Phishing arrests highlight massive problem.The massive phishing scam broken up by federal authorities this week is only a hint at what many say is an insidious and growing problem on the Internet.<p>Federal authorities indicted INDICTED, practice. When a man is accused by a bill of indictment preferred by a grand jury, he is said to be indicted. 53 people in the U.S on various charges related to a phishing scheme that victimized thousands of customers of two major U.S. banks. Authorities in Egypt arrested another 47 people there on the same charges.<p>The bust, dubbed "Operation Phish Phry," was described by the FBI as the largest ever cyber-crime investigation and they held it up as a shining example of international cooperation in the realm of cybersecurity.<p>But as important and impressive as it was, the arrests barely scratch the surface of the phishing problem, according to according to
1. As stated or indicated by; on the authority of: according to historians.
2. In keeping with: according to instructions.
3. several who have been tracking the issue for years.<p>"It certainly is important," said Dave Jevans, chairman of the Anti-Phishing Working Group The AntiPhishing Working Group (APWG) is a consortium that brings together businesses affected by phishing attacks, businesses that provide security products and law enforcement.
The APWG has more than 2700+ members from more than 1600 companies & agencies worldwide. (APWG APWG Anti-Phishing Working Group
APWG Action Plan Work Group
APWG Acquisition Policy Working Group
APWG Advocates for Prostituted Women and Girls
APWG AFSCN Prioritization Working Group
APWG AFSCN Priorities Working Group ), whose members include Walmart, Microsoft, Yahoo, eBay and dozens of others. "Getting 100 people indicted all at one time is definitely a real success for law enforcement. It sends a message to criminals that they are not immune and that they can be tracked down and jailed, even if they are not in the U.S."<p>But the arrests are not going to "materially impact" the problem, Jevans said. After a small dip last year, phishing activity has picked up again and is rapidly climbing back to record levels in terms of unique phishing sites and targets. <p>In June, the number of unique phishing Websites detected by the APWG stood at 49,084 -- the highest level since a record 55,643 phishing Web sites were spied spied
Past tense and past participle of spy. in April 2007. "The problem continues to grow and get worse," said Jevans, who estimates that as many as four billion phishing e-mails are sent across the Internet daily. <p>Ominously, it is not just consumers that falli victim; corporations and government organizations are often the subject of highly targeted "spear phishing See phishing. " campaigns designed to shake loose financial and other sensitive information.<p>Phishing is a form of social engineering in which attackers send e-mails made to look like legitimate correspondence from reputable institutions and even trusted individuals from within an organization. Victims are directed to Web sites that look authentic, but are actually fakes. Once there, they are asked to enter information that can later be used to break into accounts or to commit identity theft. <p>In the case of the phishing ring broken up this week, for instance, attackers systematically transferred thousands of dollars from accounts they gained access to with legitimate usernames and passwords.<p>What makes phishing so hard to deal with is that attacks can be launched from anywhere in the world by people with little to no technical skills. Tracking down the source of an attack can involve communicating with numerous ISPs in different countries, different time zones and using different languages, said Alexander Southwell, a former cyber-crime prosecutor and attorney with Gibson Dunn & Crutcher. Most also operate under different laws and have no obligation to respond to a request for information from U.S. authorities, Southwell said.<p>Many phishers use what are known as fast-flux networks to make tracking them down even harder, Jevans added. A fast-flux network allows an attacker to move a counterfeit Web site to new servers in rapid succession. The rogue sites themselves are torn down, sometimes in a matter of hours, often before they are even noticed. And more than 70% of the time, the servers hosting a phishing Web site have themselves been compromised and belong to legitimate companies, Jevans said. <p>The APWG and others are working with organizations such as ICANN (Internet Corporation for Assigned Names and Numbers, www.icann.org) A non-profit, international association founded in 1998 and incorporated in the U.S. It is the successor to IANA (Internet Assigned Numbers Authority), which manages Internet addresses, domain names and the huge number to see whether processes can be developed that allow domain registrars to quickly remove rogue domain names from the Internet. But that is an effort that could take years to materialize.<p>Chet Wisniewski, senior security advisor at security vendor Sophos, said that while there is a heightened awareness about phishing scams, many people continue to fall victim because of the increasingly sophisticated tactics used.<p>Tools are available that allow attackers to develop remarkably authentic-looking sites that can fool even the most aware users, he said. And many phishing attacks these days don't even use e-mails to trick users into parting with their credentials. Malware programs such as the QHost Trojan horse See Trojan.
hollow horse concealed soldiers, enabling them to enter and capture Troy. [Gk. Myth.: Iliad]
See : Deceit
(application, security) Trojan horse are capable of stealing account names and passwords directly from an online session, and can even redirect the browser to a fake Web site -- all without the user's knowledge or participation, he said.<p>Other techniques to get usernames and passwords involve the use of phone mail, instant messaging Exchanging text messages in real time between two or more people logged into a particular instant messaging (IM) service. Instant messaging is more interactive than e-mail because messages are sent immediately, whereas e-mail messages can be queued up in a mail server for seconds or and even pop-up screens right in the middle of a banking session.<p>Contributing to the problem is the continuing failure by many U.S. banks to implement two-factor authentication The use of two independent mechanisms for authentication; for example, requiring a smart card and a password. The combination is less likely to allow abuse than either component alone. See authentication. for controlling access to customer accounts, Wisniewski said. Stronger authentication (1) Verifying the integrity of a transmitted message. See message integrity, e-mail authentication and MAC.
(2) Verifying the identity of a user logging into a network. measures, such as requiring users to enter a one-time token generated password, in addition to their usernames and password would make it all but impossible for attackers to break in using just a customer's login Signing in and gaining access to a network server, Web server or other computer system. The process (the noun) is a "login" or "logon," while the act of doing it (the verb) is to "log in" or to "log on. credentials, he said.<p>"It can be done from the convenience of anybody's home, from [an] Internet cafe The high-tech equivalent of the coffee house. However, instead of playing chess or having heated political discussions, you browse the Internet and discuss the latest technology. CDs, DVDs, games and other "cyber stuff" are also generally available. from abroad and at all hours," Southwell said. "It can be done to maximum effect by taking advantage of technology to send out millions of e-mails and getting just a few to respond."<p>"...It is easy to do and hard to get caught," he said. <p>Copyright 2009 IDG IDG International Data Group
IDG Integrated Drive Generator
IDG Installation Design Guide
IDG Internet Discussion Group
IDG Inset Dielectric Guide
IDG International Dangerous Goods (mail, shipping) Middle East. All rights reserved.
Provided by Syndigate.info an Albawaba.com company