Safe Speed Forums

The campaign for genuine road safety
It is currently Mon Oct 27, 2025 17:48

All times are UTC [ DST ]




Post new topic Reply to topic  [ 26 posts ]  Go to page 1, 2  Next
Author Message
 Post subject: phishing
PostPosted: Tue Nov 29, 2005 06:07 
Offline
Site Admin
User avatar

Joined: Sat Mar 06, 2004 06:46
Posts: 16903
Location: Safe Speed
I don't know about you folk but I get zillions of emails hoping I'll put passwords into fake web sites. This process seems to be known as 'phishing' these days, but years ago I knew the approach as 'chameleon'. It beats all password security because users are tricked into giving their passwords to a third party while believing that they are logging in correctly.

It seems to me that we could swamp the phishers out of business quite easily if we entered plausible but imaginary log ins to their nasty harvesting pages. Don't they take the data and use it to log in manually at some point?

What's the current thinking on this nonsense?

_________________
Paul Smith
Our scrap speed cameras petition got over 28,000 sigs
The Safe Speed campaign demands a return to intelligent road safety


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 08:36 
Offline
User

Joined: Fri Mar 11, 2005 09:01
Posts: 1548
Manually entering such a large amount of harvested data would take ages even if it was correct, much easier to have a script running.

_________________
What makes you think I'm drunk officer, have I got a fat bird with me?


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 09:25 
Offline
User

Joined: Sat Jul 31, 2004 12:09
Posts: 115
Location: South West
You're not the only one Paul. I've had nearly 30 of them overnight! I suspect it's best to ignore them.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 14:59 
Offline
User

Joined: Mon Jul 25, 2005 17:00
Posts: 169
Location: Leicester
starfin wrote:
You're not the only one Paul. I've had nearly 30 of them overnight! I suspect it's best to ignore them.


I tend to report then to the real organisation they purport to be from. Banks and building societies are keen to know about these sort of attacks on their security.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 15:06 
Offline
Site Admin
User avatar

Joined: Sat Mar 06, 2004 06:46
Posts: 16903
Location: Safe Speed
mrtd wrote:
starfin wrote:
You're not the only one Paul. I've had nearly 30 of them overnight! I suspect it's best to ignore them.


I tend to report then to the real organisation they purport to be from. Banks and building societies are keen to know about these sort of attacks on their security.


I get well over 100 a day. :(

_________________
Paul Smith
Our scrap speed cameras petition got over 28,000 sigs
The Safe Speed campaign demands a return to intelligent road safety


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 16:28 
Offline
Member
Member

Joined: Mon Mar 15, 2004 16:02
Posts: 372
You need a better spam filter! :(

if you can, ignore them and delete without opening (autopreview?) as simply opening some will confirm your email address as genuine. my company's filter get rid of most, but some always get through and are deleted on sight.


Top
 Profile  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 16:47 
Offline
Site Admin
User avatar

Joined: Sat Mar 06, 2004 06:46
Posts: 16903
Location: Safe Speed
stackmonkey wrote:
You need a better spam filter! :(


I didn't say they didn't get filtered did I? :)

_________________
Paul Smith
Our scrap speed cameras petition got over 28,000 sigs
The Safe Speed campaign demands a return to intelligent road safety


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 17:23 
Offline
User

Joined: Sat Jul 31, 2004 12:09
Posts: 115
Location: South West
mrtd wrote:
starfin wrote:
You're not the only one Paul. I've had nearly 30 of them overnight! I suspect it's best to ignore them.


I tend to report then to the real organisation they purport to be from. Banks and building societies are keen to know about these sort of attacks on their security.


