Trend Micro warns Internet users against spy-phishing, an emerging crimeware technique which capitalises on the increasingly popular trend of blended threats. Spy-phishing, Trend Micro believes, is the next step for phishers and spyware authors who want to steal money and personal information from users.
The emergence of spy-phishing as a significant element in the threat landscape stems, in part, from a shift in the intent of malware writers, as well as a number of technological advances these writers have recently made. Whereas previous generations of malware writers developed their programmes chiefly to show off their expertise and gain bragging rights among their peers, most writers are now more interested in financial gain. Some create spyware programmes to steal credit card numbers, account log-ins, or a variety of other types of personal information. Others develop and/or enhance bot networks, which are then sold or leased to other individuals or groups, as a way of launching their programmes. Still, others phish for personal information either to use for themselves or to sell to others.
"Spy-phishing is really just another section under the category of crimeware, which can be defined as anything that causes financial or intellectual loss," explained Jamz Yaneza, senior threat researcher at Trend Micro.
Spy-phishing's direct antecedents are spyware, phishing, and backdoor Trojans.
Spyware -- software that secretly installs itself on a user’s computer and runs in the background – is designed to log personal information without the user's knowledge. The 5 per cent of spyware that can be considered to be malicious in intent is intended solely to steal passwords, bank account information, credit card numbers, social security numbers, and other forms of sensitive information – then use that information for illegal purposes.
Phishing – in which the identity of a target organisation is stolen in order to steal the identities of unsuspecting customers of the target company – frequently uses professional-looking, HTML-based e-mails that include company logos, font styles, colours, graphics, and other elements to successfully spoof the supposed sender. Most also contain a link to a Web site, which is nearly always an exact replica of the spoofed site, to lure users into parting with their personal information. Backdoor Trojans are malware programmes that perform unexpected or unauthorised actions on the user's computer – and enable unauthorised access by remote systems.
"Spy-phishing is a blended threat," said Yaneza. "It uses phishing techniques to initially present itself to users, then typically engages a host of other techniques and exploits to surreptitiously download and install spyware applications in the background. These applications oftentimes download additional spyware applications to further extend their functionality."
According to data collected by Trend Micro, the amount of Trojan spyware such as that employed in spy-phishing attacks has been steadily increasing. According to the Trend Micro Trojan Spyware Index, the incidence of Trojan spyware has increased by over 250 per cent over the past 16 months. Similarly, according to a report published by the Anti-Phishing Working Group, an average of more than 188 new samples of Trojan spyware have been utilised in spy-phishing attacks each month in the first four months of 2006 – a 234 per cent increase over the same period in 2005.
Spy-phishing offers malicious authors a variety of applications and uses. While consumers and other individual end users are an obvious target, the potential uses for spy-phishing technologies and techniques go far beyond this group. Enterprises and their employees have even more to lose from spy-phishing exploits.
"Businesses of all sizes are potentially at risk, as spy-phishing can also just as easily be utilised for corporate espionage," added Yaneza. "In fact, due to the Trojan components, and the long-term stealth capabilities they employ, the threat to sensitive corporate information is perhaps greater than is the risk to the individual, if only due to the magnitude of the potential for loss."
Beware !!
Monday, March 6
Subscribe to:
Post Comments (Atom)
Labels
...etc)
*Big Bang experiment hacked
100 Excellent Free WordPress Themes
100 Keyboard shortcuts (Windows)
117 Run Commands In Windows Xp
12 Sites To Create Cartoon Characters of Yourself
13 Computer keyboards you’ve never seen before
160+ Mega Web Design Tutorial Roundup
17 Useful iPhone Applications You Should Install
20 best ebooks sites
20 Best Websites To Download Free E-Books
25 (Free) 3D Modeling Applications You Should Not Miss
25 Websites To Have Fun With Your Photos
26 Sites That Pay You to Blog
27 Must-Have Starter Kits For Web Designers
30+ New Useful WordPress Tricks
35+ Essential Web Design Resources on Best Practice
40 Creative and Inspiring Website Backgrounds Techniques
42 Free Online Magazines for Designers
50 Amazing Wildlife
50 Best CSS Web Design Resources for Webmasters
50 Greatest Computer Workstation (PC/Mac) Setups
50 Useful New jQuery Techniques and Tutorials
60 Excellent Free 3D Model Websites
60 Most Beautiful Apple (Mac OS X Leopard) Wallpapers
7 Design Resources for iPhone Developers
75 Top Best Design Resources of 2008
9 Alternative Ways To Access Blocked Sites
99 Facts about Guyz(Very True)...
A-Z of Free Photoshop Plugins and Filters
Activate header in Yahoo/Gmail/Hotmail and find IP information
Adding Items to the Start Button
Administrator Password Hack
Airtel Free Mms
AirTel Free tricks
airtel hack
All Software links
Alone (In a Crowded Room
Animal Wallpapers
Automatic Administrator Login
Automatically Kill Programs At Shutdown
AVI
Best Color Tools For Web Designers
Best Way To Lock Your Folder Without Any Programs
BIO DATA OF A MODERN GIRL
Break into email accounts
Bypass windows validation
C-C++ projects with source codes
Call anyone from any persons number free......
