The Evolution of the Phisher 278
gurps_npc writes "An article at CNN discusses the how Phishers have moved beyond the typical email scam. Last month, Secunia (Danish security firm) documented a case where a phisher somehow modified a windows host file so that when you type in the correct url in the address, it redirects you to the phisher site.
Worms and spyware are being built for the purpose of phishing, and it is also believed that phishers are attempting to compromise domain name servers. If one of these go down millions could lose their security instantly, even if they themselves have maintened the security of their computers."
Certificates changed? (Score:5, Insightful)
Again, if common-sense is used, 99% of phishing can be stopped.
Re:Certificates changed? (Score:3, Insightful)
Re:Certificates changed? (Score:4, Informative)
I've tested this myself. Put up a fresh brand new install of XP. Before I could even start patching it, I had worms homing in. I think the record so far (not for me but for another article here) is 45 seconds from first boot.
By the time you get around to hitting your bank records, you're already hit. If it's a brand new computer, unless it's fully patched and defended against these specific threats, you would likely already be hit long before you browsed your first site, let alone a critical one.
Think before you flame.
Re:Certificates changed? (Score:3, Interesting)
Re:Certificates changed? (Score:3, Funny)
That's why you have all the stuff you need to patch it on a floppy/CD/flash drive, and don't have it connected to the internet right away. Common sense. Okay, maybe not common sense to most people.
No, that's why i don't have that windows stuff on my computers. Common sense. Okay, maybe not common sense to most people. ;-)
Re:Certificates changed? (Score:2)
Which could be called paranoid for linux may be strongly recommended for windows.
Re:Certificates changed? (Score:2, Interesting)
That's a good reason not to buy your computer from BestBuy. Our company is a local reseller who offers as good (or better) prices than the big box stores, financing options, better components, better warranties, etc. When we deliver a system, it's fully patched, AV installed with latest defs, anti-spyware in
Re:Certificates changed? (Score:4, Insightful)
Clean install.
In the time it took me to download the latest definitions for my antivirus software (less than 5 minutes) I'd already acquired 3 worms/trojans.
My firewall logs are full of worm hits trying to infect my machine.
It's not an urban legend, it's a fact of internet life.
Re:Certificates changed? (Score:2)
Believe it or not, there ARE other operating systems.
--
Cheers, Gene
Re:Certificates changed? (Score:2)
Er, wait...make that:
Isn't this why people SHOULD have firewalls between their brand new computers and the internet?
Re:Certificates changed? (Score:2)
And if you were smart enough to have read my post you would have seen the line about DOMAIN SERVERS being attacked and how this means they do not have to have edited anything on you your computer.
Next time, before you call something stupid, think "Maybe Jarn has no idea what everyone else is talking about".
Re: (Score:2)
Re:Certificates changed? (Score:3, Informative)
It's not perfect, but it'll help.
Re:Certificates changed? (Score:2)
That's another one of those things that used to be true, before the magic of Windows made it otherwise. Remember "you can't possibly get a virus just by reading your email"? These days it is very possible to have your brand-new Windows system compromised within a minute or two of connecting to the Internet, whether you've done anything else or not.
Think before y
Re:Certificates changed? (Score:4, Interesting)
Also, what if someone on the inside were to modify the master disk used to image the hard drives at a factory. Sure it might make the news and eventually you'd hear about it, but it still wouldn't be fun to be one of the people affected?
Re:Certificates changed? (Score:2)
Not only that, but what if it turned out to BE my bank doing the phishing, rigging the banking website to modify my certificate to accept the banking site, and then storing my login and password so my bank could get all all my banking info?
Ohhhh, phishers can be devio
Re:Certificates changed? (Score:2, Interesting)
Then you must not get out much. As they were talking about a DNS becoming compromised such that even secured systems become redirected, your argument makes absolutely no sense. It's akin to saying that since your new car has just come off the sowroom floor, it should be entirely unaffected by that bridge out ahead.
For further instructions, consult own advice.
Re:Certificates changed? (Score:4, Interesting)
Does anyone know if that is correct? If so, then this is possibility.
