How Phishers Think, Act, and Make a Profit 133
whitehartstag writes with a write up of "the excellent session at Black Hat that detailed 'how phishers create sites, share info and code, and basically are lazy.' They store their stolen data 'on websites that they have hacked into, or on [publically available] sites like guestbooks. And even worse, they are not protecting their stolen data ... which means that all one needs to do to find this info is to reverse engineer a real phisher's website, look at their PHP script, and find out where they are storing the data.'"
How is this useful for law-abiding citizens? (Score:5, Interesting)
I wish the article had good suggestions for how to prevent phishing attacks. Instead, it seems like this article is suggesting I can easily steal already stolen credit-card data.
Re: (Score:2, Funny)
Re:How is this useful for law-abiding citizens? (Score:5, Interesting)
Offhand, the only 'good' thing you could do would be to hoop the database. If it's poorly secured, you could get it to delete all the current records. If it's more secure, you could fill it with slightly bogus data [like real names and addresses, but phony credit card numbers.
This could result in:
-fills up the drive on the computer it's stored on, which would at least temporarily halt more stupid people from adding their data to it
-make it difficult to filter out good entries from bad. The data is kind of correct, they might have to actually pass it to the credit card company to actually check if it's good or not
-if they can't filter out the bad entries, it makes using the database to do 'bulk' transactions easier for the credit card companies to notice [assuming they put much effort into it instead of just passing the cost onto merchants] as it happens, instead of 30 days later when people complain.
Re: (Score:1)
Re: (Score:3, Informative)
Maybe, but you could spoof the IP and/or MAC address of the phishing site, and you've got the code the guy is using to update the database, so you could probably get really close to looking like the real phishing site.
Of course, if the phisher is storing the data on some 3rd party guestbook, you may not want throw thousands of entries a second at it...
And this could easily cross over to the illegal side... Technically, it probably is illegal to write bogus entries into a hackers data, as it would be gainin
Re:How is this useful for law-abiding citizens? (Score:5, Informative)
Certainly over here in Europe you will have just committed an offence. The unauthorised access of someone else's computer is illegal, yes, even those computers being used by criminals. There is no "Robin Hood Excuse" that will change the fact that your actions are illegal. Now, as the US has just been successful in claiming the extradition of a British cracker, I'm sure that the US will be equally happy to extradite all those Americans who hack into European criminals' computers to face charges over here. Alternatively, you might have been suggesting that all phishers are American and that as long as such actions are contained inside the USA it is all entirely acceptable.
That's one of the problems of being a vigilante, you often have to be a criminal to do what you 'believe' to be justice. It doesn't make the vigilante any better in my eyes.
Re: (Score:3, Interesting)
Remember illegal access to a computer is illegal, but anyone running a database full of stolen credit card numbers is probably not going to call the cops on you, especially since to prove you access the system they'd have to keep it pretty much intact.
Re:How is this useful for law-abiding citizens? (Score:5, Insightful)
legality is an issue - why should *you* make the judgement on whether that data is in fact stolen - perhaps that data has been placed their by banking regulators/NHTCU using 'honeypot' card numbers so that tracing can occur to recover funds.
A well known Scottish bank (that I used to work at) were well known for chasing money launderers who have (ab)used their systems to the ends of the earth - often spending more than the consequential fraud loss to do so. In the old days, they used to use marked cheques - nowadays they have hotscan products that will trace payments to affiliated payment networks across international borders.
Yeah, breaking into phishing sites is a lot of fun, but before you "drop table", think about your actions and whether you are breaking the computer misuse act (UK) [opsi.gov.uk] or the Police and Justice Act (Scotland) [opsi.gov.uk] or indeed any law from the host nation.
The Gary MacKinnon [wikipedia.org] case has shown that a rather underrated cracker (poking around with Term Services looking for blank passwds -- for FS!) can cause an extradition to a foreign country well known for its human rights abuses - is just shocking.
Re: (Score:2)
Re:How is this useful for law-abiding citizens? (Score:4, Insightful)
Remember illegal access to a computer is illegal, but anyone running a database full of stolen credit card numbers is probably not going to call the cops on you, especially since to prove you access the system they'd have to keep it pretty much intact.
There is however a marginal risk that the legitimate owner of the system would notice you instead of the phisher. And call the relevant authorities on you. Which might prove uncomfortable.
Re: (Score:2)
"..I'm sure that the US will be equally happy to extradite all those Americans who hack into European criminals' computers to face charges over here."
Wouldn't there be a cue? Or even a rise in hacker related offenses of all those who want to move into an environment devoid of neo-evangelicals, the Homeland Security Agency and -most of all- Americans?
