Language Selection

English French German Italian Portuguese Spanish

Security Software Company Discovers Possible ID-Theft Ring

Filed under
Security

A Florida security software company says it has stumbled across what may be a major identity-theft effort.

Sunbelt Software Inc., which makes software used to protect computers from spyware, says it has discovered a server holding passwords and other personal information that may have been illegally collected using keylogging software.

"One of our researchers here, while doing some research for our anti-spyware tool, came across a server that happened to have a file on it that turns out to be a log file from a keylogger that's been deployed, it looks like, all over the world," David Bove, Sunbelt's director of spyware research, said in an interview.

Bove wouldn't provide more details about how the server was found or where it's located. Sunbelt has contacted the FBI about the discovery, he says. The FBI didn't immediately return calls seeking comment.

Keyloggers, whether hardware- or software-based, are used to capture information typed into computers, typically without the knowledge of the computer user. Used by law enforcement, they're a valuable tool for obtaining passwords criminals use to encrypt incriminating information. Used by criminals, they're a valuable tool for emptying online bank accounts and perpetrating identity-theft fraud. Keylogging software is usually distributed through Trojan software, worms, or viruses.

In July 2003, Juju Jiang pleaded guilty in federal court to computer fraud charges for using a keylogging program called Invisible KeyLogger Stealth at a number of Kinko's locations in Manhattan. In March, the British Hi-Tech Crime Unit foiled an attempt to steal some $420 million from a London branch of Japanese bank Sumitomo Mitsui. The thieves reportedly hacked the bank's systems through information obtained from a keylogger.

Bove says the log file contains user IDs, passwords, and associated URLs, along with IM chat logs that have been captured and transmitted over the Internet by the keylogger. Whoever is responsible has been periodically harvesting the suspected stolen data and resetting the file size, he says. When the file was discovered a week ago, it had 22 Mbytes of data. It currently has 4 Mbytes and is growing at a rate of 200 Kbytes per hour, Bove says.

Sunbelt president Alex Eckelberry brought the discovery to light through a Sunbelt blog posting. "We're sitting upon literally thousands of pages of stolen identities that are being used right now," Eckelberry wrote Friday afternoon.

"There is a LOT of bank information in here, including one company bank account with over US$350,000 and another small company in California with over $11,000 readily accessible," Eckelberry wrote. "This list goes on and on and on."

"We were trying to figure out if this was real or not," Bove says. "And we actually logged into those accounts. That's how we knew how much money was in there. Then we immediately attempted to contact the individuals to let them know."

By Thomas Claburn
InformationWeek

More in Tux Machines

Gibson and Associates Solicitors: 5 Reasons to Avoid a Payday Loan

Payday loans are incredibly easy to obtain, which in theory should ring alarm bells. However, due to unemployment levels and a poor economy, thousands of people turn to payday loans to try and clear their debts immediately. Ironically, payday loans often cause people's debt problems to escalate instead of acting as a quick solution.

People usually use payday loans as a short term solution to financial difficulty. These loans are typically advertised as ‘convenient' for those who are struggling to survive before their next pay slip.

Payday loans are increasingly becoming controversial and here are 5 reasons why:

They're Expensive

All loans are expensive to pay off. No matter how much money you borrow if you miss repayments or decide to extend the loan, what was a small loan can turn very expensive as interest and bank charges are applied.

High-Interest Rates

Interest rates for payday loans are huge. Some lenders charge interest rates of more than 4,000% and if this is rolled over, debts can quickly escalate.

Lenders are keen to describe the way an APR is calculated. APR is generally not designed for short-term lending, thus reducing the loan period means the interest rate goes up. As a result, consumers are unsure of how to compare the correct costs of the various loans available.

They Target the Vulnerable

Sceptics claim that lenders appear to target the most vulnerable borrowers, arguing that lenders are not completing proper affordability checks on debtor's before granting them the loans. In some cases, lenders have encouraged consumers to borrow more money than they need.

Most lenders will happily allow you to continue borrowing from one month to the next. People who cannot afford to pay off the loans by the agreed date will run serious risk of their debt spiralling out of control. Before they know it they will owe more money than they initially borrowed due to large interest rates alone.

Hidden Charges

When you sign up for a payday loan you will usually agree on a date to pay back the loan which typically falls on or after payday. During the agreement you will provide the loan company with your bank details. If you continue to miss payments, interest will continue to be taken out of your account each month which can easily escalate. You may also need to pay bank charges if you exceed your overdraft limit.

Fraud

Fraudsters are aware that people are desperate to find an immediate solution to their financial worries, providing them with the perfect opportunity to violate vulnerable people.

Taking out a payday loan requires you to disclose confidential information such as your bank details and address. You'll be surprised at how many illegimate payday loan sites are now on the internet asking for your most confidential details, when they do not even provide their own basic contact details - suspicious. However, when people are desperate and vulnerable they often see past these warning signs. Chances are these sites are fraudsters attempting to steal your personal details.

How Gibson & Associates Can Help You Write Off Your Debt

If you have a debt which you cannot repay, it is important that you speak to a solicitor so that they can explain the options available to you. At Gibson & Associates Solicitors, there are a number of ways we can help relieve you from your debt.

Legal experts at our firm are professional and sensitive and understand what a distressing time this must be for you. We will work with you to provide the best solution, easing the financial burden hanging over you.

Additional Services: Shannon & Associates Independent Accounting and Consulting Firms

While we're known for our expertise in the fields of accounting, auditing, taxes, employee benefits and accounting software, we offer a broad range of other services to complement your business's financial needs. That's because we function not only as your accounting firm but your management consultant as well. Our supplemental services include:

Business succession planning: We'll do your succession planning and transactions without the need for an outside appraiser.

Other accounting and financial services include:

• Estate tax compliance

• Mergers and acquisitions

• Fraud prevention and efficiency

• Employee recruitment

• Organizational structure analysis

• Strategic planning

• Cash flow projections

• Due diligence

• Financing options

• Management and CEO consulting

• Wealth management

• Cost segregation

For more information about any of these management consultant services, simply contact us.

Shannon & Associates is committed to your success.

Snappy Ubuntu Core takes off in a quadcopter

Erle Robotics has launched an Ubuntu Core “Snappy” version of its open source Linux and ROS-based Erle-Copter quadcopter, with Erle-Copter app store access. The “Erle-Copter Ubuntu Core Special Edition” is functionally almost identical to the Erle-Copter quadrotor drone announced by Erle Robotics in December, but instead of the usual Debian Linux distribution, it offers one of the first implementations of the lightweight new Snappy version of Ubuntu Core. Read more

There's No Plans for Ubuntu Phones Based on Ubuntu 15.10 (Wily Werewolf), Says Canonical

Now that Ubuntu 15.10 (Wily Werewolf) is open for development, and the Ubuntu Online Summit for Ubuntu 15.10 takes place these days between May 5-7 on the UbuntuOnAir channel, the Ubuntu Phone team announced plans for the next Ubuntu Touch development cycle. Read more