--Jeff++
Re:Certificates changed? (Score:5, Insightful)
Re:Certificates changed? (Score:4, Funny)
Re:Certificates changed? (Score:4, Insightful)
Re:Certificates changed? (Score:2)
Admittedly, the net is used for a lot of things that people may not b
Would that be so bad? (Score:2)
Re:Certificates changed? (Score:4, Insightful)
Say I usually go to site A to do my banking. And I have a trusted security certificate for that site.
I get infected with one of these phishing worms which alters my host file so that whenever I type out the URL to site A, I get the IP address to site B.
I inadvertly go to site B. Site B doesn't require a security certificate. When would I get a warning about "incorrect" security certificates? As opposed to "expired" or "missing" certificates?
Or better yet, these phishing worms pre-install their security certificate at the same time they hack my hosts file. When would I get a warning? As far as my web browser is concerned, I'm going where I intended to go.
I think your solution solves the wrong problem.
Re:Certificates changed? (Score:3, Informative)
I get infected with one of these phishing worms which alters my host file so that whenever I type out the URL to site A, I get the IP address to site B.
I inadvertly go to site B. Site B doesn't require a security certificate. When would I get a warning about "incorrect" security certificates? As opposed to "expired" or "missing" certificates?
Assuming you are smart enough to require a site to be secured w
Re:Certificates changed? (Score:2)
Besides all that, I'm fairly sharp about my security, and I know most of the fundamentals of the math behind it, and I wouldn't be shocked if my bank switched SSL keys because their old one just expired. Imagine the bedlam
Re:Certificates changed? (Score:3, Interesting)
Enablement... yeah, that's a perfectly cromulent word...
Re:Certificates changed? (Score:2)
What are you talking about? There is no such warning that I am aware of. I don't believe IE caches certificates and compares them with the last time you accessed a site. The only program that does this is ssh, which is hardly end-user material.
What will happen instead, if the DNS were to be hacked, is that the site will be UNABLE to come up witih a valid certificate on the
Re:Certificates changed? (Score:2)
Who uses https? (Score:2)
No HTTPS, no prompt whether to accept a new certificate.
If you want to be even nastier I think you can set up Apache so it will use a "null" cipher. I'm not sure whether certificates are even needed in that case, but to anyone who doesn't drill through the "security" dialogs it will look like a genuine site.
Old game (Score:2)
It's not like this is anything new.
Indeed (Score:2)
Matthew 4:16-19 (Score:5, Funny)
Jesus p0wns you.
Phising on Linux (Score:5, Funny)
Although I could have written a very complex and well written virus that probably wouldn't work on you operating system I am asking you to reply with you account name, password and any other card numbers you might have.
I further ask that you forward this email message to all your friends and for that matter any one you don't know urging them to send me all your information.
Yours Truly,
Mr Phisher
Re:Phising on Linux (Score:2)
From TFA (Score:2)
Did I read that correctly?
A senior employee of an Internet Security firm used to think of Phishers as "petty thieves"? Maybe Paris Trudeau needs to find a new line of work.
Re:From TFA (Score:2)
After that it's largely a semantic debate as to what makes something an organized crime (2 guys working together?) and how many thousands you have to steal to not be petty.
Re:From TFA (Score:2)
And when your emotional state gets to the pre-teens age group, you will learn that a flame doesn't accomplish anything. Other than making you sound like an ass.
My point, which obviously you will require a map to understand, is that this person (Paris Trudeau) should not have been using 'soft' language like 'petty thieves' to refer to Phi
Re:No, you didn't read it correctly, you idiot. (Score:2)
Oh, isn't that nice. An AC calls me a moron. How cute. Grow some gonads, AC.
It's not me I'm worried about... (Score:2)
Re:It's not me I'm worried about... (Score:2)
How weird to be saying "Thank You mom and dad for being averse to technology" as a geek and actually be praising them.
Why use https? (Score:2)
What's to keep them from sticking in a Verisign graphic just to look safe? Think they're going to be stopped by copyright law?
Re:Why use https? (Score:2)
That's pretty unlikely. I mean, copyright violation is technically illegal. Plus, the government has been cracking down on it pretty heavily. No, safer to just stick to fraud.
