Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Almighty Buck

Spies In the Phishing Underground 87

An anonymous reader sends us to Net-Security.org for an interview with security researchers Nitesh Dhanjani and Billy Rios, who recently managed to infiltrate the phishing underground. What started as a simple examination of phishing sites turned into an extraordinary tour through the ecosystem that supports the business of phishing. In the interview they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, and discuss how phishers communicate and how they phish each other.
This discussion has been archived. No new comments can be posted.

Spies In the Phishing Underground

Comments Filter:
  • Duh (Score:2, Interesting)

    by Alexx K ( 1167919 )

    Rios: This is one of the more surprising aspects of the research we (Nitesh and I) conducted. I had always thought that most phishers were clever hackers evading authorities using the latest evasion techniques and tools. The reality of the matter is most of the phishers we tracked were sloppy and unsophisticated. The tools they used were rarely created by the phisher deploying the actual scam, and for the most part it seemed the phisher merely downloaded kits and tools from some place and reused over and ov

    • by Tablizer ( 95088 )
      I had always thought that most phishers were clever hackers evading authorities using the latest evasion techniques and tools. The reality of the matter is most of the phishers we tracked were sloppy and unsophisticated. The tools they used were rarely created by the phisher deploying the actual scam, ... merely downloaded kits and tools from some place and reused over and over and over again. [re-quote]

      Business software engineers have been having a hard time to get reuse to work decently, but ironically
      • Isn't that generally the way it is on the 'net though?

        The underground (and often illegal) enterprises push the envelope of what the technology is capable of (both technically and in terms of what it can do for people), and then the legitimate enterprises follow suit 5 years down the line.

        For example: music distribution, film distribution, game downloads, VoIP, online porn; the list goes on and on...
        • Re:Duh (Score:4, Insightful)

          by Brad Eleven ( 165911 ) <brad.eleven@gmail.com> on Monday January 28, 2008 @08:52AM (#22206924) Homepage Journal
          Excellent point.

          Too bad it's not that way in government agencies. My impression is that their dominant mindsets are:
          • No use of "not invented here" techniques or technology
          • We'll never win this "war", the best we can do is to get ourselves promoted
          • Open software and other new technologies are tools of the enemy
          • Let's use my cousin Bob's company to get this done

          I would be surprised and delighted to learn that things are any different at all. Having served in the military, I retain a smug sense of superiority, even though I know that there must be intelligent life in government. It's frustrating to keep finding that we're being taxed and led by selfish, incompetent people.

          It's like growing up in a home infested with vermin, where the parents just shrug and say that they can't do anything about it, when it's obvious that they're just spending their money and attention on something else. Their willful ignorance might allow me to get away with whatever I want. The trade-off is finding that my possessions have been gnawed by mice or encountering cockroaches that look at me defiantly when I turn on the light.

          As long as they let me alone, I'm OK with it. When they step in and try to suddenly impose discipline, I want to say, "Where were you when I needed you?"

          No, the government isn't my parents, but it's been getting closer to the asymptote. Public school has been mandatory since before I was born. Income tax is beyond mandatory. Laws have become more and more restrictive, and we are now being monitored without warrants. That's pretty close to what I remember of my own parents, except that in this case, I own all of the responsibility.

          On a national level, it's not as simple as moving out. The analog to running away from home is participation in some underground economy.
    • Re:Duh (Score:5, Funny)

      by russ1337 ( 938915 ) on Monday January 28, 2008 @12:44AM (#22204924)

      P.s.: Damn, there's a lot of advertising on that site.
      Yeah, not only that but I thought it was kinda strange that i had to enter my credit card details just to read the article.
    • Re:Duh (Score:5, Interesting)

      by Kristoph ( 242780 ) on Monday January 28, 2008 @02:17AM (#22205290)
      It is in the best interest of skilled hackers to make these things available to, essentially, anyone.

