Criminals offer phishing kits on the net for free
Malware authors are giving away phishing kits to fraudsters for free in return for financial information on victims, according to an RSA report.
Phishing kits are on the increase and are being given away for free by their authors, according to a new report.
The kits are being offered on underground forum-based websites, often for no money, to criminals to use in attacks against financial institutions. Code is frequently inserted into the kits, meaning that stolen personal information from victims is sent back to both the creator as well as the criminal sending out the phishing email.
According to the latest RSA report, this harvesting of stolen credentials is the main reason why the authors of the kits are so willing to give away their products rather than charge for them.
Of particular note are Man-in-the-Middle phishing attacks. According to the threat report's authors, the increase in the number of these threats correlates with a greater number of discussions held by criminals on forums about "curl attacks", which is the name give to such attacks by fraudsters.
Christopher Young, vice president of Consumer and Access Solutions Group at RSA said that as institutions put additional online security measures in place, inevitably the fraudsters are looking at new ways of duping innocent victims and stealing their information and assets.
"While these types of attacks are still considered 'next generation', we expect them to become more widespread over the course of the next 12-18 months," he said.
"We are working with many organisations to ensure they are positioned to withstand whatever threats fraudsters may create. Some of these organisations have already deployed various layers of protection and others are in the process of strengthening their security."
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download