Phishing Revisited

Sunday, April 6th, 2008

As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...

Heads-up: Dangerous new customized IRS scam steals data

Saturday, April 5th, 2008

This afternoon, we got a highly customized email purporting to come from the IRS, which of course, does nothing more than load malware. The email is made out to a key financial contact here at Sunbelt (name obfuscated for this post). As you can see, it’s quite convincing. (Incidentally, “Sunbelt Software Distribution, ...

Stormy April Fool’s Day

Monday, March 31st, 2008

A wave of April Fool's Day related Storm mails have just been sent out. Similar as the other times with a link that points to an IP address.

Phishers Use Google to Find Exposed Servers

Sunday, March 30th, 2008

Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor. Among other activities, MarkMonitor tracks phishing attacks that target brand names. Researchers compiled a list of 750 Google search terms that are used to track down ...

Does IE 8 Equal Safer Surfing?

Monday, March 24th, 2008

Microsoft is promising that the upcoming IE (Internet Explorer) 8 will be the safest and most secure version of its Web browser yet. Of course, everyone has heard this song before. Still, with the addition of two significant new security features, it's hard to argue that the new release won't ...