[Paleopsych] CSM: New twist on 'phishing' scam - 'pharming'

Premise Checker checker at panix.com
Sat Jul 30 15:25:45 UTC 2005


New twist on 'phishing' scam - 'pharming'
http://www.csmonitor.com/2005/0505/p13s01-stin.htm
[Thanks to Laird for this.]
                       from the May 05, 2005 edition -

    By [2]Gregory M. Lamb | Staff writer of The Christian Science Monitor

       "The pharmers are coming! The pharmers are coming!" Hang warning
       lanterns all over the Internet: It's under attack by a new scam.

    For two years users have been hearing about "phishing," the sending of
     bogus e-mails - allegedly from a bank or other online business - by
    criminals who hope to hook the unwary. Those who bite by clicking on a
            hyperlink in the e-mail are shipped off to a phony but
    authentic-looking website and asked to enter sensitive information. If
      they type in their passwords or account numbers, thieves have that
                                    data.

     Now phishers have been joined by "pharmers," who have made the ruse
      more sophisticated by planting a seed of malicious software in the
    user's own computer - or poisoning servers that direct traffic on the
      Internet. The result: Even if you type in the correct address of a
              website, the software can send you to a bogus one.

     "It's a rapidly growing threat, and one we've been seeing a lot more
     discussion about" among Internet security experts and people in the
       banking industry, says Lance Cottrell, founder and president of
     Anonymizer Inc. in San Diego, an Internet privacy and security firm.
    Phishing attacks "rely on some gullibility of and participation by the
    victims," Mr. Cottrell says, since they must be persuaded to click on
       a link within the e-mail. But not clicking on such links "is no
                    protection against a pharming attack."

    Here's how the scam works. The thieves rely on the fact that the word
     address you use, such as www.my-bank.com, is connected to a distinct
    numerical address. Just like a phone number, it routes your browser to
    the right website. Pharming replaces the number with a fraudulent one,
           sending you to a criminal site instead of the real one.

     Besides keeping antivirus and antispyware programming up to date on
        their PC, users have few other ways to defend themselves from
                                  pharming.

     But any website that is conducting financial transactions should be
    able to maintain a secure website, Internet security experts say. The
    corner of the browser should display a padlock symbol, and the address
       in the address bar should begin with "https," not simply "http."
                            Are you being scammed?

    To determine if you're at the real site, click on the lock symbol and
      make sure it displays the address you are expecting to be at, says
       Mikko Hyppönen, chief research officer of F-Secure, an Internet
                    security company in Helsinki, Finland.

      But another kind of pharming, sometimes called "domain spoofing,"
      "domain poisoning," or "cache poisoning," attacks the servers that
    route traffic around the Internet. These so-called domain name system
     (DNS) servers also link the word address to its underlying numerical
                                   address.

      To corrupt a DNS "takes significantly more expertise, more access"
       than attacking PCs, says Peter Cassidy, secretary-general of the
     Anti-Phishing Working Group, which has offices in Cambridge, Mass.,
     and Menlo Park, Calif. That's why thieves first will try to get into
                            individual computers.

     "They're the low-hanging fruit," he says. But "they'll try anything
    that works." Some servers are hard to crack, he says, but others don't
                       keep their defenses up-to-date.

    Unlike the traditional landline telephone system, which was built from
    the outset to be a commercial enterprise, the Internet was designed to
    make sharing of information between scholars and researchers fast and
                 easy, not for secure financial transactions.

    "It was built in a laboratory by guys who knew each other and married
     each other's sisters," Mr. Cassidy says. Now new layers of security
        continually must be added, as criminals probe for weak points.
                               Spreading fraud

        The Anti-Phishing Working Group reports that the number of new
    phishing messages rose by an average 38 percent per month in the last
                             six months of 2004.

      And pharming was one of the top five Internet scams in March 2005,
      says a recent report from the National Cyber-Forensics & Training
        Alliance, a nonprofit arm of the Direct Marketing Association.
    Internet fraud in general, which includes phishing and pharming, cost
       merchants $2.6 billion in 2004, $700 million more than in 2003,
      according to CyberSource Corp., which processes Internet financial
                                transactions.

     While Cassidy has seen some disturbing pharming attack reports from
     Britain, "we haven't seen it taking over the universe," he says. "We
      have seen significant attacks, but not rapid proliferation, partly
                because it does take a little more expertise."

      One pharming technique is to flood the DNS server with messages to
    trick it into saving false information that will send users to a phony
      website, Cottrell says. "Then in many cases [the criminals] try to
     bounce you back to the real bank's website, so that you're not aware
                         that anything has happened."

     Phishers and pharmers set up their fake websites for only a few days
       or even a few hours, then move on before they can be found out.

    Cottrell's company, Anonymizer, runs all its clients' Internet traffic
    through its own secure DNS servers, which he says can protect clients
                                from pharming.
                               Keyboard trouble

     But even if crooks can't get at your PC or the DNS server, they can
                    always hope that you just can't spell.

    Early last week, F-Secure discovered that a malicious website had been
      set up at www.googkle.com, just one keystroke away from the famous
    [3]www.google.com site. Users who accidentally went to the site using
    the popular Internet Explorer browser immediately were inundated with
     spyware, adware, and other malicious software that tried to secretly
                         load itself onto their PCs.

     By the end of last week, the site had disappeared. But Mr. Hyppönen
      still warns people not to try to visit it out of curiosity. "These
                   things sometimes pop up again," he says.

    The technique isn't new. Similar attack sites have been created just a
       slip of the finger away from sites such as CNN.com, AOL.com, and
                           MSN.com, Hyppönen says.

    The people behind the malicious sites can be anywhere from South Korea
     to Brazil to Russia. The PC operating the site could be "somebody's
     grandmother's computer in Canada" being remotely controlled without
                           her knowledge, he adds.
                               Gone 'phishing'

     "Phishing" means sending out official-looking e-mails to tempt users
    to visit a bogus website and type in personal or financial data. Here
                     are key points from a March report:

     o Since July 2004, the number of websites linked to the scam rose an
                         average 28 percent a month.

     o The United States hosted a third of the phishing sites - more than
     any other nation - followed by China (12 percent) and South Korea (9
                                  percent).

        o Financial services are the most frequent target, with 4 of 5
      phishers appropriating the brand of a bank or some other financial
                                 institution.

    o Such sites only last an average 5.8 days before they're taken down.

     o A new version of the scam - "pharming" - plants malicious software
                    on PCs to direct users to bogus sites.

                     Source: Anti-Phishing Working Group


More information about the paleopsych mailing list