Записи с меткой security

What is a botnets?

What is a botnets?

Botnets — is infected computers with remote control. That is, they can be carried out email forwarding and fish for confidential information. As for her keys to the licensed programs that are available and distributed underground network. Viruses also have access to a cache of browser, which may contain information on the authorization. For fishing (fishing — a type of computer crimes) such information is of particular interest as it allows to extract the names of accounts of potential victims.

Botnet (derived from the word robot and network) — a computer network consisting of a number of hosts with advanced bots — standalone software. Most often as part of a botnet bot is a program that secretly installed on the victim’s device and allows attackers to perform certain actions using resources of an infected computer. Typically used for illegal activities or disapprove — spam, brute force on the remote system, Denial of Service. Wikipedia

Secret remote access is also required for developers of viruses or so-called farmers botnets. These are the people involved in the management and support of one or more of the botnet. Farmers profit by selling the system or CPU time to other people.

Since the functions of the remote control and information gathering implemented in viruses, do not focus on a specific phishing information, scammers do not usually resort to the developers of viruses. As a rule, they buy remote computers or CPU time farmers.

For example, they run a malicious program that initialization opens port 16661 on the receiver as a controller, and SOKS-proxy opens port 7080 and HTTP CONNECT 8008. The program also indicates the exact time, sets the ID for the system, looking for software related to financial calculations on the Internet and sends its version number.

Fischer launder money

Fischer launder money. Be vigilant

At the heart of phishing is the desire for easy money. Attacks scam is exposed to various financial institutions. But their goal is not only to steal accounts and passwords. The main task is associated with bank money transfer services. Reputable companies to help customers transfer money to various bank accounts. Therefore it is difficult to imagine that fishers abandon their activities as long as there are all the conditions for its successful implementation.

Most recently, I published an article — Fishing. Technique of computer crimes. Check it out before you continue reading.

How did fishers launder money?

For this kind of operation they hire outsiders, and find them, sending a letter or giving ads on sites on employment. Such wage earners must have had an account in the bank, which the fraudsters managed to successfully attack. On it and transfer money to bank with stolen passwords schёtov.

Member of the fishing groups reported that the flow will be, for example, today. So you need to go to the bank and cash the entire amount. Wage earners with her due from 3 to 10%. He receives cash, and then transfers them to the credit card or the name of a person living in another country.

In this case, the scammers carefully monitor every stage of the transfer of money. They retain information about the time of all transfers require a copy of the forms of receiving and sending. Thus, they regulate the actions of the employee, and he believes that working on a solid company that is accountable for every penny.

Fishing. Equipment or computer crimes

Fishing. Equipment or computer crimes

Fishing, which is also called carding or brand spoofing, has many definitions. Here we must be very careful, as this concept is constantly evolving. Is much more appropriate to consider the methods of computer crimes, the most common of which is the distribution of fake emails using the broadcast program.

These letters send «legitimate» institutions for the purpose of fraudulently extract personal information such as credit card numbers or passwords to bank accounts. In most cases, these letters contain an invitation to go to a Web-site and enter your personal information confidential. To mislead you, crooks make out his fake website so that it looked like a real website of the company that you are using.

Of course, these sites are not sites of legitimate organizations and crooks use the information you entered in the mercenary purposes. Thus, it is understandable why this process is called phishing. In English the word «fishing» means «fish» and the rogues just «fill up the bait», expecting that you will get hooked.

For the first time this phenomenon has attracted attention in 1995 in an incident happened to a company America Online (AOL). Phishers simulated administrator of the company and their victims reported that the alleged problem with the account and need to upgrade your credit card and personal information. At that time, due to the fact that home computers connected to the Internet, were a new phenomenon, this scheme has proved very effective, but it is not practiced as often as today.