• Welcome to the LegalBeagles Consumer and Legal Forum.
    Please Register to get the most out of the forum. Registration is free and only needs a username and email address.
    REGISTER
    Please do not post your full name, reference numbers or any identifiable details on the forum.

‘Tis the Season to Stay Secure

Collapse
Loading...
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • ‘Tis the Season to Stay Secure

    Cyber criminals use different social engineering techniques to lure victims into performing activities that n they otherwise would not normally do, like clicking links in spammed messages, downloading files, or filling out forms with confidential personal information.

    These usually translate to profit for the cyber criminals, who are expected to attempt to exploit the holiday season as more Internet users are expected to be online this year — to search, shop, and purchase items on the Web.

    Trend Micro ranked ten notable social engineering techniques which Internet users should always be on the lookout for.

    10. Bargain-Hunter Scams. Cyber criminals use bogus discounts and promos to lure victims into clicking malicious links, or entering confidential information into fake sites. Products typically being used for these type of schemes are popular and hot retail items, which may make them irresistible to users. This year we saw the Trojan TROJ_AYFONE.A take advantage of the release of Apple iPhone. The malware displayed fake advertisements as well as a fake website of an online store where the product can be bought.

    9. Fake Charity Sites. Hurricanes Katrina and Gustav, the earthquake that hit China, the forest fires in California - these disasters were exploited by cyber criminals for their own gain through scamming and other means. The holiday season is also a time where most users are in a “generous & giving mood”, making the holidays the perfect time for cyber criminals to attempt to carry out their schemes. Generous users who respond to scam email messages or Web sites unfortunately end up not helping anyone in need, but instead robbed of their money or confidential information.

    8. Greeting Cards — Bringing Bad Tidings. Electronic cards, or e-cards, are often used by cyber criminals as a lure for victims to click malicious links in spammed messages, and possibly “self-compromising” their PCs. This type of attack usually takes advantage of holiday seasons, when users are likely to send out e-cards, and may actually be expecting them from friends or relatives.

    7. Malvertisements: Malicious Advertisements. Cyber criminals also use malicious advertisements and promos (posing as legitimate ads) to distribute malware, relying on the inclination of online shoppers to investigate bargains. Advertisements placed on high-trafficked websites are used as triggers for malware downloads. Popular sites such as Expedia.com & Rhapsody.com, Blick.com, and even MySpace, have been unwittingly harbored malicious banner ads in the past, which when clicked downloaded malware into users’ systems. It just goes to show that these malicious ads can literally be embedded almost anywhere.

    6. Poisoned Christmas Shopping Search Results. Query results for certain strings are rigged with malicious scripts that could lead to various payloads - malware, phishing sites, dangerous URLs. Malware authors usually bank on different seasons in choosing which strings will yield the malicious results. In 2007, results to searches for the phrase “christmas gift shopping” were found yielding malicious results leading to a wide variety of malware. Earlier this year, results to “halloween costumes” were found to lead to a rogue antivirus software.

    5. Compromised High-Traffic Websites. Compromised websites are major threats to online users since the point of infection happens in websites that are supposedly safe and trusted. As the holiday season draws near, shoppers are likely to flood online stores, auction sites, e-commerce sites to do their online shopping. Cyber criminals could then infect more victims by compromising popular and highly-trafficked websites.

    4. Mining Personal Data — Bogus Gift Card Promos. Users in search of freebies or promos on the Web can place themselves at a higher risk in this type of attack, as seemingly harmless surveys are used to harvest personal data. Promises of retailer rewards, gift cards, or even cash, are used to trick victims into participating in bogus surveys — what they don’t know is that the survey page is actually a phishing site and that it is part of a plot to steal confidential information.

    3. e-Commerce Phishing. eBay ranks as the most popular online retailer in 2007, having more than 124 million unique constituents. eBay also topped the list of the most phished website. From identity theft to ratings manipulation, cyber criminals continuously weave sophisticated schemes to extort user information for financial gain.

    2. Bogus Courier Receipts Delivering Trojans. Messages from popular couriers, alerting recipients of an undelivered package that needs to be retrieved — together with a file that is supposedly an invoice — are spammed to users to trick them into installing Trojans. Such a problem is quite a predicament for an online shopper, who is possibly waiting for his or her purchased item to be delivered by couriers for the holidays. UPS and FedEx are famous examples of couriers used by cyber criminals in this type of campaign.

    1. Shopping Invoices for Ghost Transactions. Potential victims receive an email message telling them to open and print a “receipt” sent as an attachment to the message. The attached file however is not a real receipt, but a Trojan Horse. Frequent online shoppers who are used to receiving such receipts are clearly the targets of this threat. On the other hand, users who are not online shoppers and are sure they didn’t make a purchase similar to that stated in the message may get curious and open the attachment as well. Rechnung spam runs are known for using this scheme; the most recent run spread WORM_OTORUN.C to victims who opened the attached “receipt.”

    ‘Tis the Season to Stay Secure | TrendLabs | Malware Blog - by Trend Micro

  • #2
    Re: ‘Tis the Season to Stay Secure

    Hi PK

    Thanxs for this useful info Pk. We all need to be aware of these scams and tricks not just on the web, but in everyday life.

    I should be a multi-millionairess by now, the amount of email Lottery and Beneficiary scams I get lol. According to them I'm a 'beneficiary' to everyone including Tom, Dick and Harry, and Dr. Mumbooboo from Nigeria LOL.

    Those Nigerian scams are a pain the ass. I also get those awful 'psychic' scam letters through the post too. " Miss **** I can foresee that you are gonna be a recipient for the amount 0f £100,000" yeh, right lol. They go straight into my recycling bin, cos thats where they belong IMO. I feel sorry for the elderley peeps, as they are vulnerable and may be sucked into the criminals traps.

    I'm a keen online shopper, but I am fairly careful what I click on and only go on sites I know. So glad ive got Mcafee's Site Advisor, which helps alot when i'm searching the web. I haven't had much trouble since ive had that.


    bfxx



    Member of the Beagles £2 coin and small change savers clubs, both based in the Debt Forum

    Comment

    View our Terms and Conditions

    LegalBeagles Group uses cookies to enhance your browsing experience and to create a secure and effective website. By using this website, you are consenting to such use.To find out more and learn how to manage cookies please read our Cookie and Privacy Policy.

    If you would like to opt in, or out, of receiving news and marketing from LegalBeagles Group Ltd you can amend your settings at any time here.


    If you would like to cancel your registration please Contact Us. We will delete your user details on request, however, any previously posted user content will remain on the site with your username removed and 'Guest' inserted.
    Working...
    X