Anti-Phishing browser (Score:2)
Of course then you would see popups that look identical to the key information, inf
One small change to your plan... (Score:2)
SecurID would not defeat spoofing attacks (Score:2)
Also potentially if you knew the users PIN and a few correct passcodes/times, I think you can crack the token and have your way with the server. I forget how or if that really works though.
Evolution of the phish? (Score:4, Funny)
I blame christians... (Score:2)
(Yeah, I know that was bad, but I just couldn't resist!)
Shouldn't it be.... (Score:5, Interesting)
Fishermen fish.
Phishermen phish.
It's not "Fishers fish".
Carrying the analogy further, IE becomes a "phishing net" and Windows becomes a "phishing boat". The intarweb may be viewed as the "ocean" and your average AOLer a dumb "phish". Smarter geeks could be viewed as smarter"dolphins".
Interesting, huh.
Re:Shouldn't it be.... (Score:2)
Re:Shouldn't it be.... (Score:2)
It's not?
From Webster's Revised Unabridged Dictionary (1913) [web1913]:
Fisher \Fish"er\, n. [AS. fiscere.]
1. One who fishes.
[...]
From WordNet (r) 2.0 [wn]:
fisher
n 1: someone whose occupation is catching fish [syn: {fisherman}]
[...]
From M-W online:
Main Entry: fisher
Pronunciation: 'fi-sh&r
Function: noun
1 : one that fishes
[...]
Anyway, what about fisherwomen, you insensitive, sexist clod? And did you know that the word "gullible" doesn't appear in any
Re:Shouldn't it be.... (Score:2)
DNS? Bah! (Score:5, Funny)
Mod Parent Up (Score:2)
I scrolled down the posts, looking and looking for someone to address the problem of DNS compromise.
You nailed it, thus the +Insightful -- and throw in some +Funny, for good measure.
-kgj
Re:Mod Parent Up (Score:2, Informative)
Most web sites are hosted on a shared platform. That's the whole reason HTTP 1.1 was invented. Go to any site on there and unless you type in the commands directly and like reading text with html tags (not displayed as web pages), then over 90% of web sites will be inaccessable.
Re:DNS? Bah! (Score:2, Insightful)
Re:DNS? Bah! (Score:2)
Re:DNS? Bah! (Score:3, Funny)
Simple cure (Score:2)
Re:Simple cure (Score:2)
And if your ISP's name server or your border router or something not on your desktop is lying to you about a forward lookup on a trusted domain name? This doesn't even have to include SSL hacking, because most users will see the phish mail, and if they're typical people, see that the target URL is mybank.com and just go there, and suffer.
This ain't just an MS thing.
spyware problem: admin users v. regular users (Score:2)
If Admins can modify this file willy-nilly, then could be a major problem for users who haven't bothered to create user accounts.
rj
How's your phishing-picking-out-skills? (Score:2, Interesting)
I have noticed this lately as well... so now I scrutenize every email I get, hovering over links, and occasionally, entering the first line or so into google. I do consider myself to be prett
We're from the government; we're here to help (Score:2)
It's not only about certificate errors (Score:2, Insightful)
Phishers do not need to be successful very often. Think sperm here: if conditions are right, most of time only one gets lucky 20% of the time. (Sorry for the anchorman gag)
Consider the facts:
1) Only a few sites transact critical personal data (Credit cards, identity info) without proper security
2) Only a few sites use security certificates that are A) out of date B) for a different site C) otheerwise invalid.
3) only a modest majority of IE users have been trained into clicking "O
Cyber terrorism? (Score:5, Insightful)
On the one hand, downloading music from "unauthorized" sources such as P2P networks will get million dollar fines and, if the companies get their way, jail time, when there is actually no evidence that they are causing a loss of revenue (even if they are technically violating copyright law).
Meanwhile, people who write spyware, break into computers and DELETE data, shut down networks, and attack DNS servers in order to disrupt all traffic on the Net (roughly the online equivalent of putting tacks all over a major expressway junction) get.... what? Really, I have no problem with seeing these people get 20-life hard time.
