part. This is the best thing I've ever seen like this," he said.

Phishing is a relatively recent phenomenon, having popped up within the past year. But it is becoming more popular with online criminals. In September, MessageLabs Inc., a New York-based e-mail security company, saw 279 phishing-related e-mail messages. By March, that number had jumped to 215,643. Likewise, the Anti-Phishing Working Group, a volunteer consortium that monitors online scams, reported last week that it tracked 402 unique phishing scams in March, an increase of 43 percent from February.

PointerClick here to read more about phishing.

Most typical phishing e-mail messages are poorly constructed and rife with misspelled words and, as such, are easily identifiable as fakes. But the Sepuc attack and a more sophisticated new version of the eBay scam, which also exploits an IE flaw to install a keystroke logger on compromised PCs to steal user names and passwords, don't immediately strike recipients as malicious.
   
  Phish fry

Characteristics of new attacks:

 

  • Use software vulnerabilities to force PCs to download code

     

  • Install Trojans on compromised machines to gather data

     

  • Harvest user names and passwords for distribution to attackers

     

  • Compromise machines without user's knowledge
  • The increasing sophistication of the new attacks is not just the result of criminals getting better at their craft; they're also starting to cooperate with crackers and virus writers to swap ideas and methods.

    "These worlds are starting to collide. The code behind these newer attacks is very polished and, in some cases, even has comments in it," said Dan Maier, a member of the Anti-Phishing Working Group, in Redwood City, Calif. "They're sharing code with crackers, using spamming techniques. It's a scary combination."

    Maier said he has also seen attacks recently in which users who click on a link to a fraudulent Web site are redirected through several sites, some of which attempt to load Trojans or back doors onto the users' machines. So, even if the user is smart enough not to enter any personal information into the Web form, his or her data still could be at risk, said Maier, who also serves as director of product marketing at Tumbleweed Communications Corp., a secure e-mail provider also in Redwood City.

    This fact is not lost on federal law enforcement officials, who have made identity theft and phishing high priorities and are investigating the new breed of attacks, sources say. The attacks also have gotten the attention of banks and other financial institutions that end up dealing with the aftereffects of the fraud that results from these scams.

    "Their concern is more for their reputations than the actual financial losses. They're dealing with people's trust here," said Eli Katz, director of the active risk monitoring practice for Unisys Corp., based in Blue Bell, Pa. "These organizations are walking a fine line with phishing. They want people to be aware, but they don't want them to be so paranoid that they stop doing business with them.

    "The same concept used here could be used to fake any authority, like a company's HR department," Katz said. "You could do a lot of damage with something like that."

      Future Systems And Software
     6-295 Queen Street East
     Suite # 404
     Brampton, Ontario  Canada
     905-450-6256
     Sales@futsyssoft.com
    Become a Fan on Facebook Join us on LinkedIn
    Follow us on Twitter Comment on our Blogs Connect to our RSS feed