Tracking the Password Thieves 112
wiredog writes "From The Washington Post, yet another story about phishers, keyloggers, and viruses. The story is nothing new, but the author has a blog where he describes how he gathered the information that went into the story. Information including the locations of the victims, and the ISPs likeliest to be hit.
Some of the victims included "an engineer for the Architect of the Capitol" and a man who "works in computer security for IBM." One victim "was fresh out of college, where he'd just earned a degree in information security. (He was actively looking for a job in the field; I suggested he may want to go back to the classroom.)" A compromised machine was also found in "the new accounts department at Bank of America" (Score!)"
Glad we picked the winner! (Score:2)
Re:A list could be good (Score:4, Insightful)
Re:A list could be good (Score:5, Insightful)
Besides, if 2 supposed "network security" people got hit, do the ISPs really have any hope whatsoever in trying to educate their users to avoid phishing?
Re: (Score:2)
I bet we'll get to find out if they get successfully sued over it. I'm not saying it's a good idea, BTW. Just saying that it would be a more likely motivator of action than the parent's suggestion of public naming. Hasn't the lesson of the 21st century thus far been: "public opinion's attention span regarding corporate negligence and malfeasance is too trivial f
Re: (Score:2)
A large percentage of those phishing sites are hijacked computers, themselves. Aggressive takedowns means educating sysadmins about securing their (mostly Windows) servers against attack.
Want to know how to really stop phishing? Make it unprofitable. Since it would take a decent amount of time to set up a server to provide phishers with data, it's an invetment. Thus, unlike spam zombies, they can't move from machine to machine as quickly, and generally, the site is discovered and shut down long before
Re: (Score:1)
I went to school with people who proved that you can do a college course and PASS without ever learning a single darn thing. Having a diploma or a degree is not always the best measure of knowledge in a particular field.
Re:A list could be good (Score:4, Insightful)
This isn't some war between ISPs. The graph shows clearly what ISP had the most victims due to this virii. But even that isnt conclusive of anything because of the quantity of overall customers isnt revealed. Yeh sure we can say Comcast has the most, but they surely have more customers overall than say, oh Qwest.
Re: (Score:2)
I'm not so sure that what you are saying is true.
Re:A list could be good (Score:4, Interesting)
I've often thought of generating some kind of unique e-mail address for each of my friends, to detect if my e-mail address has been compromised by them (or their PC). e.g:
asdf2344ks@gmail.com for my emails to Tom
oieo116i2k@gmail.com for my emails to Liz
The idea is they reply to that address, and mail to these addresses would aggregate to my inbox. If one of those email addresses starts to get spammed, I'll have an idea of who's responsible, change the address for them and see if it continues. After it happening a couple of times I could inform them that they may have a compromised computer and help them out etc.
I just dont have the time to implement such a scheme and rely on Gmails spam filtering which i think is pretty good.
Re: (Score:2)
asdf2344ks@gmail.com for my emails to Tom oieo116i2k@gmail.com for my emails to Liz"
This service already exists. It's been around for a while. It's free. You only need to remember a chunk of your username, and make up the rest (instead of making up the rest of the name, I use the name of the actual site I leave my information with).
ISPs most likely to be hit (Score:4, Insightful)
Re: (Score:2)
That's true, and I understand this argument as it is a familiar one. However, some systems make inherently insecure choices and are slow or late to
Re: (Score:2)
Or "letting the market handle it" by allowing your company's [microsoft.com] incompetence to effectively subsidize a third [symantec.com]-party [mcafee.com] industry possessing only marginally more competence.
Re: (Score:1)
So you say that "security" does not exist? (Score:2)
Windows has a specific security model designed and implemented by Microsoft.
Microsoft's choices have been disparaged by security professionals for YEARS because they violate the BASIC rules of security.
Ubuntu follows the basic rules far better than Windows. Ubuntu is far more secure than Windows.
There are different categories of threats and each cat
Re: (Score:1)
Like, DUH! (Score:2)
Well DUH! Of course it is.
We have this thing called "The Internet" now which means that machines can be scanned and cracked 24/7.
Hmmm, I guess that the sales or McAfee and Norton anti-virus are not real then.
Re: (Score:1)
Re: (Score:2)
Although there are probably more home PCs than servers, the servers are much bigger targets. Until very recently, it wasn't that common to find a home PC that was sitting on a really fat pipe 24/7. Servers, practically by definition, have loads of bandwidth available. If you think that somebody's crappy Windows box getting turned into a spam
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Ya know, I'm glad that was modded insightful, 'cause I don't think anyone's ever made that point on
Naah, just kidding! You're all right.
"Impenetrable?" (Score:2)
Re: (Score:1)
Anyways, with ISPs I would say the demographies are pretty equal (though I have no facts to back that up) - which means the amount of trojans per ISP would rise as the number of users increases.
Re: (Score:1)
Re: (Score:2)
Mapping from an external IP to an internal LAN IP is called NAT. NAT shouldn't be used as a substitute to a real firewall, though you'll find many people who think of NAT as a security measure.
Re: (Score:3, Informative)
Submarine one: "We are sinking because we are the most popular submarine.
Submarine two: "uh, guy.. Try shutting your hatch"
Re: (Score:1)
Except that Submarine One got to be the most popular submarine by giving people what they wanted, namely a convertable submarine that allows all the sunshine in and saves all that hatch opening/closing time. If Submarine Two wants to be the most popular submarine, they're going to have to offer the same "feature".