When will the people who [ run the country | have money | bought Congress ] realize who the real threat to the Internet and to their bottom line is? It's not cheap Britney Spears fans. It's the people trying to break the Internet in order to get better advertising.
Oh wait, I forgot. Advertising is always good, because companies do it, so they can't object when someone tries to advertise. Silly me. Greedy SOBs have to stick together.
Don't trust DNS (Score:2)
For example, instead of logging into your bank by typing in "www.mybank.com", bookmark their login info like:
https://www.mybank.com/login.bnk?gz=1
Or whatever.
When you visit the https url, even if a phisher has completely altered dns and hijacked your connection, they do not have the private key for the institution.
If you want to be paranoid, save your institutions certificates locally so that even if a h
Re:Or... (Score:2)
(2) I don't care about most people. I'm talking about how to stop phishers from stealing your data. If people don't want to go that far, fine... let them deal with the identity theft that follows. I'm more concerned with preventing attacks upon thos
Who needs DNS?! (Score:2)
Seriously though, any reason why the kernel's DNS-lookup procedure couldn't be changed to verify the IP through N servers instead of just the primary server? Of course, if one of the root dns servers go down, then that's it, but it's more likely that YOUR ISP's box will get rooted.
Re:Who needs DNS?! (Score:2)
Of course that assumes that sites transferring secure data use SSL, which is not always true. But I'm not sure whether adding even more DNS queries for every lookup is a good idea, since there is already more DNS traffic on the wire than there needs to be.
Easy Short Term Fix (Score:4, Insightful)
Mail clients should also notify users when the displayed http:// url differs from the actual href.
A better fix would be for banks and other organizations to set up contact addresses for people to inform them. Many of them take days to read feedback I've sent them regarding someone trying to scam their customers.
Re:Easy Short Term Fix (Score:2)
This is very scary, as it would be almost impossible to detect! Fortunately, certain sites are releasing "security plugins" which tell you if the site you're connected to is legit. Unfortunately, it's only a matter of time before spyware and phishermen start to hijack these security plugins as
Re:Easy Short Term Fix (Score:2)
I'm confused (Score:3, Funny)
Where to watch? (Score:2)
Load of BS (Score:3, Informative)
Does anybody really think that compromising a root DNS server will suddenly redirect customers of e.g. Citibank to a phishers site and it wouldn't be immediately noticed ? C'mon:
- DNS is distributed and any change in DNS takes a while to propagate (on the order of days). Moreover, more and more sites are switching for digitally signed updates to DNS, so bogus updates have no chance to go through.
- Do you really think that e.g. a bank or eBay would not notice that somebody hijacked their domain? The only think a potential phisher would achieve is to attract a very close attention to himself and very quickly at that.
More credible threat are tricks like changing the hosts file, however with that we are in the domain of common adware/spyware which hijacks the browsers on Windows routinely.
Finally, any bank worth my money does not use just a stupid username/password for authentication! Most European banks have as a standard feature a challenge/response mechanism (in addition to the username/password pair).
Some banks even go that far, that they issue you a smartcard with a pocket "calculator", which generates correct responses to the challenges from the bank. The smartcard is used as a seed for this and is protected with its own PIN that you have to enter before typing in the challenge code from the bank. The codes transmitted are usable just once, so they are completely useless to the phisher. Oh the mindless scaremongering ...
Supposedly now five minutes (Score:2)
I've always worried about either terrorists or the FBI conducting an attack on the populace where a component of that attack was causing mass confusion and disturbing communication (e-mail and blogs) via a DNS takeover.
DNS is a weak point. Sure, "only" 99% of Internet users rely on one of the main DNS servers, and, sure, like all censorship on the Internet, the Internet will route around it. But confusing/misinforming 99% of the
Re:and this is accomplished how? (Score:5, Insightful)
But I'll bite - attacks on DNS servers will direct everyone to the wrong site, Windows, Linux, UNIX, and Amiga users.
Sorry.
Re:and this is accomplished how? (Score:2)
Re:and this is accomplished how? (Score:2)
Re:and this is accomplished how? (Score:2)
So instead you simply modify the library path to include a directory that is writable, and drop a compromised resolver library in there.
