Monday, February 21, 2011

Making Money Scams









Social Networks



According to Cisco, criminals are targeting social network users more aggressively. In particular, criminals are spending more time and effort trying to steal users' social networking credentials, since that makes it possible to exploit the trust of all that users' friends.



Although the exploitation of trust is crucial, Cisco predicts a decline in simple phishing and social networking scams. The company expects instead a rise exploits similar to the Zeus trojan, which steals banking credentials and propagates on social networks, mobile devices and more.





Social Engineering



Cisco warns of the "seven deadly weaknesses" exploited by social engineers:




  • Sex Appeal

  • Greed

  • Vanity

  • Trust

  • Sloth

  • Compassion

  • Urgency





Even the most savvy users can fall prey to social engineering. For example, Thomas Ryan of Provide Security created fake identity called "Robin Sage." Ryan was able to get hundreds of government officials and security professionals to friend this imaginary person on social networking sites and, as a result, share personal information with Ryan.



According to the report:



Clickthrough rates for most malware or spam incidents consistently hover at around 3 percent, according to data from Cisco ScanSafe. While 3 percent may not seem high, imagine the impact of repeated waves of spam to which 3 percent of workers consistently respond to and click on. Even this small percentage is the equivalent of having a gaping hole in the network firewall that cannot be closed. Instead of trying to change human behavior, security researchers are exploring the possibility of changing the way we use software to reduce risks.


Java: The New Number One Target





Java and PDF are both frequently exploited, but according to Cisco Java exploits rose last year and PDF exploits fell. Java surpassed PDF as the most commonly exploited technology.



Cybercrime in the Post-PC Era



According to the report, Windows has been so prevalent and so easy to exploit that there was no need for criminals to try to exploit other systems. However, the proliferation of other devices and OSes along with improved security in Windows 7 has changed that.



However, this move is happening slowly. A report from Forrester on security in the post-PC era notes that mobile device OSes are inherently more secure than desktop OSes due to sandboxing. This means that even jailbroken iPhones and rooted Android phones will be harder to compromise than older Windows PCs. However, social engineers can prey on anyone, regardless of the device they are using.



The Cloud: Friend or Foe?



The report cites the cloud as having both benefits and drawbacks for security. The drawback is that data can be intercepted while traveling between a server and the devices that access it. The advantage is that having data stored off-device makes it hard to extract sensitive information from lost or stolen devices.



Money Mules



The report has an interesting section on "money mules." Once a criminal has stolen a victim's bank account information, they need a way to get the money into their own accounts without getting caught. Money mules are people who transfer money from a victim's bank account to a criminal. One way to do this is to transfer money into the mule's account, then have the mule wire it via Western Union to the criminals overseas. The recipient of the wire from Western Union might not have to provide bank account information to receive the money, making them more difficult to trace.



Some mules are low-level criminals who participate for the money. Others are duped by work at home job ads. Students and people with large debts are often targets.

However, there's a shortage of mules. "Currently, the ratio of stolen account credentials to available mule capacity could be as high as 10,000 to 1," says the report.



Winners of the Cybercrime Showcase



Cisco highlights two winners in this year's "Cybercrime Showcase" - a "good" winner and an "evil" winner.



The Good winner is Thorsten Holz of the security firm LastLine. Holz identified the top 30 servers that the botnet Pushdo/Cutwail used for sending spam. Holz got ISPs to shutdown those servers and, as a result, the rate of spam decreased from 350 billion messages per day to 300 billion per day.



The Evil winner is Stuxnet, which we've covered frequently.



What, No Malvertising?



Surprisingly, there is no discussion of malvertising in the report. You can read our post "What You Need to Know About Malvertising" for more about this threat.












How low is a Facebook scammer prepared to go? Here's a pretty sick rogue application that we've seen affecting some users of the world's most popular social network, leading to the all too familiar money-making survey scam at the end.



OMG she is so busted!! Dad catches Daughter on Webcam!


Hmm. It would be nice to think that no-one would be interested in clicking on a link like that. But human nature being what it is, some folks (guys in particular I would guess) might be tempted to find out more and find they aren't able to show some restraint.


So, what does happen if you click on the link?


First thing you'll see is this splash screen (I've used some pixelation to protect the innocent):



If you are still tempted to click further, you'll be asked by a rogue Facebook application to grant permission for it to be able to post to your wall.



By the way, it's not just your personal Facebook page that the app will be able to post updates to - it will also be able to publish to any pages you might be responsible for, which could prove highly damage if you administer a Facebook page for your firm.


So, after all this, do you get to see the video?



Nope. Instead, you'll be greeted by a survey. And this survey makes money for the scammers behind the scheme as they earn commission for every survey completed.


Worse still, your Facebook account has already been abused by the rogue application which has posted a message about the dad catching his daughter stripping on a webcam for all of your Facebook friends to see.




Wow she got caught so dirty.


Busted!! Dad Catches Daughter on Webcam!

Do not watch unless 18+

Content is graphic. Watch at your own risk!


In this way the scam spreads virally, attempting to earn as much money as possible for the survey scammers.


I know there will be people out there who feel that anyone who clicks on links like this deserve everything they get, but that doesn't mean the rest of us should be bombarded by spammy messages on Facebook just because some of our online friends have turned out to be a littel bit seedy.


We've seen cybercriminals use grubby themes like this to spread their attacks, and no doubt we'll see them again. Human nature isn't going to change and people will carry on clicking on them unless they're educated about the threats. Of course, it wouldn't do any harm if Facebook could work a little harder at preventing scams like this occurring in the first place.


If you have been hit by scams like this on Facebook, and are struggling to clean-up your profile, here's a YouTube video I made which describes what steps you need to take:



(Enjoy this video? You can check out more on the SophosLabs YouTube channel and subscribe if you like)


Make sure that you keep informed about the latest scams spreading fast across Facebook and other internet attacks. Join the Sophos page on Facebook, where over 60,000 people regularly share information on threats and discuss the latest security news.

Most popular web hosts 2011 | Free <b>News</b> Webdirectory

We offer the best sources and web hosting news for you to be informed with the latest and the most popular web hosts 2011 on internet, web hosting promotions, mergers, new web hosting sites, and much, much, more!

Minecraft hitting iPhone, iPad iPhone <b>News</b> - Page 1 | Eurogamer.net

Read our iPhone news of Minecraft hitting iPhone, iPad.

autosport.com - F1 <b>News</b>: Bahrain withdraws opening race

Bahrain Grand Prix organisers have announced that the event will not host the opening round of the 2011 Formula 1 season, after days of uncertainty following unrest in the country.


free rental agreement forms

1stcashgift by j91romero

















No comments:

Post a Comment