      In a sea of phishers law enforcement is likely to catch those who have the least amount of skill simply because its easier for them. The time they spend on those cases is less time they have for people who really know what's going on.
    • the only add i see is the one to get the weekly news letter oh!! the joys of addblock plus , no-script and a host file with 16,875 add servers pointed to 127.0.0.1
      • "addblock plus , no-script and a host file with 16,875 add servers pointed to 127.0.0.1"
        Any chance you'd post that hosts file? I could use it too.
    • It's a "revelation" to these guys because they're selling it to mass media. Joe Smith, who falls for phishing sites, doesn't understand what's really going on under the hood. He can barely spell his own friggin' name on a form. Joe Smith watches TV and reads the daily paper, along with a handful of "topical magazines" that are all-too happy to publish this sort of tripe.

      It's the journalistic equivalent of "Lost", a whole pile of bullshit spread out so very thinly even the retards can enjoy it.
  • Weak article (Score:5, Informative)

    by plover ( 150551 ) * on Monday January 28, 2008 @12:28AM (#22204816) Homepage Journal
    Not a lot of new information there.

    To summarize:

    • Phishers have forums where they trade with other phishers.
    • Most phishers are script kiddies. Phishing is usually done with pre-made phishing kits. The phisher plugs in their email address and uploads it to a compromised server.
    • The phishing kits are riddled with backdoors, where the original kit author does stuff like send copies of the victims data to their own email address.
    • Anti-phishing browser plugins lead to a ready-made list of compromised servers. Hackers know that any server on the list is hackable.

    Six pages? I was hoping for at least the transcript of a chat with a phisher.

    • Anti-phishing browser plugins lead to a ready-made list of compromised servers. Hackers know that any server on the list is hackable.
      Put presumably since these servers find themselves on a well circulated "blacklist", they get closed pretty soon? No?
      • Ever work in a fortune 500 ? It takes an act of congress to be able bring a server down and reimage it to a known good state if it's been compromised. And they are usually the places with enough bandwidth that they may never find the compromised boxen , until some one important's kid installs the plugin and he can't view his web mail.

        Besides I don't know any security or even system admins here at a fortune 100 that even bother looking at blacklists. Well maybe the email guys do , but no one else I talked wi
    • Re: (Score:2, Interesting)

      I doubt a chat with a phisher would be helpful. It'd probably incredibly dull, and filled with brackets due to typos on their part. Besides, as in most shadow communities, phishers tend to assume you either know everything, or you're a complete idiot to be ignored. I'm willing to bet that you couldn't get a (current) phisher to tell all.
      • Re:Weak article (Score:5, Insightful)

        by Windcatcher ( 566458 ) on Monday January 28, 2008 @01:30AM (#22205122)
        I doubt a chat with a phisher would be helpful. It'd probably incredibly dull, and filled with brackets due to typos on their part. Besides, as in most shadow communities, phishers tend to assume you either know everything, or you're a complete idiot to be ignored. I'm willing to bet that you couldn't get a (current) phisher to tell all."

        It begs the question, in dealing with the phishing community, who are we dealing with -- the uneducated, the merely poor, the greedy, the antisocial, or worse? Is the phishing community an outlet for the antisocial/maladjusted/borderline mentally ill? I'd like to pose the following question: assuming that such people always have and always will exist in the world, is the tech community remiss in taking this into account? When we create a piece of hardware or software, do we need to ask the question, "what if someone with an 'LSD in the reservoir' mentality gets his hands on this?" In connecting the world via the Internet, we've also connected ourselves to every flavor of person we would rather avoid in real life. Does there need to be a shift in the way we view our responsibilities as tech authors/creators?
        • Re:Weak article (Score:5, Insightful)

          by plover ( 150551 ) * on Monday January 28, 2008 @01:44AM (#22205162) Homepage Journal

          Does there need to be a shift in the way we view our responsibilities as tech authors/creators?

          This is very much like the "security through obscurity" argument. In security it's always assumed that the bad guys know or can learn the algorithms, weaknesses, etc., everything but the key. In the case of technology such as phishing kits, there may be no reason for a legitimate developer to write such a thing, but there's nothing stopping an unethical person from writing one.

          Don't get me wrong: training software engineers in ethics is a good thing. Professionals need to understand their responsibilities. But bad people can't be stopped from writing malicious software. The bar for writing software is already too low, and is getting lower by the day.

          • Dude, security through obscurity totally works. Have you ever talked to a woman? Best security EVER. No man has ANY idea what they're thinking. *amazing*.
          • Re: (Score:2, Insightful)

            by umghhh ( 965931 )
            I disagree with the low bar (to enter software developer heaven/hell). It is like with anything else: some can do it, some dare do it, some dare not do it and there are some that actually can do it well. ALl these groups may overlap somewhat in different areas of expertise. One can argue that to do pishing etc the bar is low - I can agree with that. Low standards, lack of understanding of basic principles by users and organisations one trusts or has to trust(banks or gov. agencies come to mind) and availabi
        • Re:Weak article (Score:5, Insightful)

          by Opportunist ( 166417 ) on Monday January 28, 2008 @01:47AM (#22205176)
          Who you're dealing with is quite simple. A mix of people, as usual. You have the crowd that knows nothing, but wants a piece of the cake. They're mostly harmless. They buy some phishing kit and try to get a few bucks. Usually they're caught. They're much like the average bank robber that goes into a bank with a gun but without a plan.

          Then you have the ones that want to try it just to see if they can. They're just as harmless. They just get your ID and then don't do anything about it. Except maybe bragging to their friends, which usually turns into them getting caught when one of their friends decides they don't want to be friends anymore.

          And finally you have some well organized groups that actually cause the problem. And there you usually get to see the type of people that you expect from such groups. You have the ones that write the code, usually quite smart people who know their shit and who also get quite a bit of money for their work (I was honestly tempted to switch sides...). Imagine an unemployed top notch programmer in an east europe country and the chance to see 4-5 digits per month, and you know what I mean. Then you have the people who can provide the necessary "hardware", i.e. acquire servers and the necessary connections to keep them running for a few weeks. In smaller groups, this is often the same person who does the coding, but even in this shadow business you notice tendencies to 'outsource' work, i.e. buy kits or hire people to do the server shifting. These are usually not the people you will talk to, unless they have reason to contact you (i.e. when they consider you someone who can get them servers or provide code).

          Then you have the people who hire the goons to grab the money and run, and fools with bank accounts. These are usually the ones you will talk to when they try to find someone gullible enough to provide their bank account for transfers. And finally you have the goons that go to Western Union to collect the loot. These are the ones you usually catch when you do a sting. They're much like the average street drug dealer, the lowest on the chain and the ones that are easy to replace. Usually some poor guy, homeless or asylum seeker, is hired for a few pennies to risk it.

          So, in general, unless they have good reason to talk to you, you won't get to hear from anyone who is up far enough on the ladder to be interesting.
          • Re:Weak article (Score:4, Insightful)

            by Antique Geekmeister ( 740220 ) on Monday January 28, 2008 @05:11AM (#22206026)
            I'd like to disagree with you on this. There is a threshold involved, that of actually getting someone's fiscal data rather than their home address or telephone number or computer password, that automatically means they are beyond the normal "hacker" exploits. If all you want to do is look around, you can do it with a sense of self restraint that gets you people's personal email or passwords, not their money information.

            I'm also afraid that bragging to their friends does not, in fact, usually get them caught. The number of hackers, crackers, phishers, and other people who poke around other's computers seems to consistently be much larger than the number arrested or even caught. Most companies don't bother to pursue such frauds: they just say "is it worth our time and money to track them down? will we get our money back, or will it stop the next round from trying the same stunt", decide it won't, and ignore it as a part of doing business.

            Even getting the police involved against the worst crackers and phishers is difficult. Getting police to act across state lines, or worse international borders, is a nightmare of arcane turf wars among governmental security groups who frankly will not bother with small thefts. They can only be convinced to pursue it when the amount exceeds some threshold, which varies from agency to agency and from month to month, but a few thousand stolen from any individual is like losing your wallet on a bus. They just won't bother doing anything about it besides sending you a form letter to fill out, which is promptly ignored.
            • The people that get caught are usually "dumb" enough to do it in their own country, and transfer the money directly to their own account. They are basically your average scriptkid with not enough brains to think past the tip of their nose, and those are also the cases you get to hear about as the "big breakthrough" in the fight against this kind of crime.