Much harder though (Score:2)
While you could do that, no-ine has done it yet - whereas in the story it noted a case of the Windows host file being modified already.
I would say modifying a text file is an order of magnitude or two easier than creating a working resolver spoofing library and getting it installed.
On top of all that, you'd only have installed it for one user of the box.
The grandparent is ignorant about Windows (Score:2)
Actually, the XPs security system is more sophisticated than the typical UNIX file-attributes. The only stupid thing is that it's global RW by default, and the installation routine doesn't create an unprivileged account for the people to use.
Of course, it made Microsoft more money to make it easy for people,
Re:and this is accomplished how? (Score:2)
The smarter thing would be to run your daily account as a regular User (not Administrator) and then programs would not have access, but you could easily run apps as Administrator (using runas...") when you need a access.
Re:and this is accomplished how? (Score:2)
Re:and this is accomplished how? (Score:2)
Not true. Not all DNS Servers are *nix, nor does *nix require bind. That's like saying that AutoCad has a buffer overflow, Windows is insecure.
Re:and this is accomplished how? (Score:5, Insightful)
Hmm... lets see.
*runs regedit, tries to modify system registry keys -- ACCESS DENIED*
*runs setup.exe, windows prompts for administrator password, I don't provide it -- ACCESS DENIED*
*try to delete or modify a file on C:\Windows, or C:\Program Files\ -- ACCESS DENIED*
*go into Hardware > Device Manager , tries to change hardware settings -- ACCESS DENIED*
etc...
I dunno... seems to be working pretty well from here.
Don't confuse users choosing to run as root as having a failing privilidge system. Remove your account from the Administrator group and into the User group, and you'll see how extensive the privilidge system is. Conversely, use root as your daily linux account and see how much protection that gives you.
Re:and this is accomplished how? (Score:3, Insightful)
There's a reason why many people run Windows as root, and it's not always cluelessness.
Re:and this is accomplished how? (Score:3, Funny)
I personally thing it's about time users demand that software makers stop coding applications that require admin access simply to run. That's unheard of in linux/uni
Re:and this is accomplished how? (Score:2)
http://support.microsoft.com/?kbid=225035 [microsoft.com]
silent assumption there (Score:2)
The first Internet worm was long before 32-bit Windows hit the scene. For BillG and co. to release an OS touted as "Where do you want to go today?", while ignoring even basic privileges, was negligent at least, and criminal at worst.
Re:and this is accomplished how? (Score:2)
To do this, make the script below into a batch file. (The script below assumes you've renamed your administrator account to something - I chose XXXAdministrator). Read the comments in the script to see how it works - it's pretty nifty.
Re:Passwords updated (Score:2)
Re:Passwords updated (Score:3, Interesting)
Re:Passwords updated (Score:5, Insightful)
Now, you have the situation where a hostile stranger poses as a man in the uniform asking joe citizen to do what he's been trained all his life to -- show his papers, give his numbers, sign right here... are you surprised at the results?
Re:Passwords updated (Score:2, Interesting)
Re:No more new made up words for things that exist (Score:2)
Car - horseless carraige.
Re:Everybody, remember all IPs (Score:2)
This would only be secure if the cache was secured using a secret key (i.e. using local serial number information that wasn't ever visible from the network a machine might be on).
Re:Everybody, remember all IPs (Score:2)
Now if only FireFox supported such a system...
Re:Let's face it (Score:3, Insightful)
I recently opened a new account and they told me "oh, by the way, online banking is free! All you have to do is XYZ to start using it." It turns out my account was already open to all comers if they happened to know my account number and part of my SSN. So I was FORCED to at least set a password. No, I haven't yet written a letter to the bank, because I don't think it will really do any good.
Eventually, as banks find higher profit in not provid
Re:Why are you linux guys hung up on Admin/user bi (Score:3, Interesting)
But why are you linux guys so hung up on the admin/user bit?
From what I was able to gather from your post, you are trying to convey to everyone that it should not matter if a user runs under a "Limited" account, or an "Administrator" account (using Windows terminology).
Unix was designed with multiple users in mind. In fact, many system services run under their own user account. The one, all powerful a