As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how?
Two Pharmings
Actually, two completely different fields use the term "pharming" now. We can say there exist two separate "pharmings".
If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is a very interesting matter, this article is not about it.
As for PC users, the term "phishing" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference.
Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers.
Dangerous Scams
A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website.
Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email? Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones.
Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information.
It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively.
Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability.
However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget the advice which they all are likely to have learned by heart:
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
The company's R&D department created an innovative technology, which disables information-stealing programs. Learn more -- visit the company's website http://www.anti-keyloggers.com
Today's Internet or World Wide Web is being over regulated.But,... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Phishing is the act of some individual sending an email... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The Internet is a vast International Network of people and... Read More
It has been said that with the wealth of information,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
We all get the odd virus now and then, but... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
As you know, this time the virus under the name... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
During the release of a new software product specialized to... Read More
No longer are viruses the only threat on the internet.... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Security leaks can be a big problem for any site... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Do you sometimes notice your computer running slower. Is your... Read More
You are at your computer, checking out software on EBay.... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Well, this is an article I never thought I would... Read More
Have been an Internet user for more than 9 years,... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Imagine this ? you open up your email box and... Read More
Let us take the example of scrambling an egg. First,... Read More
As the number of people using the Internet as an... Read More
Pharming is one of the latest online scams and rapidly... Read More
A little bit of time invested into learning about internet... Read More
Did you know...? 1 in 5 children who use computer... Read More
If you have used a Windows machine for a while,... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Imagine my surprise when I received a phone call from... Read More
History and BackgroundThe virus was one of the first ever... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Viruses are, however, not the only malicious software programs out... Read More
Shopping for horse gifts or other gift items on the... Read More
When we think of adware, what comes to mind are... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
We all know that it's dangerous to use the same... Read More
In today's times spyware is a very serious issue and... Read More
Before we start, I want to make it clear that... Read More
If you use the internet, you have probably been infected... Read More
In recent days, I was one of the unfortunate persons... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
File sharing on p2p is soaring despite the music and... Read More
This really chapped my lips...I recently bought a new computer.... Read More
It's late. You've been scouring the web for that perfect... Read More
At this point, if you've got the whole "turning the... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The most frustrating part of having Spyware on your computer... Read More
To blog or not to blog? Well, why not? Lots... Read More
There are ways to insure security though. You can get... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
If you know what is the 'Fishing' then it's very... Read More
Before you enter your name, address or any other data... Read More
Despite the current wave of identity theft and corporate security... Read More
First, let's do a little recap'. As I stated in... Read More
Internet Security |