              For the better organized people, you're right. A server in Manila, phishing for banks in Denmark, with money withdrawn in London, all organized by some gro
              • Oh, even for the worst offenders and most idiotic script kiddies, the conviction rate and discovery rate is pitiful. How many of us actually pursue all the IP addresses of script kiddies trying to log in as root remotely to our servers? How many of us succeed in actually prosecuting such an abuse, especially when the law enforcement agencies kick it to the FBI and the FBI can't be bothered?
                • That's because sending a sync to every port available is not a crime per se in most countries. Even a login as root isn't a criminal action by default (because, well, you could still claim you just mistyped the IP address, or there was a DNS problem and so on, most legal agencies know that defense well, and that due to in dubio pro reo, there's little chance to get it past any judge).

                  So, what it comes down to, unless you can claim without a shade of doubt that someone was doing something illegal, no agency
        • Re: (Score:2, Insightful)

          by easyTree ( 1042254 )

          In connecting the world via the Internet, we've also connected ourselves to every flavor of person we would rather avoid in real life.

          In a sense though, this is a good thing. I'm arguing that complete worldwide social cohesion is required before the world's problems may be solved. If we have isolated (economically, socially) pockets of people who live outside the main body of society (whose members enjoy all the luxuries that the modern world has to offer), they are always going to send raiding parties of o

        • It begs the question, in dealing with the phishing community, who are we dealing with -- the uneducated, the merely poor, the greedy, the antisocial, or worse? Is the phishing community an outlet for the antisocial/maladjusted/borderline mentally ill?

          Wow, doesn't sound that much different from the fishing community!

          Back when Jeff Foxworthy came out, my cousins were listening to one of his routines. One of them goes "Holy shit, I have been too drunk to fish!"

          To my cousins' credit, none of their cars are on blocks in the front yard, they have them in sheds in the back of the property and they did a really good job of kitting them out, late 70's muscle cars.

    • Re: (Score:2, Insightful)

      you missed what i thought was the most interesting point... phishers exploit blacklisted phishing lists because usually all the servers listed are unpatched and still vulnerable. sometimes there's multiple phishers using a box at once.
    • by v1 ( 525388 )
      six pages has become the norm for a "spam the crap out of a popularinteview" hasn't it? Even if the interview is only 20 sentences, we can squeeze at least six sets of banner hits out of it cant we?

      This one did better than most, I think we got at least ten sentences per page. The entire interview would probably have fit on one printable page. They make the column width for the actual text take up not even 1/2 the width of the page and start you out with a 1/2 page of banner to make you have to scroll by
      • Yah, so we need a new tag, which can warn others to stay away from clicking to the article due to a blatant attempt to generate ad revenue.

        I offer 'adFarming' for starters..
  • Nitesh Dhanjani and Billy Rios can expect any site they are associated with to be DDOSed in....

    3..

    2..

    1.

  • by Opportunist ( 166417 ) on Monday January 28, 2008 @12:36AM (#22204876)
    So they skimmed botnet servers, scammed scammers, talked with phishers and "infiltrated" their network and got a hand onto phishing kits. Ok. Various AV researchers have done so for at the very least a year now, many for over two years, full time, with a hand deeply in the whole process.

    Should I write a book now or something?

    Gaining such information is actually not that hard. Many have done that, but the majority so far had the brains to keep their mouth shut about it. First of all, nobody in that scene likes a loudmouth, it makes your work incredibly hard if you talk too much. And second, the last thing we need is more people trying to get into the "market".

    But then, as we've read last week, you probably get a trojaned kit anyway. :)
    • Re: (Score:3, Funny)

      by Aardpig ( 622459 )
      So who shat on your cornflakes this morning, sunshine?
      • Self proclaimed experts in general.