I'll do that if it is a variant I haven't seen before, otherwise I just delete them. Most are being picked up by the spam/virus filter at the moment so I assume they are already well known.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 20:21 
Offline
Gold Member
Gold Member

Joined: Thu May 19, 2005 22:21
Posts: 925
Quite awhile ago I got an e-mail from EBay asking to update it's records. It was before phishing was widely know(at least I hadn't heard about it) and naively I put my details in. I felt someonthing wasn't right so I changed my password and contacted Ebay who confirmed it wasn't genuine. I'm a lot more warey now, I still buy a lot of stuff and bank on the net though thankfully have never had a problem - touch wood!


Top
 Profile Send private message  
 
 Post subject: Re: phishing
PostPosted: Tue Nov 29, 2005 20:59 
Offline
Member
Member

Joined: Fri Apr 09, 2004 14:04
Posts: 2325
Location: The interweb
SafeSpeed wrote:
It seems to me that we could swamp the phishers out of business quite easily if we entered plausible but imaginary log ins to their nasty harvesting pages. Don't they take the data and use it to log in manually at some point?


The giving away of personal details is the main risk but you also run the risk of computer hijack via your web browser by simply visiting such sites. If you are tempted to visit and enter false details make sure your security is in tip top condition.

Another issue is that by simply clicking the link or viewing the email you may be flagging that email address as valid. This makes it much more valuable to anyone selling email addresses. You are therefore helping the criminals.

It would take a vast number of sets of false information to make any kind of dent in the phishers profit margins anyway. Email spammers expect only something like a one in a million of their mails will result in any income.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Tue Nov 29, 2005 21:55 
Offline
Member
Member

Joined: Thu Jun 23, 2005 02:50
Posts: 2868
Location: Dorset
I usually go to them (as long as there is nothing in the URL to confirm my e-mail address) and enter fake data just for fun.

If you enter a random login username/password and it just lets you in then it's got to be fake.
I usually fill in fake details because I like to see how their sites look.

I report eBay scams but haven't seen any others lately. I've been getting viruses and lots of them. (oh look, there's one now!) Shame they don't run on my Mac ;)

I once pointed out to a bank that the fake site used logos pointing to the real site. If the real site had made a copy of that image with a different name and changed their pages to look at the new image name they could have made the old one say "this is a fraud site do not enter your details". They didn't listen/understand.

Also the fraud sites usually redirect to the real site at the end. Chances are the real site could monitor the referer URLs coming in to it and if it's from a known bad site redirect the user to a page telling them what has happened and that they must change their password and notify their bank. But I know no banks would listen to me if I suggested that. Too complex I'm sure.

_________________
Andrew.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 15:36 
Offline
Member
Member

Joined: Wed Sep 28, 2005 08:49
Posts: 400
I don't know if it is of any help but I use mailwasher and that bounces E-mails back address unknown.

Been using for some years now, even actually upgraded and paid for it and so far been very pleased with it.

http://www.mailwasher.net/

_________________
Shooting is good for you and too good for some people.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 15:39 
Offline
Member
Member

Joined: Wed Apr 27, 2005 01:42
Posts: 686
Set up an HTTP script to plug random sequences of alpha and numeric characters into the userid/password fields of the phisher's site repeatedly. Hit "run". Leave running until phisher's web server runs out of disk space. Job done.

_________________
“For every complex problem, there is a solution that is simple, neat, and wrong.” - H. L. Mencken


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 16:26 
Offline
Site Admin
User avatar

Joined: Sat Mar 06, 2004 06:46
Posts: 16903
Location: Safe Speed
antera309 wrote:
Set up an HTTP script to plug random sequences of alpha and numeric characters into the userid/password fields of the phisher's site repeatedly. Hit "run". Leave running until phisher's web server runs out of disk space. Job done.


Brilliant - I thought it was so good I rang the computer crimes unit at Scotland Yard and gave it to them. I spoke at length with Robert Buris there (he's no fan of speed cameras :hehe: ). He's got concerns about the legality of the idea, but agrees it would be a useful countermeasure. He's going to put it up for legal advice. Nice chap.

