[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

BREAKING! DEEP STATE SWAMP RATS TRYING TO SABOTAGE TRUMP FROM THE INSIDE | Redacted w Clayton Morris [Livestream in progress]

The Media Flips Over Tulsi & Matt Gaetz, Biden & Trump Take A Pic, & Famous People Leave Twitter!

4 arrested in California car insurance scam: 'Clearly a human in a bear suit'

Silk Road Founder Trusts Trump To 'Honor His Pledge' For Commutation

"You DESERVED to LOSE the Senate, the House, and the Presidency!" - Jordan Peterson

"Grand Political Theatre"; FBI Raids Home Of Polymarket CEO; Seize Phone, Electronics

Schoolhouse Limbo: How Low Will Educators Go To Better Grades?

BREAKING: U.S. Army Officers Made a Desperate Attempt To Break Out of The Encirclement in KURSK

Trumps team drawing up list of Pentagon officers to fire, sources say

Israeli Military Planning To Stay in Gaza Through 2025

Hezbollah attacks Israeli army's Tel Aviv HQ twice in one day

People Can't Stop Talking About Elon's Secret Plan For MSNBC And CNN Is Totally Panicking

Tucker Carlson UNLOADS on Diddy, Kamala, Walz, Kimmel, Rich Girls, Conspiracy Theories, and the CIA!

"We have UFO technology that enables FREE ENERGY" Govt. Whistleblowers

They arrested this woman because her son did WHAT?

Parody Ad Features Company That Offers to Cryogenically Freeze Liberals for Duration of TrumpÂ’s Presidency

Elon and Vivek BEGIN Reforming Government, Media LOSES IT

Dear Border Czar: This Nonprofit Boasts A List Of 400 Companies That Employ Migrants

US Deficit Explodes: Blowout October Deficit Means 2nd Worst Start To US Fiscal Year On Record

Gaetz Resigns 'Effective Immediately' After Trump AG Pick; DC In Full Blown Panic

MAHA MEME

noone2222 and John Bolton sitting in a tree K I S S I N G

Donald Trump To Help Construct The Third Temple?

"The Elites Want To ROB Us of Our SOVEREIGNTY!" | Robert F Kennedy

Take Your Money OUT of THESE Banks NOW! - Jim Rickards

Trump Taps Tulsi Gabbard As Director Of National Intelligence

DC In Full Blown Panic After Trump Picks Matt Gaetz For Attorney General

Cleveland Clinic Warns Wave of Mass Deaths Will Wipe Out Covid-Vaxxed Within ‘5 Years’

Judah-ism is as Judah-ism does

Danger ahead: November 2024, Boston Dynamics introduces a fully autonomous "Atlas" robot. Robot humanoids are here.


Science/Tech
See other Science/Tech Articles

Title: ID theft spyware scam uncovered
Source: BBC
URL Source: http://news.bbc.co.uk/1/hi/technology/4173218.stm
Published: Aug 23, 2005
Author: Mark Ward
Post Date: 2005-08-23 07:29:12 by Zipporah
Keywords: uncovered, spyware, theft
Views: 73
Comments: 10


Online banking login screen, BBC
Accounts at 50 banks are in danger of being plundered

Thousands of computer users have been caught out by a huge ID theft ring.

Security firm Sunbelt Software said it stumbled across a US-based server storing megabytes of data stolen from compromised computers while researching spyware infections.

The server held passwords for online accounts from 50 banks, Ebay and Paypal logins, hundreds of credit card numbers and reams of personal data.

The FBI has reportedly now started investigating the ring of ID thieves.

Hidden data

The bug that has stolen all the data is thought to be a variant of a family of trojans known as Dumaru or Nibu that exploit a vulnerability in Microsoft's Internet Explorer browser.

The trojan, a malicious piece of code, automatically downloaded itself on computers when people visited sites harbouring the program.

AutoComplete settings, Microsoft

The way the data is laid out, the quality of it, it's very easy to go through and use it for nefarious purposes

Eric Sites, Sunbelt Software

The hidden payload in this bug is a keylogger that grabs a copy of everything a user types.