        Maybe I should just shut my mouth and even increase the mystique and magic that surrounds the "hackers", flash around my "security expert" tag and walk around like my farts don't stink, but bluntly, I get fed up by people who broadcast news that are none.

        You know what would be news? When someone managed to hack into the P2P botnets. That would be stunning, that would be something the whole AV research community would nod their collective head and bow to. This is just a "be
        • No, you should write a book.

          Obviously there's an audience for this kind of information, and your mom would be so proud to see your name at the top of a Slashdot article.
    • But then, as we've read last week, you probably get a trojaned kit anyway. :)

      What - Sony are selling Phishing Kits now?

      PhS3 anyone?

    • Re: (Score:2, Insightful)

      Slightly unfortunate you feel this way. The big wheel spinning is based on the sole fact that the more you perpetuate and stimulate, the more you get challenged. If we all stopped wanting to get involved and being fewer people as you say, then less and less chances for advances would be made.

      I think of Bj Franklin and Tesla, without one you wouldn't have gotten the other. Yet had Bj been the same as you, Tesla would never have had the possibility to review his work, and grow from there.

      The only thing I thin
      • As with M$ vs. Linux, the only reason Linux isn't as vulnerable, is that it isn't as popular.
        Hmmmm ..... and all this time, I thought that little, insignificant things like architecture & design might have at least *something* to do with it. Didn't realize it was nothing more complex than a popularity contest.
        • It basically is one.

          The core problem of today's malware is that it does rarely rely on system shortcomings. Most malware today uses user "stupidity" as the entry point, tricking the user into executing some sort of program which contains the trojan. It's rarely anymore some sort of exploit, first of all because they require more work but also because even Windows slowly closes all those insane security holes.

          And when it's down to the personal security consciousness and knowledge of the user, even the best s
          • All I can say is .... *wow*

            The core problem of today's malware is that it does rarely rely on system shortcomings.

            You mean I've been wasting all my time patching up buffer overflows, polishing up my input parsing routines, and all this other stuff for NOTHING?. If there are no system shortcomings, there's nothing to exploit.

            Most malware today uses user "stupidity" as the entry point, tricking the user into executing some sort of program which contains the trojan.

            Yes, it does ...... but if there are no (or

  • So, what TFA is saying is that the phishing community is just another community of skiddies, just like the rest of the modern "hacker underground" or whatever you want to call it. This is news how?

    Besides the obvious hacker/cracker naming issue, the fact is that today's "hacking" community bears little resemblance to the real hacker heroes of the past. The hacking/cracking issue has been hashed out enough around here, so i'll leave that issue alone.

    Of the people that call themselves hackers in the mod
    • Oh, I'm fairly sure every 15 year old wants to be a "hacker". Hey, hackers are cool. Cooler than robots, zombies, pirates and ninjas combined. And even if not, tech ain't here yet to become a robot, it's not really fancy to be a zombie, pirates are outdated 'til we finally all believe in the Spaghetti Monster and, let's face it, few if any computer nerds have the fitness to become ninjas.

      So hackers is it. Hey, sure I wanted to be one when I was 15. I just had no internet and thus no way to download some sor
  • by Anonymous Coward on Monday January 28, 2008 @12:39AM (#22204900)
    "Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing sites, turned into an extraordinary view of the ecosystem that supports the phishing effort that plagues modern day financial institutions and their customers.

    They saw an extraordinary amount of sensitive customer account information, obtained the latest phishing kits, located and examined the tools used by phishers, trolled sites buying and selling identities, and even social engineered a few scammers.

    In this interview, they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, discuss how phishers communicate and even how they phish each other.


    What are phishing kits and how are they distributed?

    Dhanjani: A phishing kit is the most important tool in a phisher's arsenal. Think of a popular company that executes financial transactions on the web. All the source code and static content such as images and logos needed to setup a phishing site for the company you just thought of is most likely to be present in a phishing kit. Let us suppose you get hold of such a kit and you want to deploy a phishing site. All you would have to do is the following: 1) Unzip the kit 2) Pick the directory corresponding the company you want to target 3) Edit a single file in the directory to input the email address you want the results emailed to 4) Deploy the directory onto a compromised host on the internet, and voila! - you have yourself a phishing site. If you take a look at the client side code (HTML and JavaScript) presented to your browser on a phishing site that targets a particular company, you will notice that other phishing sites that target the same company have similar characteristics. This is because, more often than not, the sites are deployed using popular phishing kits. The code within the kits is quite simple, mostly consisting of a web form that does the dirty work, along with image files and static content. The kits are often distributed amongst the phisher communities on message boards, and at times sold or traded for money or identities.

    Rios: Phishing kits are the tip of the iceberg, they are the piece of the phishing eco system that everyone sees and knows about. The typical phishing kit consists of the HTML that makes up the forged site that the user sees and the backend logic that used to steal the victims information. Most phishing kits are probably created by a small number of individuals and typically sold on phishing forums. Although the various kits have different front ends and HTML content, the back end logic is surprisingly similar for most of the kits we've seen. These kits are used over and over again and most of the phishing sites you've seen are probably a variant of small set of phishing kits. Many think that phishing sites are all custom jobs that a particular phisher has developed and deployed. The reality is pre-made, ready-to-deploy, turnkey sites are already created for practically every major organization that you can think of. All a phisher has to do is purchase the latest kit and deploy, no technical expertise or coding skills are really required. All the phisher typically has to do is place their email address into one line of code and they have a ready to deploy phishing site.


    Many have become victims of phishing and we see the attackers using new methods all the time. In your opinion, what is their skill level? Who are we dealing with?

    Dhanjani: This is an important question, and I'm glad you asked it. When we think of phishers, we often guess that they are a group of highly skilled ninja hackers. They have collectively caused billions of dollars in losses, and ruined the lives of many citizens whose identities they have stolen and abused. These people have got to be pretty smart, right? Wrong. Just think about what a typical phisher is really doing: installing
  • Not Underground (Score:4, Insightful)

    by mandelbr0t ( 1015855 ) on Monday January 28, 2008 @12:44AM (#22204918) Journal

    The implication in the title is that these "security experts" actually got in with one of the rings. As a matter of fact, they simply downloaded a phishing kit and signed up for a forum. They didn't talk to anyone who wrote one (not that much skill is required in that). They didn't gain access to any dark-nets. They didn't gain access to secure IRC channels. In short, they're just a couple of guys. Their agenda seems clear to me: push the IE anti-phishing UI. They make reference to it (though not by name) twice in TFA:

    ...the(sic) are abusing a few fundamental flaws such as lack of awareness, lack of standards around browser UI that clearly highlights high assurance websites...

    Instead we need to come up with browser UI standards that allow the users to clearly and easily distinguish high assurance domains and websites.

    They also talk about the need for a system that works without static identifiers like credit card and social security numbers, though they don't postulate any such system. They claim that writing secure code is secondary to this as-yet unknown system that doesn't use personally identifiable information to identify you. My thoughts: until we figure out how to identify you without using identifiers, maybe we should concentrate on the secure code angle for a while.

    • Re: (Score:2, Insightful)

      by tdwebste ( 747947 )

      Static security. Your pin number, id, password, bank bar code, address, birthday, employer, maiden name, SSN, drivers license number. Anything static does not get changed often enough, and people "courts" stupidly trust them as unique ID's. Which is why it is so hard for individuals to clean up after id theft.

      Non static,
      - key sequence generators which use your initial pin to generate a new pin every few hours/mins/seconds
      - challenge protocols, which ask an question and require an appropriate answer
      - broadca
      • key sequence generators which use your initial pin to generate a new pin every few hours/mins/seconds

        So if you learn the original PIN, you can calculate the current PIN at any later point in time. Besides, how do you actually use this to identify anyone, short of telling the other party your original PIN ?

        challenge protocols, which ask an question and require an appropriate answer

        How does the other party know that the answer is correct ? Or are you talking about public-key cryptographic authenticat

  • Of course they infiltrated their underground. All it took was their credit card number and SS#.
  • Just to make it interesting. Go to a known phishing site, enter in a fake ID and SSN, and follow it down the pipes.
    • Some fake sites are smart enough to do a man in the middle attack. If your login to the real site fails, the error is bounced. I have seen this on several sites I have tried to poison.