_________________
Paul Smith
Our scrap speed cameras petition got over 28,000 sigs
The Safe Speed campaign demands a return to intelligent road safety


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 16:37 
Offline
Member
Member

Joined: Thu Jun 23, 2005 02:50
Posts: 2868
Location: Dorset
Only down side is that if all the random logins come from the same IP and the crooks are clever enough to log IP addresses with each record they just delete all records which match your IP address.
(sorry, I like to solve computer problems!)

_________________
Andrew.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 16:46 
Offline
User

Joined: Sat Jul 31, 2004 12:09
Posts: 115
Location: South West
Ziltro wrote:
Only down side is that if all the random logins come from the same IP and the crooks are clever enough to log IP addresses with each record they just delete all records which match your IP address.
(sorry, I like to solve computer problems!)


But if say 10,000 people ran the same script...


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 17:50 
Offline
Member
Member

Joined: Thu Jun 23, 2005 02:50
Posts: 2868
Location: Dorset
starfin wrote:
But if say 10,000 people ran the same script...


That might well work :)

_________________
Andrew.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 20:31 
Offline
User

Joined: Thu Sep 22, 2005 18:39
Posts: 346
antera309 wrote:
Set up an HTTP script to plug random sequences of alpha and numeric characters into the userid/password fields of the phisher's site repeatedly. Hit "run". Leave running until phisher's web server runs out of disk space. Job done.


As each combination would only use a couple of bytes, I just checked my user & pass - only 30 BYTES not Kb!! (4Kb on disk - 30 bytes actual), we could be looking at billions, if not trillions of fake id's to kill a web servers storage!


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Wed Nov 30, 2005 22:37 
Offline
Member
Member

Joined: Fri Apr 09, 2004 14:04
Posts: 2325
Location: The interweb
Brookwood wrote:
I don't know if it is of any help but I use mailwasher and that bounces E-mails back address unknown.


The trouble with that is you are bouncing them back to a fake or hijacked address. Creating extra traffic for no benefit to anyone.

antera309 wrote:
Set up an HTTP script to plug random sequences of alpha and numeric characters into the userid/password fields of the phisher's site repeatedly. Hit "run". Leave running until phisher's web server runs out of disk space. Job done.


This would be a DoS attack. And would most likely land you in more trouble than the scammers.

A while back one of the A/V companies distributed a screensaver which would similarly attack sites of known spammers. This was removed after allegations of it constituting a DDoS attack.

Sorry but the only solution is to educate and protect end users.


Top
 Profile Send private message  
 
 Post subject:
PostPosted: Thu Dec 01, 2005 10:54 
Offline
Member
Member

Joined: Wed Sep 28, 2005 08:49
Posts: 400
Homer wrote:
Brookwood wrote:
I don't know if it is of any help but I use mailwasher and that bounces E-mails back address unknown.


The trouble with that is you are bouncing them back to a fake or hijacked address. Creating extra traffic for no benefit to anyone.

antera309 wrote:
Set up an HTTP script to plug random sequences of alpha and numeric characters into the userid/password fields of the phisher's site repeatedly. Hit "run". Leave running until phisher's web server runs out of disk space. Job done.


This would be a DoS attack. And would most likely land you in more trouble than the scammers.

A while back one of the A/V companies distributed a screensaver which would similarly attack sites of known spammers. This was removed after allegations of it constituting a DDoS attack.

Sorry but the only solution is to educate and protect end users.


You are right but I am an end user and I can get rid of any E-mails I don't want before they come to my computer and bouncing them does seem to reduce the repeats. These things happen, like junk mail, because the end user actually accepts them.

_________________
Shooting is good for you and too good for some people.


Top
 Profile Send private message  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 26 posts ]  Go to page 1, 2  Next

All times are UTC [ DST ]


Who is online

Users browsing this forum: No registered users and 34 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You can post attachments in this forum

Search for:
Jump to:  
cron
Powered by phpBB® Forum Software © phpBB Group
[ Time : 0.028s | 11 Queries | GZIP : Off ]