Posted
by
CmdrTaco
from the stuff-to-think-about dept.
mleachpdx writes "This blog entry probes into the details of an online banking phishing scam and suggests some fraud deterrence and detection measures."
This discussion has been archived.
No new comments can be posted.
From the article: "The home page of the phishing site looked identical to the actual online banking site. I was impressed. Someone had spent a considerable amount of time mirroring the entire look and feel."
Or they just used the Spiderzilla extension for FireFox and downloaded the entire site. Wow, that scammer went to a lot of work. I have gotten these scams before though, and it is no laughing matter that they go to a lot of trouble to look legit. And I bet the estimate of 15% of people who fall for it listed in the article is actually a little low.
How is it possible to make money, knowing the login name and password for a bank's customer? The only actions allowed are transferring money from one account to another, ordering new checks, and finding the check amounts and account balance.
Which bank does not allow you to make payments to other people? What is the point of online banking if you can only shuffle money between your own accounts.
Of the four banks with which I have bank accounts, all allow me to make payments to anyone else whose account details I know. I can also make SWIFT [swift.com] (i.e. international) transfers to any account worldwide, by providing branch SWIFT code and account number.
Where I bank, the online facility allows me to write a check to anywhere I damned well please. *That* is what scares me about these bank phishers. There are too many gullible sheeple out there that would fall for it and end up with empty bank accounts.
Mine has the option to send what they call "email alerts", for example if your balance goes below a certain point they send you a quick note. There's a whole bunch of different triggers you can set online to determine what kinds of alerts you get. Kind of handy, actually. But they're strictly informative messages: no requests for passwords or anything like that. Of course, they all come addressed from "The Financial Team" which my spam filter decided was too spam-like and proceeded to remove them.
Mine once froze my accounts because they suspected fraud. (Some over zealous algorithm decided my spending habits had changed too radically one week). I got both a phone call (taken by my answering machine) and an email. I've never been asked for my username, password or credit card number though.
Your DNS, or the DNS for your area, is hijacked, and everybody who use that DNS is called up and told to log on to their bank in order to do something important?
Second solution is: One-time passwords. I have a long list of login passwords and confirmation passwords, and a numerical customer ID known only to me. When they start running low, I can easily get a new one (mailed to me). So what if I happen to login to some fake site? The worst that can happen is that I waste
the way it's been done here for almost a decade is this.. you have login and a password(which happen to be numbers) which you use to 'get in'.
then to do any transactions, to open any accounts, to apply for a loan or just about anything other than just checking how much cash you have the system asks a number from a list of one-time passcodes they've sent to you through regular mail(basically "enter the number pair for the number 4323 on your number card").
the card with the one-time-use passcodes is a plast
Sure, I'd say that's good enough, but someone could still check you account balance whenever he wants. (I'm assuming the login thing never changes) In my case, you need the one-time pass even before that, and the paper they come on can be folded and put in the wallet too:). After doing your business, you confirm with a pass from a second list, that you can store separately if you want.. you could for example do all money transfers from one location, and then confirm everything from another computer/city/co
"When you sign up, the bank asks you for your 'personalised code', and that will be displayed in every email you recieve from the bank. If you dont see that code in your email, or it's wrong, you know its fraudulent."
And this code would be sent through which secure email-delivery system exactly? Plaintext SMTP on the internet, like all the other emails from your bank?
Hell, banks don't even sign their emails. Many of them don't even know what PGP is. How many of us have had conversations with our banks along the lines of:?
You: I just got an email purporting to be from you
Bank: Yes, that's right
You: So how do I know it's real without phoning you
Bank: Because it's got our name in the From field
You: Did you ever consider signing your emails
Bank: OUR INTERNET IS SECURE, WE USE HTTPS WEBSITE!!!
And this code would be sent through which secure email-delivery system exactly? Plaintext SMTP on the internet, like all the other emails from your bank?
I see your point, but _anything_ that is an indicator that the back actually knows you would reduce these phishing scams. They are generic, and the only thing that identifies th mail as being sent to you might be the "To:" field in the email, but that may also say something like "dedicated_customer@bank.com".
"What the hell has secure-email delivery got to do with it? Unless the phishers have somehow gotten hold of an email from your bank to you, they wont know your phrase, simple as that."
Okay, and how do the spammers get somebody's email address to start with? Oh yes, a virus emails the contents of their inbox to a russian server"
Along with your special code.
And don't pretend that you can just secure your computer -- there have been 5 major windows viruses already this year, and as far as I can tell, nearl
The problem is, that sort of thing only works with customers who have some awareness of security. This group of people are not likely to fall victim to a phishing scam anyway.
The target audience for phishers is more likely to either not notice, or to think "Hmm, the bank must have changed its security system. I'll just do what this link says and my money will be safer than ever!".
One critical thing to do about Phishing is to get Banks, E-Bay, e-gold, etc. to publish SPF codes for their email servers. That would permit any ISP or end user whose spam filters support SPF to discard most of the Phishing mail unseen, rather than depend on the user to notice that it's fake. Digitally signing email is also important, but at the moment SPF is more useful for most people, since Joe Gullible isn't going to validate signatures anyway.
Limit access to customer records. This is pretty much standard practice in the banking industry anyway, but I found it eerie that my phisher knew what institution I did banking with. How did they know this?
Well, I've received several of these mails, but I do not really think they go by any kinda cue -- I've received mails from various banks from around the US, so I think these guys randomly see where you are, make a wild guess at the likely bank and send you one.
For instance, several students at GTech (where I study) have their bank accounts in a certain bank (which we shall call W) -- and a lot of these scams are directed at GT students pretending to be from W.
However, that said -- I'd not be surprised if they acually did some dumpster diving and found out these kinda details. Spooky, man.
Okay, I realized that I contradicted myself a little up there -- I meant that these guys don't go by any cue based on any serious evidence (like your statements or insider operations) -- they probably look up your e-mail address from your website or Blog or whatever, guess where you are from and use that information to target the bank you're likely to be from.
