In the past, most
of these came in as very easy to spot emails, but that’s changing. Now the emails are very well hidden and
extremely convincing. They are also
targeted or SPEAR PHISHED to their intended targets. Phishing attacks use a combination of data
obtained from Social Media sites, websites all to create specific deceptive
communications to their targets.
Example:
Your friend’s [insert popular social media here]
account password is compromised. The
person with that access now sees that you are fan of Bank of America and you
post to your [insert popular social media here] using an iPhone. I’m not picking on iPhones this is just an
example
"the Bad Guys" now have the following:
-
Your email account
- The fact that you own an iTunes account
(99.9% of all iPhone users do)
- They know what bank you use and what fake
email to send
- They have your cell phone to send you fake
notices about your bank account, iTunes account or email account.
- You may be currently out of town on vacation
(bonus for them)
Now "the Bad Guys" are
going to masquerade as trustworthy source.
They may choose the source from the information they obtained from the
hacked social media account.
Occasionally
banks will verify that you are using your credit card outside of the normal
area. So you don’t think anything of it
when you get a text, email or even a phone call from your bank asking you to
answer a few questions to verify your card is authorized to be used away from
your home.
EMAIL SCAM
You get an email
that appears to arrive from your bank.
You click the link on your laptop. You have just installed something
called a Blackhole Exploit Kit or “Man-in-the-Browser” attack.
The banking link
doesn’t do anything to the laptop. It
may actually just freeze up or restart your browser. So you decide to go to your bank the
traditional way. What you don’t see is
that the bank site is redirected and masked by this malware. So you are really entering information inot
an infected or spoofed site controlled by “the Bad guys”.
The site looks
legitimate, but it may ask for more user credentials than you usually
provide. It might say something like “Your
request can’t be processed. Please
verify the following information.”
Above a Non-infected BOA account Message This image from LMG Security |
Above: Infected BOA account asking too much information This image from LMG Security |
The site will ask for an unusal amount of information for verification. Be familiar with your banks HELP tab about what information they may require. If you are ever prompted for more than they state, then something is wrong.
TEXT MESSAGE
Most are less
likely to fall for this, but it apparently works.
You aren’t at
your computer and you get a quick text message from a strange number. It appears or claims to be your bank or even
your email account. It says your account
has been compromised, follow this link to verify your information and change
your password.
Some even ask you
to text back your password. I hope you
see the problem. Your bank isn’t going
to do this.
Phone Call
This one takes
marbles. As I mentioned earlier our bad
guys know you are out of town. They also
have your cell number. They assume that
you will be using your credit card.
They have a very professionally sounding (usually female) caller call
your cell and ask you if you are using your card out of town. They explain they just want to make sure it
hasn’t been stolen. This makes you feel
great that they are watching out for you.
They then claim that in-order to avoid your card being declined they
would like you to verify a few things.
They ask your username, your password, a secrete question, the card
number, etc.
If you suspect
this is baloney and it is, you should knowingly give them some false
information. They will accept it as the
real thing and the call.
There is a reason
all the security in the world can’t prevent this. That’s because we humans are often
times very careless. We love to share
and are encouraged to share our personal information on blogs (I'm guilty), social media, and others sites. Phishing attacks have been
around prior to the internet and they will continue to exist. Use caution.
To learn out more about Banking Malware, see this very informative post from LGM Security.