Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Phishers Get Phoney 236

Nick Johnson writes to mention a new twist on phishing. From the article: "The spammed message warns of a problem with a bank account and instructs the recipient to dial a phone number to resolve it. The caller is connected to a voice response system that is made to sound exactly like the bank's own system. The phone system identifies itself to the target as the financial institution and prompts them to enter account number and PIN."
This discussion has been archived. No new comments can be posted.

Phishers Get Phoney

Comments Filter:
  • This... (Score:5, Insightful)

    by danimrich ( 584138 ) on Friday April 28, 2006 @10:58AM (#15220912) Homepage Journal
    Makes me think that it is still the safest option to have customers do all their banking right at a teller.
  • by kanweg ( 771128 ) on Friday April 28, 2006 @11:04AM (#15220988)
    So, what if you enter a random number with random PIN. They have to go thru the trouble to make the card, only to find out it doesn't work. And their face pop up at the video camera's of the ATMs all the time with failed withdrawals.

    Bert
  • by JoeyB ( 969202 ) on Friday April 28, 2006 @11:08AM (#15221043)
    No one will ever ask you for your account number or pin. This is not so much a new twist as good old basic social engineering. It stands to reason NEVER to trust any unsolicited form of communication unless you check it out and NOT by calling the number the phisher provides.
  • Re:Ah, but how.. (Score:5, Insightful)

    by corbettw ( 214229 ) on Friday April 28, 2006 @11:15AM (#15221104) Journal
    I've had phishing emails that were for the right bank: and even had the right address in it (except for the fact taht I moved from the address 2 years ago...)

    Sounds like they ran a credit check on you. All that information is collected by credit reporting agencies (believe it or not, how long you've had an account with one bank, and the average deposits, goes into your credit score...at least, that's my banker told me when I opened my account with her). And I know addresses are kept in credit checks, since the last time I checked mine (last summer) it had addresses going back to 1998. Handy, since around the same time I had to submit all those addresses for my background check when I got my Series 7 and 65.

    Long story short: don't ever give out your SSN to anyone unless you're getting money/credit from them. And minimize how many people you do business with in that regards.

    Wanna know the easiest way to get a list of current addresses and SSNs?* Send out a mailing to 100,000 people in a given city, offering a car loan or something (which of course you have no intention of actually giving them). Statistically, at least 1000 of them will send you their full name, address, SSN, bank account information, even mother's maiden name. And yes, people are that stupid.

    *I don't know if anyone's ever done this, and if it happens after this I specifically disclaim any responsibility for it.
  • by csoto ( 220540 ) on Friday April 28, 2006 @11:15AM (#15221105)
    one would think these guys would just seek gainful employment.
  • by VincenzoRomano ( 881055 ) on Friday April 28, 2006 @11:16AM (#15221108) Homepage Journal
    Why should an insitution (not just banks) ask me for details they are supposed to already know?
    No security technology or technique is strong enough to defy stupidity!
    And phishing exploits stupidity!
  • 800 Number? (Score:2, Insightful)

    by Transplant ( 535283 ) on Friday April 28, 2006 @11:16AM (#15221111)
    I wonder if these guys were stupid enough to use a "1-8XX" number. Oh the fun that could be had making them pay...
  • Re:Ah, but how.. (Score:3, Insightful)

    by 955301 ( 209856 ) on Friday April 28, 2006 @11:48AM (#15221429) Journal

    Here's one idea. Your actions.

    Start up a phishing cluster. Collect authentic notices from various banks (fidelity investement statement notice, etc). Fire copies of these notices to "customers" in an html email. Add a graphic touch to a node in your cluster with a uid traceable to that email address. This email should otherwise be harmless and point to the actual institution - this leaves you with great options on what to email - Retirement tutorials, account statement notices, privacy statements.

    If the customer has an account there, they are likely to open the email. By opening it, your cluster is pinged and notified that this email worked.

    So now you have a more probable positive hit. Send them a customer service request to call and discuss apparent fraudulent transactions on their account.

  • by LunaticTippy ( 872397 ) on Friday April 28, 2006 @11:49AM (#15221436)
    Both of these ideas are handily defeated by man-in-the-middle attacks.

    You visit a website. It visits your banks website. You type in your account number. It types in your account number. Etc.

    Same for the phone. It could simply conference you to your bank and listen in to everything you do. You're dealing with your own bank, so you wouldn't suspect anything. They'd have all your info.