Because, I'd a page at which listed me as working in a certain lab that I used to work at - and some of these scams used to contain spoof elements of
they probably look up your e-mail address from your website or Blog or whatever, guess where you are from and use that information to target the bank you're likely to be from.
They probably don't do that much targeting. Set up the phishing site, send the spam to every address they can come up with, and hope for a few suckers, more likely.
That startled me, too. Phishers don't typically target individual users, they send out the same mail to every address they can get hoping that some percentage will actually have an account with that bank.
I've also gotten scam mails for various banks. The sophisticated ones took into account that my address is German (ends in.de), but I also get some for American banks. Some of the German ones actually got the institution right, but that's not too hard: there are a couple of really large names that probabl
I must have got a dozen or so of these in the last few days, my spam appears to go in phases... either I'm in dire need of sexually-enhancing drugs, about to die from malnutrition, or they're all just after my CC details...
It's just a blanket 'attack'. Email is cheap, and they're not trying to be smart because they don't need to be.
I got one recently from someone who proported to be my phone company telling me that my bill was due in a few days and that I should go pay it online. It actually seemed legit because it had my phone number in it and it was to an email account I had given the phone company. However, the bill due date was wrong, and I had already paid the bill for the month. So I put it in the "deal with later" pile.
It wasn't until later that I realized that it might be a phishing scam. Further research indicated that i
by Anonymous Coward writes:
on Sunday November 07, 2004 @10:40AM (#10746461)
why not give consumers one time access (through pads)? This is done in Japan and works well there. Maybe consumers here would lose their card? The card isnt electronic its just card with pin numbers that you scratch off each time you use the PIN number.
Banks should STRONGLY educate consumers to never expect emails from the bank that contain links.
"Why not give consumers one time access (through pads)?"
Ok, look at the story from the perspective of a real-world bank, rather than a mythically secure one.
There's a bank in the UK called cahoot (part of abbey national) which offers one-time credit cards that you can use over the internet. For those of us who use the same card for foreign pr0n sites, that sounds quite useful, right?
That's the smart bit. That was the good idea. Their security goes downhill for the rest of the story.
Drown them in noise. Everytime you get one of these emails, visit the site and enter bogus information. That's what I do. It might not be enough to get the scumbags caught but it must certainly be an annoyance to them. And who knows, a few bogus logins might be enough to get alarm bells ringing at the bank.
I reckon banks could do something similar too. Create some honeypot accounts, and track how the criminals attempt to access it. I'm sure they could play a few tricks with a seemingly big fat balance that could make the criminals reveal their hand.
Username "PHISHINGSCAM" Password "QUICKGETEM" Name "CALL SECURITY" DOB "01/01/1337"
This would be cool to try. But tbh, I recon they would just take the list and try those that look legit.
What we could do is simply forward any phishing scam mails to a central phishing clearing house. The banks could fund a small team to handle collective online fraud.
In other words, make them look legit. Enter a well formed but bogus account / credit number, valid sort codes, expiry dates, names, PINs memorable dates etc. If you have an account with the target bank you could even ensure you enter an account number of the correct length and has the first four digits as your own.
The only way they have to separate the wheat from the chaff is to actually try them. If they're really stupid, they (or their underlings) may actually get caught when they attempt to withdraw ca
Enter a well formed but bogus account / credit number,
Today I got one of these fraudulent "the bank needs your information" E-mails. So, I thought, let's give them some noise to fill their log.
But the credit card number I made up was detected as non-existent - or at least the fake website said so.
Now, is there any way to:
1) Generate fake credit card numbers that pass as "valid" 2) Do this, and be certain that no-one actually owns that particular number, and if so, still not get into trouble?
But the credit card number I made up was detected as non-existent - or at least the fake website said so.
Now, is there any way to:
1) Generate fake credit card numbers that pass as "valid"
They're probably doing something trivial with Luhn numbers. [webopedia.com] Trivial to implement, trivial to spoof. Generating apparently valid but fraudulent card numbers is known as carding. [creditcardco.co.uk]
2) Do this, and be certain that no-one actually owns that particular number, and if so, still not get into trouble?
Trouble with whom? The scammers? If you aren't using the number to commit fraud, I wouldn't worry. We want to get the phishers in trouble!
They may also know what BIN [wikipedia.org]s they are looking for. The first six digits of your credit card number are the Bank Identification Number, which identify the issuing bank and (often) the type of card.
Some card generating products, such as Creditmaster, have a database of BINs as well as an implementation of the Luhn algorithm. Thus you can (say) ask for a random Bank of America Visa Platinum, rather than just a random 16-digit number that passes the Luhn check.
Well, The algorithm for the OSCommerce cc check is as follows:
1. Remove any non digits from string. 2. Reverse the string. 3. double every second digit counting from zero (i.e first one gets doubled) 4. If a doubled digit is >= 10, add the 2 digits together (i.e. 12 becomes 3) 5. Add all the digits together. 6. If the result is exactly divisible by 10, then the card is valid... ... ... 8. Profit
Drown them in noise. Everytime you get one of these emails, visit the site and enter bogus information.
I've always wanted to find a way to automate that. Have a site where you could submit a phishing site, have it analyzed and then feed it a bunch of noise.
If it's all done from the same computer, smart people could weed out the noise by IP address, so you'd have to account for that somehow, too.
Once you make enough noise in the system, scams like this do not remain economical, I would think.
> It might not be enough to get the scumbags caught but it must certainly be an > annoyance to them
People say that about spammers. I'm sure they're annoyed with the millions they make from their activities.
The best way to avoid getting hit by phishers is to delete any emails that claim to come from your bank, paypal etc without reading them. And if they insist that they contact you via email rather than post, or via messages readable once you've logged on then I suggest you close your account with th
I've been meaning to make a little python library to make writing new noise scripts quick and easy. I get one of these phishing mails once every couple of days. I figure if I was quick I could drown their database in noise, especially if I made it pipe the requests through a random selection of public proxies.
If I ever get around to writing something like this, I'd be tempted to share it, but its power could be used for Evil as well as Good. Also, bizarrely enough, using such a program is probably against
Slashdot moderators rejected an article I sent in over a month ago about this very concept.
A lot of times, you can send a URL encoded request (GET Request) to fill in bogus data from the address line. I've happliy sent random values to these seedy servers with a small bash script using lynx.
I suggested that one or more popular websites add a new 'banner ad' whose image location is a properly formed URL to submit a random value to a known phishing server. As people come by the site, a new request is sent t
Artists against 419 [aa419.org] is also interesting. They are working against the phising sceems of 419 scammers. If you've got bandwith to spare, be sure to check out The Lad Vampire [aa419.org]
Please modify the news post and add one of those links. They could use the help of a lot of slashdotters, I think.
The EBay request to verify account information. I've received this several times. Perhaps the financial institutions don't do much because a small country in Africa isn't going to let U.S. law enforcement take care of the problem. Too much corruption is usually the case.
The maxim I always use is: The company that holds your account never needs to ask you for your password since they already have it.
Something many probably don't know is that your local police dept. probably has a high tech crimes unit. They will investigate and prosecute illegal activites like snooping around your company network. They can be very helpful.
The maxim I always use is: The company that holds your account never needs to ask you for your password since they already have it.
Eh, unless they want to verify that you know the right password, which is what these kind of scams are giving the impression of - a complete login page.
The maxim I always use is: The company that holds your account never needs to ask you for your password since they already have it.
I would add: Often the employees of the company don't have access to the password because it is encrypted on their end. But the institution can change or reset your password without knowing the old password. This is usually preceded by a manual check performed by customer service over the phone to ensure you are really you. They might also ask you to come into the bank and provide ID.
Enough already with this "a blog entry says" stuff. Can we please get some ACTUAL news on this site and not just someone's rantings on a BB? Is that too much to ask?
in a mailing list I administer, and in my own personal address (time to test the new "report phishing" gmail feature) I received today what could be the same message, but the IP it pointed to resolved as ipvpn101156.netvigator.com (don't look like to be in zimbabwe) port 38, that looked like a Windows 2000/XP with too many open ports.
Probably that message is sent from hacked/owned/not patched windows machines that send the entered info to the real criminal. I suppose that for really knowimg who is him that "infected" machines should be hacked back or that the provider of that internet connection contacts/gives the address of the owner, and check the programs there.
I still don't understand, do these banks just give their customers a login/password for their account?
The bank I use gave me a little authentication device which combined with my bank card, my personal code and a random code provided by the bank site can generate digital signatures. In order to login and in order to make all transactions final I must provide the right code. I've been using this system for about 10 years now, if those exploitable banks still use a normal password protection it's their fault they're exoploited this way and there's no way customers should be responsible for it.
My bank issues two codes, a registration code and an id code. These are used together with your card number when logging in, and you're encouraged to change them on first log in.
So, essentially I have two passwords, but they're both required to log in. I've not heard of any UK bank that issues anything like the authentication device you describe.
Some banks get fancy and use SecureID or similar access tokens, but most US banks seem to only use login and password, and it's not uncommon for the password to be your ATM PIN.
I have used the same bank for over 15 years for my personal checking account.
I have not gotten one email from that bank (either legitimate email or a phishing scam with that bank's name or fake url.
That bank does have my email address.
I have gotten phising scams that have ebay in them (I do have an ebay account). I have also gotten phising scams with the names of other banks in my area.
I think they go by geographical data for banks. For ebay, it's no problem. They can scan ebay's pages and get seller's ebay account names with no problem.
I misread the subject line on this article, thought it read Fisting for Phishers. Now that is a punishment that would work pretty good, once word got out!
I work for a company that attempts to protect its customers from this kind of fraud. We monitor domain registrations to locate potential phishing scams. It's interesting to see that it's not only banks that are hit with this kind of scam. These guys will set up an entire shopping cart taking credit cards that mimick an online store like Dell. It's a pretty interesting scam that only seems to be gaining popularity.
It's not a major concern in the 3rd world so these guys have no reason to stop. We've seen scams like this based out of Russia, Brazil, China, and several African countries. It will be interesting to see how this all pans out.
by Anonymous Coward writes:
on Sunday November 07, 2004 @10:58AM (#10746533)
In order for them to get their ill gotten gains, they have to eventually withdraw some money from somewhere. It seems it would be trivial for INTERPOL or some other agency to set up a bunch of bank accounts with a few thousand dollars/euros in them and then start responding to all the phishers. Then just follow the money to the crooks. What's the big deal? Is there just no will to do this or am I missing something?
Is there just no will to do this or am I missing something?
I doubt it's that easy or simple, but. The authorities tend to be good at gathering and accumulating statistics. The banks should also be concerned that somebody is using their identity fraudulently. Savvy users forward the email with headers to such as abuse@citibank.com (which bounces, so there probably is no will to actually do anything about it).
Seems that if the authorities are to be able to do anything about it, they need lots of in-depth info
The money doesn't go to the criminals; it goes to a mule who thinks he's processing charity donations. Then it goes to another mule who thinks she's reselling computers. Then someone uses the cash to buy a plasma tv and send it to some other country. Then the recipient sells the plasma tv and wires the money to someone else.....
The basic problem is money laundering, and we still don't have a good handle on that.
It's definitely becoming more of a "mainstream problem". Afterall, the whole identitity theft problem is perfect Dateline/60 Minutes material.
Has anyone else noticed that the folks at Gmail have added a "report phishing" feature? When you view a message, click "More Options" and you'll see it.
Then again, maybe it's been there for some time and I just haven't noticed (it definitely wasn't there when I first got my Gmail account though and it doesn't appear to be listed as a new feature).
The Lad Vampire [aa419.org] is a project of Artists Against 419 [aa419.org] which has taken down ~150 scammer websites. The scammers tend to have lots of websites out there for their fake banks, and they're usually cheap and disposable and typically have monthly bandwidth limits. The lad vampire page shows images from 20 or so of the sites, and keeps refreshing them rapidly until they've burned the monthly quota (after all, a few hundred people with DSL lines or cable modems can use a lot of download bits.) When one scammer fak
Honestly how stupid are you people to fall for any of this. Absolutely do not respond to any request from anyone to provide any information for any reason whatsoever. Not even from someone who purports to be from the government. If anyone needs to get in touch with me that badly they can send a letter registered mail or have their attorney contact me.
Great advice if you are computer literate. You fail to realize that a very large percentage of computer users 1. Do not read slashdot and 2. Have no idea that they shouldn't trust the official looking emails they get. (If you recieved a physical mail on bank letterhead that said please visit your branch to confirm some details with your account, you'd probably trust it)
How exactly are these newbie users supposed to get the information that the web is different than real life? Watch the RvB PSA (yeah, my 6
Nonsense. Before there were computers there were credit card companies and banks. If they called you up asking you to verify information they're supposed to have you'd be an idiot to give them that info.
There is little new under the sun. Just because we give it an incredibly lame 1337 name; "PHishing" doesn't mean it's not a hundred year old con game.
What monetary transaction can you make on an account that leaves no trace?
In every case getting cash out of my account involves paying a bill (to an authorized agent like VISA), or emailing money or transferring money to a 3rd party acct. All of these leave a trail that banks can recognize and plug.
I once changed my buying habits with my VISA card and had to confirm my identity before the transaction could be authorized. Since fradulent VISA transactions cost VISA, it appears that when it affects the bott
It's amazing what people will do for you for some cash.
My friend's paypal account was ripped off. A 3rd party bought a camera and shipped it to Russia, because the auction's shipping was only avalible in the US and the Russian wanted the deal. The Russian supplied my friend's paypal and a $20.
The camera is safe in Russia while the idiot who bought it had a chat with the police.
Just like spam, can we @/. take any countermeasures? I'm not up on this stuff, so if I make a few silly suggestions, please give me a break.
Pick a phisher/spammer and:/. them
Send a reply with the name of a pop tune or movie in the title.
Send a reply with a big attachment
Send a reply with a virus attached
If it's possible, think of all of on one day, sending an email with "White Houses" on the title, and a 4 Mb attachment to a spammer / phisher. A toasted server, maybe?
So you're advocating a distributed denial of service attack on somebody's server?
An actual phisher would undeniably deserve such a treatment and much more, but that doesn't make it okay. But what if you make a (gasp!) mistake? You could be asking thousands of Slashdotters to participate in a DDoS attack against someone who might be completely innocent, or whose only 'crime' is that their own server was compromised and used by the real phisher.
You could be asking thousands of Slashdotters to participate in a DDoS attack against someone who might be completely innocent, or whose only 'crime' is that their own server was compromised and used by the real phisher.
... or that their server is hosting a site linked on Slashdot. Same effect.
This is most certainly vigilante justice, and it is most certainly illegal. What people like you who want to go around DOSing phishing sites off the web seem to forget is that there are OTHER PEOPLE using the SAME BACKBONE.
When you can't get to www.pornopalace.com or whatever sites you like to visit every day because there just happened to be a phisher in the same co-lo, and a bunch of vigilantes decided to DOS that phisher off the net to protect the innocent (and the stupid), or when your personal site i
This isn't vigilante justice. A web site that is up, running, and is a financial danger to grandmas everywhere MUST be taken down. A web site that is up, running, and compromised MUST be taken down.
So, who decides which web sites MUST be taken down, and which may be allowed to remain? You? Oh, I see. And this differs from vigilante [m-w.com] justice exactly how? Let's take a look:
a member of a volunteer committee organized to suppress and punish crime summarily (as when the processes of law appear inadequate); bro
I have a serious ethics question. Assume I have a tool that I wrote. It generates false account information and plugs it into a scammer's form repeatedly. Logically, if the scammer receives enough invalid responses, they won't be able to filter out the valid accounts from the invalid accounts. Also, the collateral damage is very limited - a trickle of bandwidth. The targets (phishing scams) are easily identifiable. And regular law enforcement has shown to be extremely inneffective in stopping this kin
To draw a parallel, your writings suggest that you would let your neighbor be raped by a thug in the street. After all, maybe she's into that faux rape thing that you see on "your favorite port site".
Hopefully that's not the case. Hopefully you'd take some action above and beyond going home, calling 911, and waiting 15 minutes or more for the police to arrive.
Yes, of course I'd intercede if someone were in direct physical danger. I'd also take action if I saw someone about to reply to a phishing scam.
OK, not a victim. Let me restate: I am the recent victimizer of a scammer looking for a victim.
And I have a new $3000 to prove it. Sent to me directly from an "honest businessman" from Nigeria. Really. It was FedEx'd from Nigeria. From a guy named Walter Nabanu.
OK, I don't have a new $3000. But I have a check that says it is worth $3000. But I'm not going to cash it.
How much does it cost to Fedex an envelope from Nigeria to the US?
Is the day that some phisher gets control of an ISP's name server, either by hacking it or by being in cahoots with the ISP. They could then redirect somebank.com to their own server, and just sit back and let all the unwitting victims come to them. Throw up a "service not available, try again later", message after login, and the victim would leave, totally unaware.
What would be the best way to protect yourself against this? Is it possible to set up caching DNS to pool from multiple independent sources
Genuine banks' web-sites should have digital certificates signed by known authorities (Verisign, etc.). If I know my authentication schemes correctly, this signature is nigh-on impossible to forge (one of those "mathematically hard" tasks). Thus, even though the name resolves to a bogus server, the certificates don't add up. To make a convincing effort, a phisher would need access to private data from within the on-line bank's systems (i.e., run an inside job).
