Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Spear Phishers Become More Proficient

Ever-since the occurrences of cyber-attacks nearly every day on high-profile targets, as well as with the U.S Senate and IMF being effectively hacked in the 1st-week of June 2011, Chairman Dave Jevans of the APWG (Anti-Phishing Working Group) elucidates the measures banks can adopt for aiding in foiling newly emerging sophisticated hackers. Bank Technology News published this in news during June 2011.

Stated Jevans from the industry association APWG functioning solely to combat Internet ID-theft, modern spear phishing wasn't merely more widespread; however, they were far more technically skilled too. ComputerWorld published this in news on June 14, 2011.

The Chairman added that spear phishers weren't just chasing passwords; they were tricking people into loading crime-ware onto the PCs they operated.

During the IMF assault, hackers acquired admission through a phishing assault wherein criminals loaded malicious software onto the network systems of the Bank. Beyond banking, the U.S. Senate had been conducting an investigation into a hack by one well-arranged hacking gang, Lulz Security. This gang failed in accessing a secured database having confidential information regarding Senators, stated the Senate. Bank Technology News published this during June 2011

Meanwhile, similar to ordinary phishing, assaults based on spear phishing technique are executed with e-mails, which attempt at so defrauding the recipient that he voluntarily follows a web-link, which takes onto a malevolent website. These websites can appear in nearly infinite natures such as from being websites, which promote a software update of Adobe Flash or other popular software, to being phony screens of account log-ins.

Moreover, the incident involving International Monetary Fund represented the latest within several personalized assaults in 2011 that focused on targets from Google's Gmail to the Oak Ridge National Laboratory as well as the Foreign Ministry of France.

In each of these assaults, there was the usual use of spear phishing for duping end-users into disclosing their account details or loading malware.

Stated Jevans, there were far more data online, on LinkedIn and Facebook, which made the e-mails appear largely trustworthy. Moreover, the malware they were loading kept on bypassing AV programs. ComputerWorld published this on June 14, 2011.

Related article: Spyware Detection Programs Track Advertisers’ Cookies

» SPAMfighter News - 6/23/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page