SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Compilation of Phishing and Keylogger Attacks

In today’s scenario it seems that barely a day goes by without another story breaking
around a password-protected service being compromised in some way or other. Passwords
can be compromised through various forms of attack, including key-logging/screen-logging,
phishing and shoulder-surfing among others. This note elaborates on the extent to which
the keyloggers/screenloggers and phishing attacks are prevalent in today’s world.


KeyLoggers/ScreenLoggers:

KeyLoggers/ScreenLoggers are malware that are present in user’s computer without his
knowledge and tracks (or logs) the keys struck on a keyboard as well as take screenshots of
what is displayed on screen typically in a covert manner and sends it to a distant hacker. In
present scenario all keyloggers are capable of both capturing key strokes and screenshots.
Hence keylogger/screenloggers name can be used interchangeably. Below are some of the
statistics related to the keyloggers/screenloggers.


   •   In a survey conducted in Year 2006 by WebSense it came out that almost one in five
       organizations have been the victim of a keylogger attack in USA1
   •   The SANS Institute, a group that trains and certifies computer security professionals,
       estimated that at a single moment in year 2006, as many as 9.9 million machines in
       the United States were infected with keyloggers2
   •   In June 2009, security company Prevx discovered that a variant of keylogger trojan
       Zeus had compromised over 74,000 FTP accounts on websites of such companies as
       the Bank of America, NASA, Monster, ABC, Oracle, Cisco, Amazon, and
       BusinessWeek3
•   In October 2009, Trusteer Research reported that there was a new attack using Zeus
       trojan to harvest credentials used to access enterprise web accounts such as
       webmail, CRM, financial and other SaaS applications4
   •   On 1 October 2010, FBI announced it had discovered a major international cyber
       crime network which had used Zeus to hack into US computers and steal around
       $70m as well as attempted to steal a total of $220m3
   •   In April 2010, Visa has issued an alert that there is a growing cases of
       keylogger/screenlogger attacks involving the online payment card transactions. The
       particular key logger malware identified by Visa is equipped to send payment card
       data to a fixed e-mail or IP address accessible to the hacker8
   •   Card-not-present fraud costs the U.S. payments industry, including issuers,
       merchants and acquirers, an estimated $1 billion per year according to a recent
       report from Aite Group LLC, a Boston-based consulting firm.9 Majority of the above
       happens mainly because of KeyLogger/ScreenLogger malware.
            •   Credit and debit card fraud is the No. 1 fear of Americans in the midst of the
                global financial crisis. Concern about fraud supersedes that of terrorism,
                computer and health viruses and personal safety.10



Phishing:

Phishing is the criminally fraudulent process of attempting to acquire sensitive information
such as usernames and passwords by typically directing users to enter details at a fake
website whose look and feel are almost identical to the legitimate one. Below are some of
the statistics related to the phishing attacks.
•   Gartner reported that $3.2 billion is lost due to Phishing attacks in the United States
       in 20075
   •   Cybercriminals stole more than $120 million through online banking fraud in the
       third quarter of 2008, reports the Federal Deposit Insurance Corp. (FDIC). Much of
       the fraud occurred after users were tricked into visiting malicious Web sites or
       downloading Trojan horses that enabled cybercriminals to steal online banking
       passwords9
   •   In November 2009, Symantec has alerted that the CEOs are being targeted for
       advanced Spear Phishing attacks6
   •
       One in 20 people in Britian have lost money to some sort of online scam such as
       "phishing", according to research commissioned by AOL UK in 20057
   •
       A class of Spear Phishing attacks are on rise, a recent attack indicating compromising
       of 100 email service providers where in criminals have been conducting complex,
       targeted e-mail attacks. Recipients who clicked the links were redirected to sites
       that attempted to silently install software designed to steal passwords11


There are also many more recent cases of twitter, facebook, Vodafone, itunes linked with
paypal account hacks in 2010 which were also attributed to password-based authentication
systems. The Vodafone hack in particular is attributed to a type of social engineering attack.
Also there was a popular case of bruteforce password cracking done on yahoo mail which
has given a red flag for all cloud based providers who are using password based
authentication in 2009. And, according to a report by Verizon in 2009, password guessing is
the most frequent means of gaining control of compromised enterprise systems.
Another case in point is an escrow firm in Missouri suing its bank to recover $440,000 that
organized cyber thieves stole in an online robbery earlier in 2010, claiming the bank’s
reliance on passwords to secure high-dollar transactions failed to measure up to federal e-
banking security guidelines. 12


As the current password based system is no longer sufficient to combat the above attacks,
there is an urgent need for having a dynamic password system (strong authentication)
which will effectively address the same.




References:

   1.   http://www.scmagazineus.com/websense-keylogger-attacks-double-in-a-year/article/33436/
   2.   http://www.trusteer.com/sites/default/files/Anti_Keylogger_Myths.pdf
   3.   http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29
   4.   http://www.trusteer.com/sites/default/files/Zeus-OWA_Advisory_Oct_2009.pdf
   5.   http://www.gartner.com/it/page.jsp?id=565125
   6.   http://www.spamfighter.com/News-13452-Symantec-CEOs-Becoming-Victims-of-Spear-Phishing-Attacks.htm
   7.   http://www.theregister.co.uk/2005/05/03/aol_phishing/
   8.   http://usa.visa.com/download/merchants/key-logger-key-stroke-and-screen-capture.pdf
   9.   http://security.magtek.com/fraud-statistics/
   10. http://www.creditcards.com/credit-card-news/credit-card-industry-facts-personal-debt-statistics-1276.php
   11. http://krebsonsecurity.com/2010/11/spear-phishing-attacks-snag-e-mail-marketers/
   12. http://krebsonsecurity.com/2010/11/escrow-co-sues-bank-over-440k-cyber-theft/

Mais conteúdo relacionado

Mais procurados

Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 

Mais procurados (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Phishing
PhishingPhishing
Phishing
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 

Semelhante a Compilation of Phishing and Keylogger Attacks: Password Risks

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 

Semelhante a Compilation of Phishing and Keylogger Attacks: Password Risks (20)

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 

Mais de ArrayShield Technologies Private Limited (6)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Compilation of Phishing and Keylogger Attacks: Password Risks

  • 1. Compilation of Phishing and Keylogger Attacks In today’s scenario it seems that barely a day goes by without another story breaking around a password-protected service being compromised in some way or other. Passwords can be compromised through various forms of attack, including key-logging/screen-logging, phishing and shoulder-surfing among others. This note elaborates on the extent to which the keyloggers/screenloggers and phishing attacks are prevalent in today’s world. KeyLoggers/ScreenLoggers: KeyLoggers/ScreenLoggers are malware that are present in user’s computer without his knowledge and tracks (or logs) the keys struck on a keyboard as well as take screenshots of what is displayed on screen typically in a covert manner and sends it to a distant hacker. In present scenario all keyloggers are capable of both capturing key strokes and screenshots. Hence keylogger/screenloggers name can be used interchangeably. Below are some of the statistics related to the keyloggers/screenloggers. • In a survey conducted in Year 2006 by WebSense it came out that almost one in five organizations have been the victim of a keylogger attack in USA1 • The SANS Institute, a group that trains and certifies computer security professionals, estimated that at a single moment in year 2006, as many as 9.9 million machines in the United States were infected with keyloggers2 • In June 2009, security company Prevx discovered that a variant of keylogger trojan Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster, ABC, Oracle, Cisco, Amazon, and BusinessWeek3
  • 2. In October 2009, Trusteer Research reported that there was a new attack using Zeus trojan to harvest credentials used to access enterprise web accounts such as webmail, CRM, financial and other SaaS applications4 • On 1 October 2010, FBI announced it had discovered a major international cyber crime network which had used Zeus to hack into US computers and steal around $70m as well as attempted to steal a total of $220m3 • In April 2010, Visa has issued an alert that there is a growing cases of keylogger/screenlogger attacks involving the online payment card transactions. The particular key logger malware identified by Visa is equipped to send payment card data to a fixed e-mail or IP address accessible to the hacker8 • Card-not-present fraud costs the U.S. payments industry, including issuers, merchants and acquirers, an estimated $1 billion per year according to a recent report from Aite Group LLC, a Boston-based consulting firm.9 Majority of the above happens mainly because of KeyLogger/ScreenLogger malware. • Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety.10 Phishing: Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames and passwords by typically directing users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Below are some of the statistics related to the phishing attacks.
  • 3. Gartner reported that $3.2 billion is lost due to Phishing attacks in the United States in 20075 • Cybercriminals stole more than $120 million through online banking fraud in the third quarter of 2008, reports the Federal Deposit Insurance Corp. (FDIC). Much of the fraud occurred after users were tricked into visiting malicious Web sites or downloading Trojan horses that enabled cybercriminals to steal online banking passwords9 • In November 2009, Symantec has alerted that the CEOs are being targeted for advanced Spear Phishing attacks6 • One in 20 people in Britian have lost money to some sort of online scam such as "phishing", according to research commissioned by AOL UK in 20057 • A class of Spear Phishing attacks are on rise, a recent attack indicating compromising of 100 email service providers where in criminals have been conducting complex, targeted e-mail attacks. Recipients who clicked the links were redirected to sites that attempted to silently install software designed to steal passwords11 There are also many more recent cases of twitter, facebook, Vodafone, itunes linked with paypal account hacks in 2010 which were also attributed to password-based authentication systems. The Vodafone hack in particular is attributed to a type of social engineering attack. Also there was a popular case of bruteforce password cracking done on yahoo mail which has given a red flag for all cloud based providers who are using password based authentication in 2009. And, according to a report by Verizon in 2009, password guessing is the most frequent means of gaining control of compromised enterprise systems.
  • 4. Another case in point is an escrow firm in Missouri suing its bank to recover $440,000 that organized cyber thieves stole in an online robbery earlier in 2010, claiming the bank’s reliance on passwords to secure high-dollar transactions failed to measure up to federal e- banking security guidelines. 12 As the current password based system is no longer sufficient to combat the above attacks, there is an urgent need for having a dynamic password system (strong authentication) which will effectively address the same. References: 1. http://www.scmagazineus.com/websense-keylogger-attacks-double-in-a-year/article/33436/ 2. http://www.trusteer.com/sites/default/files/Anti_Keylogger_Myths.pdf 3. http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29 4. http://www.trusteer.com/sites/default/files/Zeus-OWA_Advisory_Oct_2009.pdf 5. http://www.gartner.com/it/page.jsp?id=565125 6. http://www.spamfighter.com/News-13452-Symantec-CEOs-Becoming-Victims-of-Spear-Phishing-Attacks.htm 7. http://www.theregister.co.uk/2005/05/03/aol_phishing/ 8. http://usa.visa.com/download/merchants/key-logger-key-stroke-and-screen-capture.pdf 9. http://security.magtek.com/fraud-statistics/ 10. http://www.creditcards.com/credit-card-news/credit-card-industry-facts-personal-debt-statistics-1276.php 11. http://krebsonsecurity.com/2010/11/spear-phishing-attacks-snag-e-mail-marketers/ 12. http://krebsonsecurity.com/2010/11/escrow-co-sues-bank-over-440k-cyber-theft/