FBI warns of new Zeus-based malware in phishing scam
- 07 January, 2012 08:28
So long as people click on unsolicited attachments in email, scammers will invent new ways to take their money, identities and more.
The FBI today issued a warning on one such new Internet blight called "Gameover," which, once ensconced on your PC, can steal usernames and passwords and defeat common methods of user authentication employed by financial institutions.
MORE ON CYBERCRIME: From Anonymous to Hackerazzi: The year in security mischief-making
The FBI said it has seen an increase in the use of Gameover, which is an email phishing scheme that invokes the names of prominent government financial institutions -- the National Automated Clearing House Association (NACHA), the Federal Reserve Bank or the Federal Deposit Insurance Corporation (FDIC).
The FBI says Gameover is a newer variant of the Zeus malware, which was created several years ago and specifically targeted banking information.
Here's how the FBI describes the scam: "Typically, you receive an unsolicited e-mail from NACHA, the Federal Reserve, or the FDIC telling you that there's a problem with your bank account or a recent ACH transaction. (ACH stands for Automated Clearing House, a network for a wide variety of financial transactions in the U.S.) The sender has included a link in the e-mail for you that will supposedly help you resolve whatever the issue is. Unfortunately, the link goes to a phony website, and once you're there, you inadvertently download the Gameover malware, which promptly infects your computer and steals your banking information.
"After the perpetrators access your account, they conduct what's called a distributed denial of service, or DDoS, attack using a botnet, which involves multiple computers flooding the financial institution's server with traffic in an effort to deny legitimate users access to the site -- probably in an attempt to deflect attention from what the bad guys are doing."
The FBI went on to say some of the funds stolen from bank accounts go towards the purchase of precious stones and expensive watches from high-end jewelry stores. "The criminals contact these jewelry stores, tell them what they'd like to buy, and promise they will wire the money the next day. So the next day, a person involved in the money laundering aspect of the crime -- called a 'money mule' -- comes into the store to pick up the merchandise. After verifying that the money is in the store's account, the jewelry is turned over to the mule, who then gives the items to the organizers of the scheme or converts them for cash and uses money transfer services to launder the funds."
Read more about wide area network in Network World's Wide Area Network section.
- Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
- CMO's Customer Engagement in a Multi-Channel Marketing World
- MAM Evaluation Guide: 10 Must Haves
- Solving the Virtualized Infrastructure and Private Cloud Monitoring Challenge
- Implementing an Effective Vulnerability Management Program
Microsoft misjudges customer loyalty with kill-XP plea
Education ministry gets new CIO
Facebook coughs up $19bn to buy WhatsApp, draw younger users
Telecom to change name to Spark
Nov'IT says flashing a new ROM onto your Android phone can make it more secure