  • by gravesb ( 967413 ) on Friday April 28, 2006 @11:56AM (#15221514) Homepage
    I refuse to believe they are that incompetent.
    Then you've never worked for the government.
  • Re:This... (Score:5, Insightful)

    by buelba ( 701300 ) on Friday April 28, 2006 @11:59AM (#15221540)
    The real safe option is only to call the number printed on the back of your credit/debit card. What's amazing is how badly the banks are set up for this. The following happens to me at least twice a year:

    1. I travel for work, and use my credit card for all kinds of things I don't usually buy, like hotel rooms.

    2. My wife keeps using the same card for all the stuff we usually buy.

    3. The computer says: hey, someone maybe stole the card and is running up all those hotel charges!

    4. A human from the security department calls us to verify, gets voicemail, and leaves a callback number that is NOT the callback number on the card.

    5. I call back the number on the card. The human there says, "why don't you call the number they gave you?" I explain. They think about it and realize this makes sense. About 15 minutes later, I'm connected to the right people -- usually after going through a supervisor at the call center.

    The right way to do it, of course, is to have the human from the security department leave this message: To call us back, call the number on your card; then, immediately enter the following code to be directed to the right department. But they still haven't learned.

    I shudder to think what will happen when I'm eventually home when they call. I certainly won't do anything except hang up and call back the same number.
  • by mizhi ( 186984 ) on Friday April 28, 2006 @11:59AM (#15221541)
    Incorrect. All the companies I call ask for identifying numbers. Whether it be Phone#, last 4 SSN, CC, or Account#. Granted, when I call them, they usually ask for 2 or 3 piece of information to match up; such as mailing address, birthday, etc.

    And just to cut the inevitable snarky comment off, yes they are the actual companies.

    You are correct though. If you get an unsolicited contact through email or on the phone, don't trust them. If they are really from your institution, tell them you'll call them back on a number you know to be legit. If there's really a problem with your accounts that you need to know about, whoever you get on the line will know what it is. If there isn't, well, good job, you're helping against phishers by notifying the institution that someone is targeting people in their name.
  • Re:This... (Score:4, Insightful)

    by Asphalt ( 529464 ) on Friday April 28, 2006 @12:29PM (#15221800)
    . I call back the number on the card. The human there says, "why don't you call the number they gave you?" I explain. They think about it and realize this makes sense. About 15 minutes later, I'm connected to the right people -- usually after going through a supervisor at the call center.

    The right way to do it, of course, is to have the human from the security department leave this message: To call us back, call the number on your card; then, immediately enter the following code to be directed to the right department. But they still haven't learned.

    I shudder to think what will happen when I'm eventually home when they call. I certainly won't do anything except hang up and call back the same number.

    I believe you have sufficiently illustrated the problem.

    The banks do use the same methods as phishers, despite their claims to the contrary.

    I also get voicemails from the "bank" asking me to call back, and when I call back I have to "verify my identify" through at least a couple of personal questions and at least part of my social security number. I have no way of knowing whether I have indeed called the bank, or some guy at a payphone.

    It's not so much that the customers are stupid, it's that the banks have trained customers that they must respond to these types of inquiries, or they very well may have their checks/charges declined.

    The banks created the system which is being abused. And they have done little to change their practices.

    It's hard to determine who, exactly, are the stupid ones in this situation.

  • by AriaStar ( 964558 ) on Friday April 28, 2006 @01:20PM (#15222156) Journal
    It's a form of online fraud, and I specialize in its prevention. There are two simple things to do to prevent ID/personal info theft like this. Never click a link in an e-mail. I'd say you can hover over the link and you'll see it's masked, forwarded, just plain a different site, etc., but most of the population has no clue how to read those things anyway (though I'm sure most, if not all, of you here know how to). Go directly to the company's page if you have an account with them. If they need you to "verify" info or whatever, the legit site will tell you after you've signed in. Ignore it altogether if you don't have an account with the place supposedly sending it (right now it's very common to receive things from "Chase" asking to fill out a survery and get $20). The second is to call the regular customer service number you can get through 411. An agent via that number can connect you to whoever you need. If the e-mail says to call a certain number to get hold of a certain person, an agent can help you find that person, if he/she exists and is an employee of the company. No legit institution at which you have an account will address you as, "Dear customer," or some other impersonal greeting. Always by your name. It's at the point that I believe that, if someone has their ID stolen, they deserve it. We've all heard time and again not to click on links, and yet 3-7% of people still fall for these things. Yes, the number is that high. Scary, huh?

For God's sake, stop researching for a while and begin to think!

Working...