I have a fair degree of familiarity with this issue and have some comments on the blog entry.
Limit access to customer records.
There's almost zero chance the phishers knew the author had an account at his bank. They use spamming techniques and count on getting lucky.
Financial Institutions could automate the process of identifying where their logos and site images are used as a standard practice of trademark enforcement.
Some financial institutions already do this but it is very expensive. Despite the
Every time I get a phishing scam, I contact the affected bank's security department providing them all of the information that I've developed. In many cases this is made extra difficult because the only method they provide of contacting is a web-form. With these, I have to cut and paste the headder info and so on. It really sucks.
Usually, no matter what the method of contact, all I get is an email reply with boilerplate info telling me how to protect myself against these scams. This is utterly stupid,
I read an article once by someone familiar with security/fraud divisions of large banks and the like. (Sorry, I can't seem to find a link or reference at the moment.)
But essentially the gist was they need the fraud to occur in order to do anything about it. Their entire machinery for dealing with fraud requires that it has already happened, i.e. the money has changed hands. They start to act after the fraudulent transactions have been processed. Apparently they need that amount of concrete evidence in
So, the solution is to open a bank account, put a minimal amount of money into it, and give it to a phishing site? Use a corporation or an LLC to keep your personal life as unaffected as possible. Of course, at that point, they'll probably require a minimum amount of damage, and I'm not willing to risk $25k on this type of endeavor.
I think there is a simple solution to this. If you are fishing for phisherman and as soon as you find one, fire off a script that will insert bogus (but legit looking) information. Say they had a DB with 90% of the entries were valid info from their victims, you could poison their database down to 20% correct quite easily, and they will either have to scrap the whole thing or risk getting nailed by International authorities for fraud when they try to use the false info, repeatedly (which they will of cour
Is evil. Don't read it. Persuade your friends not to read it. If someone legit sends you some, reply asking them to re-send in a sane format, explaining why.
It's a slim chance, but if enough people get irritated enough from having to re-send enough email, then perhaps we can still get rid of this idiotic idea.
The FA didn't give any reason for why he thought the phish was targeted at him. Without an explanation, I'm sceptical that it was targeted in any way.
I get phishing mails all the time - most commonly aimed at Citibank or Paypal, neither of which I do business with.
I don't know why the phisher would bother to target them. Seems like more effort than it is worth.
Its just aiming at the big players to maximise your audience. Currently, more people will fall for something like a Citibank scam than a LocalYokelTownBank scam. Yes, there will be gullible people in both groups, but a lot more with the larger bank.
Funny you mention that because just the other day I got a scam email posing as Citibank. About 30 seconds later, I got one from some local bank in North Carolina. I guess they are trying to cover all the bases.
More Info Available here (Score:5, Funny)
mirror.slashdot
Theres currently a problem with our server, you will have to login again to see the details.
(yes this is only a joke)
Re:More Info Available here (Score:2)
Or.... (Score:5, Informative)
Or they just used the Spiderzilla extension for FireFox and downloaded the entire site. Wow, that scammer went to a lot of work. I have gotten these scams before though, and it is no laughing matter that they go to a lot of trouble to look legit. And I bet the estimate of 15% of people who fall for it listed in the article is actually a little low.
ROI (Score:5, Informative)
How is it possible to make money? (Score:2)
How is it possible to make money, knowing the login name and password for a bank's customer? The only actions allowed are transferring money from one account to another, ordering new checks, and finding the check amounts and account balance.
Re:How is it possible to make money? (Score:3, Insightful)
Like from your account to mine...
Re:How is it possible to make money? (Score:1)
Transfers are between your own accounts. (Score:2)
You can ONLY transfer money from one of your own accounts to another of yours.
Re:Transfers are between your own accounts. (Score:4, Informative)
Of the four banks with which I have bank accounts, all allow me to make payments to anyone else whose account details I know. I can also make SWIFT [swift.com] (i.e. international) transfers to any account worldwide, by providing branch SWIFT code and account number.
Re:Transfers are between your own accounts. (Score:2)
Re:Transfers are between your own accounts. (Score:2)
Solution: You authorise the bank first (Score:5, Interesting)
If you dont see that code in your email, or it's wrong, you know its fraudulent.
Re:Solution: You authorise the bank first (Score:5, Interesting)
Re:Solution: You authorise the bank first (Score:1)
Re:Solution: You authorise the bank first (Score:2)
Re:Solution: You authorise the bank first (Score:2)
Re:Solution: You authorise the bank first (Score:3)
My bank doesn't even HAVE my email.
Re:Solution: You authorise the bank first (Score:2, Interesting)
Your DNS, or the DNS for your area, is hijacked, and everybody who use that DNS is called up and told to log on to their bank in order to do something important?
Second solution is:
One-time passwords. I have a long list of login passwords and confirmation passwords, and a numerical customer ID known only to me. When they start running low, I can easily get a new one (mailed to me). So what if I happen to login to some fake site? The worst that can happen is that I waste
Re:Solution: You authorise the bank first (Score:3, Interesting)
then to do any transactions, to open any accounts, to apply for a loan or just about anything other than just checking how much cash you have the system asks a number from a list of one-time passcodes they've sent to you through regular mail(basically "enter the number pair for the number 4323 on your number card").
the card with the one-time-use passcodes is a plast
Re:Solution: You authorise the bank first (Score:2, Interesting)
Re:Solution: You authorise the bank first (Score:5, Insightful)
And this code would be sent through which secure email-delivery system exactly? Plaintext SMTP on the internet, like all the other emails from your bank?
Hell, banks don't even sign their emails. Many of them don't even know what PGP is. How many of us have had conversations with our banks along the lines of:?
