update Sceptical that Australians are targeted by cybercrime? Late last year the Australian Computer Emergency Response Team (AusCERT) was asked to repatriate hundreds of Commonwealth Bank customer credentials which had been stolen via the ZeuS trojan. AusCERT GM: Graham Ingram(Credit: ZDNet.com.au) German researchers, Thorsten Holz, Markus Engelberth and Felix Freiling from the University of Mannheim’s Laboratory for Dependable Distributed Systems came across hundreds of Australian credentials late last year. They wanted to study the underground economy that trades in stolen digital credentials. Holz’s team acquired the credentials by setting up a “honey pot” — a network of servers, designed to attract malware infections and phishing emails. They used the infected machines to locate what the researchers called “dropzones” — servers that host the stolen credentials, mostly based in Russia, the US and China. They had in total acquired around 170,000 stolen credentials taken from 70 of the active “dropzones”. The two malware families they had looked at in detail were Limbo/Nethell and ZeuS/Zbot/Wsnpoem: Limbo was analysed for email and social networking credentials, and ZeuS for banking credentials. Australia ranked surprisingly high in terms of Limbo-infected computers the researchers had analysed. The 6,568 Australian infections were well behind Russian, UK and… Read full this story
- The importance of two-factor authentication
- Markets rise as Powell signals an end to Fed support
- Tips for Victims of Unemployment Benefit Fraud
How do you return stolen bank credentials? have 227 words, post on www.zdnet.com at March 6, 2009. This is cached page on Vietnam Colors. If you want remove this page, please contact us.