What made this bug so effective was its ability to grab text stored on the clipboard and by Internet Explorer, said Eric Sites, vice president of research and development at Sunbelt Software.

Microsoft's browser has a feature, called AutoComplete, that automatically populates boxes on web forms where people typically fill in names, addresses, e-mail addresses, credit card numbers and other biographical details.

The feature is supposed to make filling in forms on websites less of a chore. In this case, said Mr Sites, it helped the ID thieves get hold of enormously valuable data.

Typically a keylogger produces a file containing an unbroken string of characters, said Mr Sites.

"It's usually very hard to take that and do anything with it," he told the BBC News website.

By contrast, AutoComplete data is already labelled and sorted because the browser has to know where to put each item.

"The way the data is laid out, the quality of it, it's very easy to go through and use it for nefarious purposes," he said. "This is about getting money and stealing."

Megabytes of data

The BBC News website was shown the server and some of the files containing personal data that it was storing. Each file was full of login names, e-mail addresses, credit card details and everything needed to steal someone's identity or simply empty their bank account.

Analysis of information in the files revealed login details for online services at 50 banks as well as user details for many Ebay and Paypal accounts. One bank account had more than $380,000 in it.

Sunbelt has contacted some of the people identified in the files to warn them that they have fallen victim to the bug. Banks, credit card firms, Ebay and Paypal have been told about compromised accounts.

The server at the centre of the ID theft ring had many multi-megabyte sized files on it, said Mr Sites. The server, which was based in the US, was regularly cleaned out by the thieves who created the trojan.

Infected machines sent files back hourly or when the logs of data they were collecting had reached a certain size.

Browser danger

Mr Sites said that, so far, the trojan had been found on porn sites and websites offering cracks for pirated software. But, he said, the trojan was likely to be on many other websites as it had managed to infect so many users.

Sunbelt believes the trojan has been circulating for about three weeks and in that time has probably infected thousands of victims.

The vulnerability it exploits means that all a user has to do to fall victim is to visit the wrong site.

"Type in a web link and your machine is infected," said Mr Sites. "You do not have to click on anything, the website forces the installation."

Many victims may have no idea that they have been infected.

"This version of the trojan was very successful," he said. "It was very small, hard to detect, the file had a very innocuous name and did not cause any problems to the machine.

The size and sophistication of the ID theft ring led anti-virus and security companies to quickly produce tools that can spot if a machine has been compromised by the server and clean up infected machines.

The trojan was tricky to spot because the files being sent back to the server were disguised as data traffic generated by a user's browser.

(6 images)

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 4.

#2. To: Zipporah (#0)

The vulnerability it exploits means that all a user has to do to fall victim is to visit the wrong site.

The vulnerability it exploits means that all a user has to do to fall victim is to visit the wrong site with the wrong browser.

purpleman  posted on  2005-08-23   8:34:44 ET  Reply   Untrace   Trace   Private Reply  


#3. To: purpleman (#2)

The vulnerability it exploits means that all a user has to do to fall victim is to visit the wrong site with the wrong browser.

Seems so. A family member recently fell victim to someone trying to empty their bank account but this person never uses Explorer and never uses their bank card to do online purchases.. so I have no idea how they got the bank card #.

Zipporah  posted on  2005-08-23   8:47:06 ET  Reply   Untrace   Trace   Private Reply  


#4. To: Zipporah (#3)

If they wrote fake checks against the account, then it was fairly trivial. They just need an account number (which they might guess semi-randomly knowing the pattern for that bank), plus the bank routing number. Then they can print checks and spend them with a fake ID. They probably don't need a real name. They certainly don't need a real number on the ID (e.g. SSN).

If it was an online transaction, they may have signed up for an online account in your family member's name, or figured out their account info. Some online banks do a very poor job of setting up the accounts. Before a change a year ago, my online banking account was my account# and the last 4 digits of my SSN for a pin. Stupid. Once in an online account, a thief can send a payment to a destination of their choice to buy stuff or maybe even get cash.

purpleman  posted on  2005-08-23   12:12:52 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 4.

        There are no replies to Comment # 4.


End Trace Mode for Comment # 4.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]