In times when socially oriented bureaucrats are prompting such popular projects as the KisMAC and the Default Password List to seek hosting in a foreign country, the German scene seems to be very active with yet another DIY phishing kit released in the wild which I'll dicuss in this post, following the first rather primitive one I came across to a while ago. As we've seen with a previous phishing kit, and the infamous Rock Phish, malicious economies of scale in terms of efficiently generating fake pages to be forwarded to a central logging location are the second most important goal of this trend. What's the first? It's noise generation compared to the common wisdom that such tools are supposed to be exclusive and private. Talking about the economics of phishing, with the already a commodity scam pages available at the phishers' disposal, fast-flux hosting of the pages and maintaining their "online lifetime", thus playing a cat and mouse game with researchers and vendors shutting them down, is perhaps the next stage in further developing the phishing ecosystem.
File size: 5844992 bytes
MD5: ae3a3cbb873c69843455c46ad6e62f40
SHA1: 7606b3cccbb3cccb95bbe32b688e350d42aeffc5
Related posts:
Pharming Attacks Through DNS Cache Poisoning
DIY Pharming Tools
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, August 29, 2007
DIY Phishing Kits
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment