Home > Articles > How to Beat Online Fraudster

How to Beat Online Fraudster

December 19th, 2005

This year´s holiday period is predicted to generate more online sales than ever before, in the UK Visa predicts a 39% increase in e-commerce this Christmas. However, online consumers will be a very juicy target for cyber criminals using phishing and pharming to steal their identities and cash, so they need to be more careful than ever when they shop online, according to Paul Henry, a security expert from CyberGuard Corporation a global provider of security solutions that protect the critical components of the largest and most complex information networks for Global 2000 enterprises and government organizations worldwide.

Organized criminal gangs are targeting online consumers with ever more sophisticated blended phishing attacks, some of which even find out details of their interests and use them to generate phishing emails tailored to tempt them into giving away their identities. According to the Anti-Phishing Working Group, phishing is on increase again, the number of newly reported phishing campaigns reached 15,820 in October an increase of 127% over last October.

In our day-to-day lives, both at home and at work, we are spending a great deal more of our time on our computers and on the internet. This familiarity with technology can regrettably make people more susceptible, or worse yet – more gullible. Today consumers seem to trust technology more then they do individuals. This level of blind trust in technology, combined perhaps with our less cautious nature around the holidays, can provide a target-rich environment for cyber criminals.

Last holiday season, Phishers were relying on fairly basic socially engineered emails (albeit with very poor grammar and spelling) enticing consumers to “click here” on an embedded link within the email directing the recipient to an illegitimate “copy cat” website that looked identical to the real thing. Many Internet users were unknowingly divulging their most personal financial information: PINs, Credit Card Numbers, Social Security Numbers, Usernames and Passwords to cyber criminals.

As awareness has grown about Phishing within the Internet community, the tactics used by Phishers have evolved since the last holiday season to make it more difficult for the consumer to realize they are being duped.

Automated URL obfuscation tools are more commonly being used now by Phishers in their efforts to deceive would-be victims.

With a freely downloadable tool from the Internet, the Phisher simply enters the URL of the legitimate website and then enters the address of the fake malicious website, with the tool automatically crafting a new “socially engineered” URL that includes the text from the legitimate URL as well as special characters that actually cause the URL to direct the browser to the fake malicious website. To the untrained eye this specially-crafted URL looks like the real thing.

The use of Embedded Java script and Active X applets is becoming more common in Phishing emails. These scripts and applets can automatically place a graphic image of the expected legitimate URL on top of the address bar within the browser to hide the actual address that the browser is really being directed to. Simply put, it has become a necessity to validate the authenticity of any website you are visiting before the submission any personal information.

Articles

Comments are closed.