Huge identity theft ring discovered by spyware research



Sunbelt blog, reports that they have uncovered a MASSIVE amount of personal data, ranging from usernames to passwords to banking information and much more while investigating spyware. They found keylogger transcript software with lots of personal information. Sunbelt develops software to protect against spam and spyware and other security threats. A keylogger is software that records every keystroke on a computer and these days usually uploads that data to a server for someone to peruse.

The FBI has been notified and was working on the issue already, some of those affected, but according to the post, THOUSANDS of pages of stolen identities are in their possesion.

According to another writeup at arstechnica…. it looks as though they were investigating coolwebsearch (one of the slime of the spyware world.) During the course of his research, the investigator found that with coolwebsearch (CWS) his machine became a spam zombie and was communicating with a remote server. On investigation he found that thousands of machines were pinging back to the server, the keylogger file was growing daily. Also, he says this was more sophisticated with PHP scripted pages to give the criminals reports and a special upload area.

To quote a further update “This piece ofspyware collected your protected storage info plus URLs, chat activity and website usernames and passwords. The real problem with this spyware was that it collected this information and posted it back to a public website that anyone could go to and read all of your personal information. Some examples of this include all the credit card info entered on HTML forms while purchasing something online. It did not matter that the webpage was using HTTPS.

This website had collected over 500 different computers very private information within a 24 hours period. Including chat activity and login info to online bank accounts. One company had over $380,000 in a compromised account. The information was not the normal info collected for hacking purposes. It was collected to steal your money, SSN, credit card info, address, and identity. We have already found two variants of this spyware with multiple locations for its stolen info upload. We are working with the FBI and Secret Service to track everything back to the source.”

I’ve run across coolwebsearch before and found it fairly invasive (default blank page rewritten in the dll file that explorer calls the about:blank from among other things). (If I recall correctly.) Hopefully someone gets nailed to the wall for this. Unfortunately, I’m afraid it’s just the tip of the iceburg on the spyware front. I’m glad to be running linux. Linux isn’t impervious, but it is not currently targetted by spyware writers. Additionally, it does typically have a different security structure than windows. Ultimately though, it will likely come down to people making intelligent choices about what software to install. (Life will go on without animated smileys from who knows where….)

In a Saturday update they clarify that they’re investigating if it is related to CWS (Coolwebsearch) or not.

Related Posts

Blog Traffic Exchange Related Posts
  • List of Open Source software Packages The following is long, but likely not complete. This is a list of open-source software packages: Computer software licensed under an open-source license. Software that fits the Free software definition may be more appropriately called free software; the GNU project in particular objects to their works being referred to as......
  • How to Remove ReAnti | ReAnti Removal Guide ReAnti is a rogue antivirus application from the Wini family. It is typically promoted through supposed flash player updates or video codec updates. Once on your system it will pretend to run a scan and find all sorts of files that it claims are infected with viruses. Of course, like......
  • Warning - old wolf in sheeps clothing cloned... Our "good friend" spyaxe, which is one of the "wolves in sheeps clothing" that masquerade as security software, but in actuality are delivered WITH spyware, has a new clone. Apparently SpywareStrike is making the rounds, and has a website which is identical to the SpyAxe site and it looks to......
Blog Traffic Exchange Related Websites
  • How To Select Stamp Collecting Software [/caption]There are many programs out there that stamp collectors have to choose from. So many collectors are left wondering how select stamp collecting software. We will go over some things to consider and features offered by different types of software. This should help you select the package that is right......
  • How Software Can Help Determine Coin Collection Value Everywhere you turn things are going high tech. Cars have navigation systems in them which will tell you where to turn. Phones can tell you where the nearest hot spot is. Your computer can tell you what your coin collection value is. This last one is something which even many......
  • FFmpeg Hosting And Video Websites FFmpeg web hosting: What is it and how exactly does it work? An ever growing number of webmasters are using FFmpeg hosting plans to create video sharing sites which attract tons of visitors looking for informative and entertaining video content. See what FFmpeg web hosting is and why you may......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Huge identity theft ring discovered by spyware research”

  1. Avery J. Parker - Web site hosting and computer service Says:


    [...] Over at the Security Fix, Brian Krebs is talking about spyware and the fact that keeping up-to-date on patches, and running current antivirus with current definitions is not enough to protect your machine from spyware. He sums it up by saying common sense is the best defence. Through the course of the article he hits on a couple points that have made the news lately. One of which is the Sunbelt discovery of a massive identity theft ring, which is mentioned in several postings here, and here. [...]


Switch to our mobile site