Re: (Score:2)
Submarine One got to be the most popular submarine by giving people what they wanted
Editorial suggestion: "Submarine One became the most popular submarine by advertising that everyone should want a submarine at a time when most people didn't know what a submarine was. The advertising was paid for using taxpayer money which was allocated in the form of research grants, business subsidies, and government backed low interest technology sector loans."
In short... a scam.
Re: (Score:1)
Word ordering people!!!!!! (Score:2)
No, no no no. Did you not intend:
That's why alternative operating systems are effectively impenetrable to virii and other nasty things.
The words of ordering make a difference!
Re: (Score:2)
Target rich environment, eh?
So goes the old addage "One million chinese people can't be wr^H^Hinfected, can they?
Or, "give a man a phish, and his accounts will be emptied, teach a man to phish and we'll hunt your dumb ass
down too!".
Re: (Score:2)
Or you could just do the easy way and type two line breaks with the enter key, if you're using "plain old text".
Looking at the Distribution Map (Score:3, Funny)
I'm wondering... (Score:2)
Re: (Score:2)
AOL is at the bottom of the list (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
-nB
Re: (Score:2, Insightful)
Even if their thing only works when the user is already online, you need to get it to the person to begin with. Sending the payload over dialup may not be feasible.
Re: (Score:2)
Re: (Score:2)
It's the Russian mafia! Ahhh! (Score:1)
Re:It's the Russian mafia! Ahhh! (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Charts are nice and all, but I would life to see more work done to prevent this.
Agreed.
Or perhaps, don't let idiots use the computer (computer license). It's the only way! The biggest security hole in computers isn't the computer, but the user. :(
And mugging and theft are up in my neighbourhood. It's all these old people. There should be a licence for walking the street! The biggest reason for crime is people who can't put up a fight. Euthanasia at 60 is the only way! :(
Seriously though, users should definitely be educated on computer security wherever and whenever possible (ie. as a fundamental part of job training and IT education in schools). But any talk of computer licences is ridiculous.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
I mean really, what would the test consist of? How about a series of check boxes attached to your tax/license form stating that the user understands that they need to install anti-virus software/not click on
Re: (Score:1)
That phrase gives me the screaming wiggins. ANY government imposition is, by definition, not trivial.
Re: (Score:1)
Re: (Score:2)
What exactly were they doing or not doing? (Score:1)
I'm not the end-all-be-all security expert, but when I help individuals set up a 'net connection, I make sure all firewalls are on (or the r
Re: (Score:1, Informative)
Do these individuals/corporations not run behind a firewall? port blocker? run anti-virus software? run anti-spyware?
The summary says that a machine was compromised at the Bank of America, though from my reading it seemed to just say at a bank. I happen to have some insight into Bank of America specifically. They run firewalls and configure IP access limitations on machines and run and expensive intrusion protection system that searches for this type of thing on their network. None of those, however, will stop a user from bringing an infected MP3 player into work, or in some cases installing software on their workstatio
Re: (Score:2)
Seems to work out well.
Re: (Score:3, Informative)
*Often, the software uses your copy of outlook to hit other people in your address book. Consequently, the infected messages often come from a trusted source - bypassing spam filters as well as the recipients normal level of sus
Re: (Score:2)
Re: (Score:2, Informative)
First of all, recognize that botnet malware evolves at a pace in which it is rather difficult for the antivirus vendors to keep up with. All it takes is a download of phatbot, a little code hacking to ensure it is just perfect for your uses, and then you run it through a packer. You won't preserve the same md5sum of course once your binary is customized, so the only other way
Re: (Score:2)
According to 2005 FBI Internet Crime Report [ic3.gov], almost all surveyed companies used antivirus, antispyware, firewalls and antispam software. The article also says that many victims in this case were as well. I have also had a Win2K box compromised that was very well protected; malware detectors and updates do not work against new exploits. I generally run Linux and Mac systems, and, although there are many fewer threats, I have them protected to the nines. In this case, as others mention, it is the human eleme
"Likeliest" (Score:3, Funny)
Ouch... (Score:2)
Re: (Score:2)
Good school for "Information Security" ?? (Score:2)
Any recommendations from
Re: (Score:2, Funny)
DeVry
Re: (Score:2)
Did you major in arrogance? (Score:4, Insightful)
Because college creates people who are perfectly skilled at a certain field...
Re: (Score:2)
Re: (Score:1)
I wonder if microsoft would hire him. [/sarcasm]
Re: (Score:1)
Poison their lists (Score:3, Interesting)
When the poison credentials are used by the phisher the targeted corp should use their source ip and browser fingerprints help identify other compromised accounts logged in from the same source. Places like banks and pay-pal could also this information to freeze compromised accounts more quickly.
Trojan != Virus (Score:1)
Yeah I know, everybody files all malware under 'virus'; but since the article comes off as somewhat technical it would be nice if this detail was correct. Keyloggers are almost always* trojans, not a viruses.
*The only reason I say "almost always" is because it would technically be possible to put keylogging functionality in a virus.
Re: (Score:2, Informative)
Re: (Score:1)
hacking/phishing/logging != stealing, called fraud (Score:4, Insightful)
i'm getting really tired of everything under the sun being called "theft". It just allows certain other interest groups to keep implying greater moral bankruptcy than actually exists.
a more proper term would be "fraud".
Re:hacking/phishing/logging != stealing, called fr (Score:2)
those likely on computers are vulnerable ;) (Score:2)
Compromised machine in Bank of America (Score:1)
There are no threats (Score:3, Funny)
I don't want preinstalled LINUX (Score:1)
Seems simple enought to me. Then you can install what you like on it. I am sick of buying a new copy of a OS I already own again and again just to feed the MS machine.