Phishing techniques and technology revealed

Posted by   Virus Bulletin on   May 11, 2007

Serious software used to analyse phished data, and a phisher talks.

Some insights into the workings of phishing scams were revealed this week, as a sophisticated tool designed to process data gathered by LdPinch trojans was discovered and analysed, and a security watcher probed the mind of a young phisher in an online conversation, published on his blog.

The LdPinch trojan gathers large amounts of information from infected systems, the exact type of data reaped depending on the variant. Researchers at F-Secure followed the trail of information issuing from an infected machine to its drop site, where it is stored in encrypted files which include details of the date of capture and the originating system. A highly professional graphical tool is then used to sort and parse the data for use in fraud and identity theft.

F-Secure released information on the tool, discovered in collaboration with Sunbelt Software and thought to have been developed by Russians, on its malware blog here. Screenshots of the tool in use are included.

Panda Labs also have some interesting analysis, and screenshots, of a front-end GUI tool, in this case for managing and controlling spam-sending botnets; a blog entry on their discoveries is here.

Elsewhere, security company head and Dark Reading blogger Robert Hansen managed to get in touch with a serial phisher, and found some fascinating background on how phishers operate. The 18-year-old he contacted, who goes by the pseudonym 'lithium' and has been phishing since the age of 14, focuses on social-networking sites, uses bespoke software made by freelance developers, gathers around 30,000 gullible victims per day to his spoofed domains, and claims to make $3,00-$4,000 in a single day's phishing - which he only indulges in 3-4 days per week.

A detailed overview of the information discovered can be found at Dark Reading, here, and the full conversation is here.

Posted on 11 May 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2017: What is happening in the threat landscape and what are we doing against it? Submit a proposal in the VB2017 CFP!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Then submit an abstract in the CFP for VB2017!

VB2016 paper: APT reports and OPSEC evolution, or: these are not the APT reports you are looking for

APT reports are great for gaining an understanding of how advanced attack groups operate - however, they can also provide free QA for the threat actors. Today, we publish a VB2016 paper by Gadi Evron (Cymmetria) and Inbar Raz (Perimeter X), who…

Security for your ears: recommended infosec podcasts

Industry veteran Mikko Hyppönen recently urged would-be security researchers to ditch their favourite pop music and listen to security podcasts on their commute to work instead. Virus Bulletin Editor Martijn Grooten shares his favourite security…

VB2016 video: Getting duped: piggybacking on webcam streams for surreptitious recordings

In a presentation at VB2016, Patrick Wardle, Director of Research at Synack, discussed the possibilities of Mac malware recording the user via the webcam. Today, we publish the video of Patrick's presentation.

We shouldn't forget those most vulnerable in our digital world

Virus Bulletin Editor Martijn Grooten calls for the security community not to forget those most vulnerable in the digital world, including political activists living under oppressive regimes, and victims of abuse.