You: I just got an email purporting to be from you
Bank: Yes, that's right
You: So how do I know it's real without phoning you
Bank: Because it's got our name in the From field
You: Did you ever consider signing your emails
Bank: OUR INTERNET IS SECURE, WE USE HTTPS WEBSITE!!!
Re:Solution: You authorise the bank first (Score:2)
I see your point, but _anything_ that is an indicator that the back actually knows you would reduce these phishing scams. They are generic, and the only thing that identifies th mail as being sent to you might be the "To:" field in the email, but that may also say something like "dedicated_customer@bank.com".
The ease in making this kind of scam profitab
Re:Solution: You authorise the bank first (Score:2, Insightful)
Okay, and how do the spammers get somebody's email address to start with? Oh yes, a virus emails the contents of their inbox to a russian server"
Along with your special code.
And don't pretend that you can just secure your computer -- there have been 5 major windows viruses already this year, and as far as I can tell, nearl
Re:Solution: You authorise the bank first (Score:2)
The problem is, that sort of thing only works with customers who have some awareness of security. This group of people are not likely to fall victim to a phishing scam anyway.
The target audience for phishers is more likely to either not notice, or to think "Hmm, the bank must have changed its security system. I'll just do what this link says and my money will be safer than ever!".
Getting Banks to Advertise SPF on their email (Score:2)
Customer details (Score:5, Interesting)
Well, I've received several of these mails, but I do not really think they go by any kinda cue -- I've received mails from various banks from around the US, so I think these guys randomly see where you are, make a wild guess at the likely bank and send you one.
For instance, several students at GTech (where I study) have their bank accounts in a certain bank (which we shall call W) -- and a lot of these scams are directed at GT students pretending to be from W.
However, that said -- I'd not be surprised if they acually did some dumpster diving and found out these kinda details. Spooky, man.
Re:Customer details (Score:2)
Because, I'd a page at which listed me as working in a certain lab that I used to work at - and some of these scams used to contain spoof elements of
Re:Customer details (Score:2)
They probably don't do that much targeting. Set up the phishing site, send the spam to every address they can come up with, and hope for a few suckers, more likely.
Re:Customer details (Score:2)
I've also gotten scam mails for various banks. The sophisticated ones took into account that my address is German (ends in
They don't know who you are (Score:5, Informative)
It's just a blanket 'attack'. Email is cheap, and they're not trying to be smart because they don't need to be.
Simon
Re:They don't know who you are (Score:2)
It wasn't until later that I realized that it might be a phishing scam. Further research indicated that i
ways to prevent online fraud? (Score:5, Insightful)
This is done in Japan and works well there. Maybe consumers here would lose their card? The card isnt electronic its just card with pin numbers that you scratch off each time you use the PIN number.
Banks should STRONGLY educate consumers to never expect emails from the bank that contain links.
Re:ways to prevent online fraud? (Score:2, Interesting)
The gist of it is a longer code that I arrange with them in person, and when I go online with them, they ask for random portions of that code.
I would have to be scammed multiple times before anyone had access to my banking.
The comment is here: http://slashdot.org/comments.pl?sid=128336&cid=107 16472 [slashdot.org]
Re:ways to prevent online fraud? (Score:2)
Ok, look at the story from the perspective of a real-world bank, rather than a mythically secure one.
There's a bank in the UK called cahoot (part of abbey national) which offers one-time credit cards that you can use over the internet. For those of us who use the same card for foreign pr0n sites, that sounds quite useful, right?
That's the smart bit. That was the good idea. Their security goes downhill for the rest of the story.
It's an unencrypt
How to annoy phishers (Score:5, Interesting)
I reckon banks could do something similar too. Create some honeypot accounts, and track how the criminals attempt to access it. I'm sure they could play a few tricks with a seemingly big fat balance that could make the criminals reveal their hand.
Re:How to annoy phishers (Score:2, Interesting)
Password "QUICKGETEM"
Name "CALL SECURITY"
DOB "01/01/1337"
This would be cool to try.
But tbh, I recon they would just take the list and try those that look legit.
What we could do is simply forward any phishing scam mails to a central phishing clearing house.
The banks could fund a small team to handle collective online fraud.
Re:How to annoy phishers (Score:3, Informative)
Looks like its already in action
http://www.antiphishing.org/ [antiphishing.org]
Re:How to annoy phishers (Score:3, Interesting)
The only way they have to separate the wheat from the chaff is to actually try them. If they're really stupid, they (or their underlings) may actually get caught when they attempt to withdraw ca
Re:How to annoy phishers (Score:2, Insightful)
Today I got one of these fraudulent "the bank needs your information" E-mails. So, I thought, let's give them some noise to fill their log.
But the credit card number I made up was detected as non-existent - or at least the fake website said so.
Now, is there any way to:
1) Generate fake credit card numbers that pass as "valid"
2) Do this, and be certain that no-one actually owns that particular number, and if so, still not get into trouble?
Re:How to annoy phishers (Score:4, Informative)
1) Generate fake credit card numbers that pass as "valid"
They're probably doing something trivial with Luhn numbers. [webopedia.com] Trivial to implement, trivial to spoof. Generating apparently valid but fraudulent card numbers is known as carding. [creditcardco.co.uk]
2) Do this, and be certain that no-one actually owns that particular number, and if so, still not get into trouble?
Trouble with whom? The scammers? If you aren't using the number to commit fraud, I wouldn't worry. We want to get the phishers in trouble!
Re:How to annoy phishers (Score:2)
They may also know what BIN [wikipedia.org]s they are looking for. The first six digits of your credit card number are the Bank Identification Number, which identify the issuing bank and (often) the type of card.
Some card generating products, such as Creditmaster, have a database of BINs as well as an implementation of the Luhn algorithm. Thus you can (say) ask for a random Bank of America Visa Platinum, rather than just a random 16-digit number that passes the Luhn check.