CDMA Phones Secret Codes
Cellphone hacks
chat with command prompt
Cheat codes for default games in windows xp-2
Check Your Mobile -Software / IMEI / SimLock Unlock code
Clear BIOS password
Convert web site 2 wap site
Cool Futuristic/Concept Gadgets That Really Inspire
Crack CD protection
Create a new fake virus to spoof Antivirus
Create a Shortcut to Lock Your Computer
Create Multiple Websites Under 1 Shared-Hosting Account
d:
Disable USB Drives
Disabling Drives in My Computer
Disabling My Computer
Display legal notice on startup
DivX
DOTNET SITES
download any video YOUTUBE GOOGLE VIDEOS PAKREEL METACA
download youtube videos to ur computer
Downloads and online resources for computer stuff
Drop-Down Menu: 30+ Useful Scripts to Enhance Header Navigation
Dwnld FREE NOKIA INTERNET RADIO:
e:
Ebooks
Edit ur PC Window setting
electronics
Fake hacking-spam
Free gprs settings for any operator network
free SMS
Free sms sites
FTP: Free Clients and Alternative Connection Methods
Giveaway: Free Hosting Accounts
Google Hacking Database (GHDB)
Google Offices (Googleplex) Around The World [Photos]
GPRS
GSM Secret Codes
Hack [Sify
hack using NetBIOS ( hacking someones remote computer)
Hack yahoo through tro messenger
Hacker tools
Hacking computers through telnet
Hacking in schools and colleges
Hacking internet Cafe
Hacking Websites
Hacks
High Flier
Home
How To Access Blocked Web Sites
How To Become A Hacker
How to change ur IP on networks
How to convert Tivo
How to get ip address of person u r chatting with on msn messenger
How to hack through winamp
How to Hide the drives(c:
How to Lock a Folder Using Notepad
How to make keygens
How To Shut Down All Pc(s) On the Network
How to Solve Access Denied Deleting Files Folders
HTML Table Building: 30+ Beautiful Examples and Useful Javascripts
Important SITES list
Increasing options in add/remove programs
Ip address explanation continued
ip locator .......find the location of a ip
jokes
Learn How To Hack | Tutorials On How To Hack | How To Hack
LEARN SIMPLE VIRUS PROgRAM USING ...NOTEPAD....
Macro Photography: 50+ Remarkable Bits of Life We Overlook
make a fake page of ur own for any website
McAfee Total Protection
Menu Delays
MMS
Mobile tricks
More in email hacking
Motorola Secret Codes
MPEG
MPEG4
No Shutdown
Nokia secret codes
Notepad time and date trick
Opening a DOS Window to either the Drive or Directory in Explorer
Other smart ways to Bypass the Windows genuine advantage Validation
Others] Speed Upto 10 MBPS [Beam Cable Hack]
Predictions of our world
Protect urself.know what hackers do
PSP etc
RADIO ONLINE
RealMedia videos and many more to iPod
Recycle Bin Edits
Reliance
RESUMES
Samsung Secret Codes
School/cllg server hacking......hack ur school server
search engines and mails
SEARCH files in RAPIDSHARE.com
SECURITY
Send SMS to anyone from any persons number
Shutdown someones comp over msn and all
SITES
Sites for free sms (PC to Mobile)
SOME USEFULL IP TRICKS N TIPS
Sony Ericsson Secret Codes
Speed up Mozilla Firefox about 3-30x Faster
speed-up-menu-display.html'
Speeding Up Share Viewing
Spy phishing
Start Your Computer in a Second
technology
TEMPLATES
Tips and Techniques
To make folder delete protected
Top Paying CPM Advertisement Network
tricks mobile
Tutorial: How to hack a site
tutorials
Ultimate Guide To Web Optimization (Tips Best Practices)
Use any USB stick As Ram Advanced search
USEFULL LINKS
Vedic Maths
Vehicles - sQuba (World's First Swimming Car)
Very official love letter
Virus
Virus made in c++
Want 2Trace Location of Enemies Mobile no.?
WANT FREE USERNAME AND PASSWORD OF ANY SITE?????
want to see your system hardware information
Watch Any Movie In Paint (100%) Working
Watch FREE Live Internet TV ***
What is neuclear deal????
When I'm with you
Windows keyboard shortcuts you never knew existed very helpful
Windows Media Player Tricks
WMV
Xvid
Yahoo messenger hack
Yahoo webcam hacking (1000% working)
You Are My Everything
Your Mobile Doesnt Support all Indian Lanuages
No comments:
Post a Comment