Re: (Score:1, Flamebait)
Maybe...
But it's EUROPE. You guys can only BARELY put away terrorists. People that actually kill innocent bystanders get light sentences. What do you really think will happen to a hacker who hacks a phisher? I suspect that the worst that will happen is that they will bar this hypothetical hacker from entering Europe for a while. Which, since the hypothetical
Re: (Score:1)
Americans, on the other hand have been considering bringing back 'cutting off the hands of the offender' for stealing loaves of bread.
This is useful for law-enforcement agencies. (Score:2)
Re: (Score:1)
Umm, Robin Hood was a wanted criminal, according to most of the commonly believed lore.
I don't think his excuse *worked*
Re: (Score:1)
-get you arrested along with the phisher
Re: (Score:2)
Don't think of it as "Phishing Phishers" ... think of it as "Phish Pharming" ;)
Re:How is this useful for law-abiding citizens? (Score:5, Informative)
I wish the article had good suggestions for how to prevent phishing attacks.
Super secret information! Don't share with anyone! Majestic Clearance only! [google.com]
Re: (Score:1)
Sorry, I'm terrified of clicking on links for fear of being phished. Perhaps I'll go search on MSN for how to prevent phishing. Oh wait, it says to exclusively use IE and then I'll be magically safe from all phishers!
Now I feel safe and secure!
(Yes, I'm being facetious).
I know I can Google for information on phishing, but why post this article on Slashdot? It seems like the only point of this article is to encourage theft of data. I didn't think that was the norm for the editors here.
Re: (Score:2, Interesting)
So the only thing keeping poor Billy from stealing data is that he hasn't thought about it and a timely article on /. is going to push him over the edge?
Probably not.
Re: (Score:2)
The article increases awareness of a security vulnerability.
Awareness means people can reprioritize how important it is to fix something: ie. if phishers handle private data so carelessly that it can be stolen by more parties than just that initially gathering it (and the party they sell it to), that provides a justification for even more vigilance than would otherwise be used, and a talking point to use when telling people how important it is to be cautious about potential phishing sites.
don't forget the microsoft's Blue Hat (Score:1)
Re:How is this useful for law-abiding citizens? (Score:5, Insightful)
Re: (Score:2)
The conference on phishing and spamming should be called the Ass Hat conference.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
They're what you wear before sleeping with Mr. Bishop's wife and daughter. Never know where them New Reno chicks have been.
Re: (Score:2)
Be careful or you'll get the Gigolo reputation.
Re: (Score:2)
Re: (Score:1)
Re:How is this useful for law-abiding citizens? (Score:4, Insightful)
How to prevent phising attacks. (Score:5, Insightful)
Engage brain before clicking.
Re: (Score:2, Interesting)
Engage brain before clicking.
I think you proved subtly that we have a Darwinian mechanism at work through phishers and crackers.
Re: (Score:2)
Re: (Score:1, Interesting)
A lot of phish sites using php are sending the captured info to email accounts (gmail and yahoo seem to be the most popular).
While there are times when you can find credit card or login info in txt files stored on a hacked server, I see them using email as a dumping ground more often, and keeping an actual database on the same server as the site is hosted seems far too dumb to be very common.
As a side note, I try to report these email accounts when I find them and while I can't say what gmail has done with
AC? (Score:2, Interesting)
How long until some jokester does a phishing attack that submits the info to random slashdot threads?
Re: (Score:1)
Re: (Score:3, Interesting)
I wish the article had good suggestions for how to prevent phishing attacks.
But it does. Given that the miscreants are apparently posting information into public forums, simply enter your credit card number into a google search from time to time and see if it turns up. (Note for those without a sense of humor: don't do that.)
Seriously, what did you expect from a two paragraph writeup (one of which isn't actually about phishing but sale of CCs) of a talk at a conference that says with a wink and a nudge th
Re: (Score:2)
Already stolen but the data is already known to be stolen. A big difference.
A good way to let FBI come to your house in 10 minutes is using a documented/stolen credit card on a major online site. ;)
Law abiding citizens should use a browser/extension which alerts when they visit phishing site, cough $10 or free opt-in for a "pseudo-random password generator" which will totally make the entire concept of stealing passwords useless. Please check that http://www.phishtank.com/ [phishtank.com] , people spares their free time to
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
Hmm (Score:2, Funny)
Re:Hmm (Score:5, Funny)
The next logical step would be hackers hacking hacker-hacking hackers.