      I haven't tried entering real info, so I don't know if the site simply bounces everything, or if it really logs into the real site to verify username/password.
  • These idiots just set up a site and wrote a story about it. I've done more than this on a single weekend collecting data for LE Agencies or trainings I provide to Judges/Lawyers and Gov't IT Workers. Hell, I've set up a Linux VMware server that hosts all the current phishing sites on a single instance.

    The genius here [thebadboys.org], going by the name "Brain", provides first class phishing sites with a catch - he has encrypted his email address and integrated it into the pages he's written. When Script Kiddies like the one
    • And then the use of the phrase "the Underground" is itself a joke. This implies that they try to hide their activities. What a joke! They operate out in the open, swapping and sharing information, harvesting data. The use of that term "The Underground" is like calling the Open Source Software movement a "covert operation". This is the open source software of the criminal underworld - with a twist... everyone steals the other guys code and takes full credit for writing all of it. Incremental improvements.

      Y
  • I was just reading an interview in either Inc. or Fast Company with the head of the research division inside one of the big anti-virus vendors. He said that most encryption and security issues have been solved. The real threat now is humans, meaning weaknesses in how we interact with others, i.e., trust, building a rapport, lies, etc. Humans are the weakest link and no amount of technology will help. It'll always be possible to hack a system if you think your little old Grandma is on the other end is asking
    • Re: (Score:3, Interesting)

      by Opportunist ( 166417 )
      Yup. The weakest link in computer security is the user. Now, while in companies you might have some administrator who might or might not be actually security conscious and lock down user PCs (as far as he can, due to company policy and program requirements), the average machine in a user's home is horribly insecure. Not because of remote exploits or inherently bad security, but because users are gullible and can easily be tricked into clicking pretty much everything.

      Now, I know a lot of people will claim th
  • We pay the FBI a lot of money to infiltrate and bring to justice these organized criminal networks. But the FBI isn't bothering.

    Of course, the banks are supposed to defend their trademarks from anyone, including phishers, who uses them to pretend to be the bank. But they're not bothering.
    • The FBI is more interested in tracking down terrorists nowadays. Running down all those false leads from the illegal wiretaps really eats up man power. Aside from that, phishing often crosses national boundaries. Now you have to get cooperation from other governments. Then you have to find, arrest, most likely extradite, then convict them. Not an easy task. The FBI's resources, though vast, are still finite. Phishing doesn't rank very high.

      As for banks, they are interested in money only. If it costs more to
  • What? (Score:2, Funny)

    by NeoHunyadi ( 1228230 )

    So the phishers are trying to phish the phishers who are phishing for... what? (That's some quality writing, right there.)

    Seriously, the article seems like something you'd see featured on the evening news as a scare tactic.

    Reporter: Is your identity safe? It could be at risk and you don't even know it. Top researchers say there are hacker communities out there that will likely only continue to grow! Are you stupid enough to stay tuned until the end of our worthless program and find out?

    Wait... Is t

  • by bbyakk ( 815167 ) on Monday January 28, 2008 @02:00AM (#22205226)
    Make the browser highlight the domain part of the url in bold. Even if this helps just a few users recognize the scam easier it's worth it. Besides, it will somewhat improve usability for regular use as well. I often scan the URL line for to get an idea of what a tab displays, and this will save a few milliseconds of my brain time each time I do it.
    • by rs232 ( 849320 )
      "Make the browser highlight the domain part of the url in bold"

      Anything that relies on the end user doing or not doing something is bound to fail. You're dealing with idiots that can't prevent themselves in clicking on anything. For instance click here to see Britney Spears nude.

      As a test send an email with the subject: clicking on this attachment will steal your bank details and render your computer unusable :- guess how many of the idiots will still open it.
      • Re: (Score:1, Funny)

        by Anonymous Coward
        For instance click here to see Britney Spears nude.