Of course, you need the expiry date on the ca
Re:How to annoy phishers (Score:2)
Yes:
$ perl -MBusiness::CreditCard -e 'print validate("1000 0000 0000 0008"), "\n"'
1
But:
$ perl -MBusiness::CreditCard -e 'print cardtype("1000 0000 0000 0008"), "\n"'
Unknown
No (Score:2)
$ perl -MBusiness::CreditCard -e 'print cardtype("9111 1111 1111 1111"), "\n"'
Unknown
$ perl -MBusiness::CreditCard -e 'print validate("9111 1111 1111 1111"), "\n"'
0
Re:fake credit card numbers (Score:3, Informative)
Easy: Business::CreditCard - Validate/generate credit card checksums/names [cpan.org].
Re:How to annoy phishers (Score:2)
1. Remove any non digits from string.
2. Reverse the string.
3. double every second digit counting from zero (i.e first one gets doubled)
4. If a doubled digit is >= 10, add the 2 digits together (i.e. 12 becomes 3)
5. Add all the digits together.
6. If the result is exactly divisible by 10, then the card is valid...
...
...
8. Profit
Re:How to annoy phishers (Score:2, Interesting)
I've always wanted to find a way to automate that. Have a site where you could submit a phishing site, have it analyzed and then feed it a bunch of noise.
If it's all done from the same computer, smart people could weed out the noise by IP address, so you'd have to account for that somehow, too.
Once you make enough noise in the system, scams like this do not remain economical, I would think.
---
Re:How to annoy phishers (Score:1)
> annoyance to them
People say that about spammers. I'm sure they're annoyed with the millions they make from their activities.
The best way to avoid getting hit by phishers is to delete any emails that claim to come from your bank, paypal etc without reading them. And if they insist that they contact you via email rather than post, or via messages readable once you've logged on then I suggest you close your account with th
Re:How to annoy phishers (Score:2)
If I ever get around to writing something like this, I'd be tempted to share it, but its power could be used for Evil as well as Good. Also, bizarrely enough, using such a program is probably against
Re:How to annoy phishers (Score:3, Informative)
A lot of times, you can send a URL encoded request (GET Request) to fill in bogus data from the address line. I've happliy sent random values to these seedy servers with a small bash script using lynx.
I suggested that one or more popular websites add a new 'banner ad' whose image location is a properly formed URL to submit a random value to a known phishing server. As people come by the site, a new request is sent t
check out antiphishing.org (Score:5, Informative)
Also check out aa419.org (Score:2)
If you've got bandwith to spare, be sure to check out The Lad Vampire [aa419.org]
Please modify the news post and add one of those links. They could use the help of a lot of slashdotters, I think.
The wrost ones are... (Score:5, Insightful)
The maxim I always use is: The company that holds your account never needs to ask you for your password since they already have it.
Something many probably don't know is that your local police dept. probably has a high tech crimes unit. They will investigate and prosecute illegal activites like snooping around your company network. They can be very helpful.
Re:The wrost ones are... (Score:1)
Eh, unless they want to verify that you know the right password, which is what these kind of scams are giving the impression of - a complete login page.
Re:The wrost ones are... (Score:4, Informative)
I would add: Often the employees of the company don't have access to the password because it is encrypted on their end. But the institution can change or reset your password without knowing the old password. This is usually preceded by a manual check performed by customer service over the phone to ensure you are really you. They might also ask you to come into the bank and provide ID.
Enough Already. (Score:5, Insightful)
Receiving too (Score:4, Interesting)
Probably that message is sent from hacked/owned/not patched windows machines that send the entered info to the real criminal. I suppose that for really knowimg who is him that "infected" machines should be hacked back or that the provider of that internet connection contacts/gives the address of the owner, and check the programs there.
Is it that simple? (Score:5, Interesting)
The bank I use gave me a little authentication device which combined with my bank card, my personal code and a random code provided by the bank site can generate digital signatures. In order to login and in order to make all transactions final I must provide the right code.
I've been using this system for about 10 years now, if those exploitable banks still use a normal password protection it's their fault they're exoploited this way and there's no way customers should be responsible for it.
Re:Is it that simple? (Score:2)
So, essentially I have two passwords, but they're both required to log in. I've not heard of any UK bank that issues anything like the authentication device you describe.
Mostly, yes (Score:2)
I Have Not Seen My Bank's Name in Phishing Scams (Score:3, Informative)
I have not gotten one email from that bank (either legitimate email or a phishing scam with that bank's name or fake url.
That bank does have my email address.
I have gotten phising scams that have ebay in them (I do have an ebay account). I have also gotten phising scams with the names of other banks in my area.
I think they go by geographical data for banks. For ebay, it's no problem. They can scan ebay's pages and get seller's ebay account names with no problem.
Damn (Score:5, Funny)
Now that is a punishment that would work pretty good, once word got out!
The problem is much larger than just banks. (Score:5, Interesting)
It's not a major concern in the 3rd world so these guys have no reason to stop. We've seen scams like this based out of Russia, Brazil, China, and several African countries. It will be interesting to see how this all pans out.
Why is it so hard to catch these criminals? (Score:4, Interesting)
Cheers,
Re:Why is it so hard to catch these criminals? (Score:2)
I doubt it's that easy or simple, but.
The authorities tend to be good at gathering and accumulating statistics.
The banks should also be concerned that somebody is using their identity fraudulently.
Savvy users forward the email with headers to such as abuse@citibank.com (which bounces, so there probably is no will to actually do anything about it).
Seems that if the authorities are to be able to do anything about it, they need lots of in-depth info
Re:Why is it so hard to catch these criminals? (Score:2, Informative)
Gmail vs. Phishers (Score:5, Interesting)
Has anyone else noticed that the folks at Gmail have added a "report phishing" feature? When you view a message, click "More Options" and you'll see it.
Then again, maybe it's been there for some time and I just haven't noticed (it definitely wasn't there when I first got my Gmail account though and it doesn't appear to be listed as a new feature).