Re: (Score:3, Funny)
Re:Hmm (Score:4, Funny)
Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo [wikipedia.org].
Re: (Score:3, Funny)
Oh yeah? Well I see your smelly Buffalo, and raise you a James while John had had had had had had had had had had had a better effect on the teacher [wikipedia.org]
I wish I knew about this while I was in high school and had to write boring 500 word essays. A few of these and I would be nearly done! :D
Re: (Score:2)
Quite the entertaining read.
Hey! (Score:5, Funny)
"...[Phishers] basically are lazy"
I'm lazy, maybe I could be a phisher king...
"...all one needs to do to find this info is to reverse engineer a real phisher's website, look at their PHP script..."
Shit, I instrinsically fail.
Re: (Score:1)
"...Hackers are a cowardly and superstitious lot...also lazy"
Re: (Score:2)
"...[Phishers] basically are lazy"
I'm lazy, maybe I could be a phisher king...
"...all one needs to do to find this info is to reverse engineer a real phisher's website, look at their PHP script..."
Shit, I instrinsically fail.
Well ..That's the easier part, since the poster of TFA already figured out the much harder "..." part of the sequence: ....
1 - Think
2 -
3 - Profits
Re: (Score:2)
Do they call you John, the Phisher Man?
The Phisher Job Description (Score:4, Funny)
Phishers Are Lazy Because People Are So Dumb (Score:2)
Re: (Score:2)
Re: (Score:2)
What do you mean "we're" doomed?
I expect he means that large numbers of stupid people doing especially stupid things can cause significant negative effect on the economy.
Or cause draconian reactions from the financial sector and/or governments.
That affects us all.
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2)
And who end up footing the bill? ... yeah. It raises the cost for everyone else like shoplifting and any kind of fraud does.
Old Hat (Score:5, Funny)
Re: (Score:2, Funny)
Confucius say:
There is black hat and white hat, but your sig is just old hat.
Re:Old Hat (Score:5, Funny)
Give a man fire and he'll be warm for a day. Set him on fire and he'll be warm for the rest of his life.
Re:Old Hat (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
One time... (Score:1, Interesting)
I e-mailed the real credit union, told them about
Re: (Score:1)
I've gotten phishing emails, notified the registrar (basically, if it makes it past gmail, I take it as being more 'lively') and watched the domain disappear within 48 hours. I don't have any illusions that it must have been my notification that made things work (I've also had registrars act like it isn't any of their business that their clients are pissing in the pool), but getting the domain pulled is the one thing that is going to prevent anything from happening.
Re: (Score:3, Interesting)
Re: (Score:1)
not everyone in this world can install an operating system in their sleep.
Re:One time... (Score:5, Funny)
"even who-is'd him for them in the e-mail (it appeared to be an Indian name).... I called the number on the ad... He had a thick Indian accent. Same guy? Coincidence?"
No way that was a coincidence. I mean, how many Indians are there?
Re: (Score:1)
I'm a little disturbed by your post on two levels. The first is that you think charging $35 to install Windows is somehow "Ripping people off". Sure, they let you download the installer for free. How many people, even college students, necessarily know what to do next.
By the time you go through the long Vista install process, download the newest patches, hunt down drivers that didn't get installed automatically, and whatever else you can end up having spent a good 3 hours worth of your time.
Take th
You know, this one time... (Score:5, Funny)
... I saw two white guys in a day. And was like, whoa -- are you folks following me?
Then I saw another one. I knew it. Never trust white guys.
-- A white guy (but just because I'm paranoid doesn't mean I'm not out to get me!)
Re: (Score:2)
The ripping people off part of the $35 deal is that you can call the university's helpdesk and have them help you for free. Its a service provided by the university. I knew people who worked at it and they flat out said "That's a rip off because we'd help people do that". Secondly, the ad's language carried the implication that for $35 he would TELL you where you could get the installer for Vista (I don't remember the exact words, but I think it wa
Re: (Score:3, Funny)
> Because obviously everyone has to nick-pick every fact...
Umm, yeah, that would be "nit-pick".
Re: (Score:1)
Apu, there are rumors that you are a Hindu. Is this true?
By the many arms of Vishnu, I swear it is a lie.
Re: (Score:2)
Don't take this as an attack. We all make mistakes sometimes.
But wow. Pitiful that you'd think that two people with "fer'n acksents" would be the same guy. As if 5.75 billion of the world's 6 billion people sounded "fer'n".
For a while, I did as you did, although I amped it up a bit. Rather than submit a single form, I reverse-engineered the submission form, then write a PHP shell script to auto-submit random (crap) data into the form with several connections at once. Then I'd fork a hundred or so processes
Re: (Score:2)
He had a thick Indian accent. Same guy? Coincidence? No idea.