        Can you repost that? Your link didn't work.
      • by bbyakk ( 815167 )
        This kind of arrogant attitude is not a solution. It's the easiest thing in the world to blame everything on stupid users who just won't learn. My experience tells me that when you really make an effort to explain something to people, they do listen and do understand. You just need to think out of your box. The URL line is a perfect example. We techies have many years of parsing URLs and take it for granted that it should be obvious to everyone where the domain name is. But it is not. We have to realize tha
    • Make the browser highlight the domain part of the url in bold.
      That's what LocationBar2 does. [mozilla.org] For Firefox.
  • by timmarhy ( 659436 ) on Monday January 28, 2008 @02:12AM (#22205266)
    One time credit card numbers.

    net banking that requires sms verification of transfers.

    public, televised floggings for anyone convicted of fraud or petty theft.

    only the banks can make these happen (including option 3 as well i might add, polical lobbying ftw). hell i know i'd tune into watch some scammers take a beating.

    • My bank already does this. Except instead of one time numbers I have credit card number which I can load with enough money to just buy something and then unload it so no one can take money from it without my consent. Sms verification is very convenient, it's like tokens, but you don't have to remember where you have put your token keyring last time.
    • Re: (Score:3, Insightful)

      "public, televised floggings for anyone convicted of fraud or petty theft."

      Sure, allow the rich fuckers to get away with it, white collar criminals, corporate executives etc.

      But as soon as a poor kid steals a chocolate bar, public floggings!

      Because, remember, we live in a society where there is only one law, but it is written to punish, not the rich, but only the poor. Any law isn't going to punish anyone who steals millions of dollars, only those who steal hundreds or less.
    • by Obsi ( 912791 )
      Problem with SMS verification:
      Not everyone has cellphones.
  • Spies sappin' mah underground!
  • by commodoresloat ( 172735 ) * on Monday January 28, 2008 @04:08AM (#22205782)
    I infiltrated a phish show once; other than a lot of hippies smoking dope and some weird meandering drone-rock, I'm not sure what the big deal was.
  • So if these phishers are using low-tech stuff like Formmail, then you should just autofill their forms with randomly generated bogus personal information for hours on end. It would make it very hard to sort the legitimate data from the trash. Assuming of course that their sites don't store IP information in the email messages.

    Only thing to worry about would be getting DDOS'ed by a less clueless phisher.
  • ...even though I want to. I read the first page, then saw that it is six full pages, with no Print function. Six pages with about 1:4 content:advertising space. No thanks. I hate C|Net for pioneering the ideas of a paragraph a page, and I won't read Phoronix for the same reason. They will get my ad impressions (and I always click interesting ads on interesting content, to help the webmasters who write the content) when they stop forcing it upon me. It's crap like this that leads to Adblock.
  • If you feed in enough bogus usernames and passwords, it becomes much harder for the phishers to tell the real ones from the fakes. If the phishers check by IP to prevent this, do it from many different machines with many different IP addresses.
  • "What started as a simple examination of phishing sites, turned into an extraordinary view of the ecosystem that supports the phishing effort [net-security.org] that plagues modern day financial institutions and their customers"

    The real story is who built such an 'ecosystem' that makes phishing such a sucessfull enterprise and what imdemnification does the maker of such systems offer the end user."

    "They have collectively caused billions of dollars in losses, and ruined the lives of many citizens whose identities they ha
  • I can see a phisher buying a kit that looks like an ebay or paypal or bank site login page. I can see them buying access to some elementary school's compromised web server and copying their stuff into a directory on it. But how do they make //compromisedneighborhoodschoolserver.org/somefolder/someother/myebaykit/ look like a plausible URL? Don't they have to register something somewhere, leaving a trail behind that could be used to find them? Or do they not bother and assume the victims won't look at the UR
  • Let us all report phishing. In Gmail you can report the phishing method. Instead of reporting as SPAM, we should mark as phsihing. In this way phishing can be stopped. The tech people are the key to stopping spam (besides education).

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...