Slashdot this (Score:5, Interesting)
The lad vampire [aa419.org] needs your help
Fun Scammer Bandwidth-Burner aa419.org (Score:2)
Here is a good rule of thumb: ignore them 100% (Score:2)
Re:Here is a good rule of thumb: ignore them 100% (Score:1)
How exactly are these newbie users supposed to get the information that the web is different than real life? Watch the RvB PSA (yeah, my 6
Re:Here is a good rule of thumb: ignore them 100% (Score:4, Insightful)
There is little new under the sun. Just because we give it an incredibly lame 1337 name; "PHishing" doesn't mean it's not a hundred year old con game.
Re:Here is a good rule of thumb: ANNOY them 100% (Score:2)
How do you drain an account without a trace? (Score:2, Insightful)
In every case getting cash out of my account involves paying a bill (to an authorized agent like VISA), or emailing money or transferring money to a 3rd party acct. All of these leave a trail that banks can recognize and plug.
I once changed my buying habits with my VISA card and had to confirm my identity before the transaction could be authorized. Since fradulent VISA transactions cost VISA, it appears that when it affects the bott
Idiots looking to make a quick buck, that's who. (Score:2)
My friend's paypal account was ripped off. A 3rd party bought a camera and shipped it to Russia, because the auction's shipping was only avalible in the US and the Russian wanted the deal. The Russian supplied my friend's paypal and a $20.
The camera is safe in Russia while the idiot who bought it had a chat with the police.
countermeasures? (Score:2, Insightful)
Re:countermeasures? (Score:2)
So you're advocating a distributed denial of service attack on somebody's server?
An actual phisher would undeniably deserve such a treatment and much more, but that doesn't make it okay. But what if you make a (gasp!) mistake? You could be asking thousands of Slashdotters to participate in a DDoS attack against someone who might be completely innocent, or whose only 'crime' is that their own server was compromised and used by the real phisher.
What you're talking abou
Re:countermeasures? (Score:2)
Re:countermeasures? (Score:2)
When you can't get to www.pornopalace.com or whatever sites you like to visit every day because there just happened to be a phisher in the same co-lo, and a bunch of vigilantes decided to DOS that phisher off the net to protect the innocent (and the stupid), or when your personal site i
Re:countermeasures? (Score:2)
So, who decides which web sites MUST be taken down, and which may be allowed to remain? You? Oh, I see. And this differs from vigilante [m-w.com] justice exactly how? Let's take a look:
a member of a volunteer committee organized to suppress and punish crime summarily (as when the processes of law appear inadequate); bro
Re:countermeasures? (Score:2)
Re:countermeasures? (Score:2)
Hopefully that's not the case. Hopefully you'd take some action above and beyond going home, calling 911, and waiting 15 minutes or more for the police to arrive.
Yes, of course I'd intercede if someone were in direct physical danger. I'd also take action if I saw someone about to reply to a phishing scam.
Ho
I am a victim! (Score:2)
OK, not a victim. Let me restate: I am the recent victimizer of a scammer looking for a victim.
And I have a new $3000 to prove it. Sent to me directly from an "honest businessman" from Nigeria. Really. It was FedEx'd from Nigeria. From a guy named Walter Nabanu.
OK, I don't have a new $3000. But I have a check that says it is worth $3000. But I'm not going to cash it.
How much does it cost to Fedex an envelope from Nigeria to the US?
At least FedEx made out on this d
Re:I am a victim! (Score:2)
OK, not a joke. Let me restate: despite significant evidence to the contrary, I continue to think that I am clever.
What worries me (Score:1)
What would be the best way to protect yourself against this? Is it possible to set up caching DNS to pool from multiple independent sources
Re:What worries me (Score:1)
Although I might be wrong on this...
Re: (Score:2, Informative)
Why do I never get Phished? (Score:2)
I have made numerous postings to Usenet and public email lists with some of those addresses.
I have a few email addresses in mailto: links on web pages.
I have about five times as many credit cards and bank accounts as the average person.
Some of my email aliases are six years old -- I don't think that any of my email addresses from > six years ago still forward to
Re:Why do I never get Phished? (Score:2)
Clearly.
I have one adress that's about 6 years old, use(d) it everywere, and it gets regular esp. 'Ebay' queries.
Some remarks... (Score:1)
There's almost zero chance the phishers knew the author had an account at his bank. They use spamming techniques and count on getting lucky.
Some financial institutions already do this but it is very expensive. Despite the
I'm so disappointed (Score:2)
Usually, no matter what the method of contact, all I get is an email reply with boilerplate info telling me how to protect myself against these scams. This is utterly stupid,
Re:I'm so disappointed (Score:2)
But essentially the gist was they need the fraud to occur in order to do anything about it. Their entire machinery for dealing with fraud requires that it has already happened, i.e. the money has changed hands. They start to act after the fraudulent transactions have been processed. Apparently they need that amount of concrete evidence in
Re:I'm so disappointed (Score:2)
poisoned DB attack (Score:2)
HTML Email (Score:2)
It's a slim chance, but if enough people get irritated enough from having to re-send enough email, then perhaps we can still get rid of this idiotic idea.
Re:Nothing to see here... (Score:3, Interesting)
Re:Nothing to see here... (Score:1, Redundant)
Its just aiming at the big players to maximise your audience.
Currently, more people will fall for something like a Citibank scam than a LocalYokelTownBank scam.
Yes, there will be gullible people in both groups, but a lot more with the larger bank.
Hook, line, sinker.
Re:Nothing to see here... (Score:2)
Re:Nothing to see here... (Score:2)
Could be, yea, that he just feels "special" 'cause these cunning Zimbabweans just happened to guess his bank.
Which could also mean that they are netting fewer people than he thinks...except that there are really not that many small banks anymore.
With only a group of maybe five or six major banks in the US, I am sure it isn't too hard to snag some morons every now and again.
Re:Nothing to see here... (Score:5, Funny)
Don't go to Nigeria to pick up your money (Score:2)