Stop by your Uni's Computer {Science,Technology,Engineering} department, ask to see the graduate student research lab, and count the number of Indian students. They're all there for two-three years, then graduate, and then they get good industry jobs. The chance it's the same guy is really really low.
Apologies to Juvenal (Score:2)
I have to know (Score:3, Interesting)
The title and summary suggest that phishers are somehow less. Lazy? What, are drug dealers not lazy? Pimps more business savvy?
That is just bothering me. Anyone else think that is just wrong? Lazy? WTF exactly would a non-lazy phisher do? Setup a data center in the Caymans? Seriously!
Re: (Score:1)
The law will protect us! (Score:3, Funny)
And even worse, they are not protecting their stolen data
Clearly, the answer is to pass a law requiring that phishers disclose all breaches of the personal data they have collected. That will undoubtly shame them into increasing their security to better protect our personal information.
And even worse (Score:3, Funny)
Phishers ain't more techsavvy than the average Joe (Score:4, Interesting)
With the advent of MPack and other tools from the RBN, it doesn't take a "hacker" anymore to phish. You buy a toolkit, you buy the exploit, you buy a trojan and the scripts for your server, and off you go. The reason why it's successful is simply that there are people who know less than the attacker about security.
Detach yourself from the idea that phishers are in any way required to be security gurus, or that they're in some way intimate with the inner workings of PCs or networks. Those that know how to code don't attack anymore. They sell their attacking toolkits to others who then conduct the attacks.
"non-cisco vpn" client? (Score:2)
So TFA says that"
An (sic) live exploit was demoed using a non-cisco sslvpn vendor during the session.
I guess I'm not afraid to demonstrate my incompetence before the entire world, but I searched for results in the two months for i) generic ssl vpn fix, ii) nortel ssl vpn fix and iii) microsoft ssl vpn fix, and came up empty handed.
Or are they talking about the Debian OpenSSL key debacle? Or maybe I should drop the "fix". :)
Re: (Score:3, Informative)
This like pretty much every other networking task imaginable requires a client(it connects the ssl connection and handles the routing as appropriate).
Cisco makes one, as do a number of other vendors(CheckPoint comes to mind, but only because it's the client I have to use for my work vpn connection).
All they're saying was that
Re: (Score:1)
The Perfect Crime (Score:3, Insightful)
Idiots fooling around do all the dirty work, and the serious crooks just snatch all their work without them even knowing it.
I am guessing phishing is risky. I am guessing that only phishing can gather information in such a large scale. If this is true, then while the idiots are getting caught, the really smart people and gaining a ton of really useful information as we speak.
If this is the case, I would be *very* worried.
Comment removed (Score:3, Interesting)
XLNT BUSNESS OPORTUNITY [sic] (Score:2)
Now, now... don't dismiss that sarcasm so easily. We've established that they're lazy and don't pay much attention to security. But you're onto something there, man. We just have to coax the idea into full reality.
Sure, they're lazy. Either they write the minimum code they need to in order to get their job done, or they buy off-the-she
Re: (Score:2)
Re: (Score:2)
Better yet: Make it actually store a database of credit card numbers, names, and addresses... but make it generate the numbers with a random number generator (but make sure they pass checksums,) fake names, and fake addresses. Make it send you the IP address it's running from at all times - that'll give you the most time possible to trace it. Or, if you feel like it, DDoS it, but that's less productive.
In related news ... (Score:1)
How Phishers Think, Act, and Make a Profit: (Score:3, Funny)
2. Somebody set up us the phishing website
3. ???
4. Profit!
They're lazy? No way! (Score:1)
Figures that they don't put much effort into securing their data.
The reason these people are phishers is because they're too lazy to obtain and hold a real job. They'd rather just get a bunch of credit card numbers and spend other people's money than have to work for their own. There comes a point where it's not worthwhile to do that when you have to work as hard for your money as everybody else.
(I know, encryption isn't particularly hard work - but it's such a drag to bother with. Let's just rack up some c
dear eve (Score:1)
Yep, it's true (Score:2)
I can attest to the veracity of this Black Hat session: I've been randomly doing this to phishers for at least two years, identifying the site with the script, grabbing it and inspecting it, figuring out the target for the script data, and grabbing the data files themselves. I was doing it to gather evidence in the act of preparing complaints against them.
Re: (Score:1, Funny)
Yeah, there's something wrong with the world when the trolls are more interesting than the on-topic posts.