In 2004 it was the first (and, for a long time, they were the only) gang to employ bot-nets in its phishing infrastructure in order to make the attacks live longer and be more scalable. It also pioneered new techniques in its spam mails so the mail could more easily evade spam filters. Within the past few weeks there has been a new advance — the inclusion of identity theft malware (or Crimeware) into the Rock group’s phishing attacks.
In the ever-evolving IT realm, managed services act as unsung heroes, harmonizing tech behind the scenes. Blending AI, ML, and Data Engineering, they navigate the convergence of internationalization and cutting-edge tech—quantum computing, edge computing, multiple clouds, and IoT. Data engineering crafts seamless information pathways, while AI and analytics add intelligence, automating tasks and predicting issues. From Silicon Valley to Bangalore, the backstage crew leverages AI-driven insights
Tuesday, April 22, 2008
Phishing Attacks Through Bot Nets to Steal Millions of Dollars Online
Rock Phish attacks account for 50 percent of phishing incidents and have stolen “tens of millions of dollars” from bank accounts. This is the first time crimeware has been used in a Rock Phish attack. The victims of these phishing attacks get their personal data stolen and are infected by the Zeus Trojan, which is even worst for victims.
In 2004 it was the first (and, for a long time, they were the only) gang to employ bot-nets in its phishing infrastructure in order to make the attacks live longer and be more scalable. It also pioneered new techniques in its spam mails so the mail could more easily evade spam filters. Within the past few weeks there has been a new advance — the inclusion of identity theft malware (or Crimeware) into the Rock group’s phishing attacks.
Botnets have become a significant part of the Internet, albeit increasingly hidden. Due to most conventional IRC networks taking measures and blocking access to previously-hosted botnets, controllers must now find their own servers. Often, a botnet will include a variety of connections, ranging from dial-up, ADSL and cable, and a variety of network types, including educational, corporate, government and even military networks. Sometimes, a controller will hide an IRC server installation on an educational or corporate site, where high-speed connections can support a large number of other bots. Exploitation of this method of using a bot to host other bots has proliferated only recently, as most script kiddies do not have the knowledge to take advantage of it.
Labels:
ADSL,
Dial Up,
IRC bots,
Roch Phish,
script kiddies,
Zeus
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment