<br />
<b>Deprecated</b>:  Function create_function() is deprecated in <b>/home/hidefide/public_html/blog/wp-content/plugins/wr-pagebuilder/core/core.php</b> on line <b>127</b><br />
{"id":401,"date":"2017-07-15T15:06:06","date_gmt":"2017-07-15T15:06:06","guid":{"rendered":"https:\/\/icaruspressblog.wordpress.com\/?p=401"},"modified":"2019-04-17T11:49:29","modified_gmt":"2019-04-17T11:49:29","slug":"spammers-loosen-up-become-more-dangerous","status":"publish","type":"post","link":"https:\/\/hidefideas.com\/blog\/2017\/07\/15\/spammers-loosen-up-become-more-dangerous\/","title":{"rendered":"Spammers Loosen Up, Become More Dangerous"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-295 alignright\" src=\"http:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/danger-internet-11.jpg\" alt=\"danger-internet (1)\" width=\"338\" height=\"241\" srcset=\"https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/danger-internet-11.jpg 500w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/danger-internet-11-300x214.jpg 300w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/danger-internet-11-210x150.jpg 210w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/>Uh-oh. <em>Welcome to my lair, said the spider to the fly.<\/em> And we all know how that worked out: spider meets fly, fly gets busy with spider, spider eats fly. Ick. And if you haven\u2019t been following the most recent exploits of those intrepid spammers \u2013 <!--more-->you know the ones, the ones who annoy, invade, attempt to steal and generally bug the hell out of us \u2013 then be prepared to say double ick.<\/p>\n<p>This week, several media outlets are <a href=\"http:\/\/www.net-security.org\/secworld.php?id=13236\">reporting a change<\/a> in the way spammers do their, uhm, business, and&nbsp; if the reports are true, it looks like the scam artists are easing up on those <a href=\"http:\/\/www.allspammedup.com\/2012\/06\/sweet-home-nigeria\/\">predictably bad appeals<\/a> aimed at only the most vulnerable among us. Typically, your average spammer relies on the stupidity and\/or ignorance of the recipient, requiring the person reading the mail to pry open the mouth of the lion and stick his head in. Usually based on a theme requiring some urgency, these e-mails attempt to scare the user into thinking that the tax man is about to seize his house, shut down his PayPal account or permanently block him from purchasing fake Viagra. It\u2019s a scheme that fails to snare most of us, but when someone does get fooled by these messages, the results can be disastrous.<\/p>\n<p>Fortunately, most of us have been able to rest easy in the knowledge that these things can be spotted by a blind man from a mile away. Poor grammar, egregious misspelling and suspicious-looking pages that clearly don\u2019t belong to the pretended institution; all clear giveaways that can be easily spotted by spam filters and dumped in the trash. Now, however, the buzz on the street is unsettling and a little creepy, if you stop to think about the implications.<\/p>\n<p>Researchers are saying that the <a href=\"http:\/\/www.webopedia.com\/TERM\/B\/blackhole_exploit_kit.html\">Blackhole exploit kit<\/a>, purported to be the most popular web threat in terms of usage, is being used in conjunction with smarter and more believable spam e-mails to douse any unfortunate user who clicks a link with a tidal wave of harsh reality. Blackhole, developed in Russia and licensed out to any enterprising young scammer who wishes to purchase it, is based on PHP and MySQL and uses malicious links fueled by JavaScript to identify and take advantage of security flaws on the target computer. Blackhole appeared in 2010 and sells for $1,500 for an annual license. To date, the most successful Blackhole exploit is said to be a hack of the US Postal Service\u2019s Rapid Information Bulletin Board System (RIBBS) in April 2011.<\/p>\n<p>According to Help Net Security, the most popular use of Blackhole is the impersonation of \u201csocial networking sites (Facebook, LinkedIn, MySpace), e-payment and e-commerce companies (PayPal, eBay), airlines (US Airways, Delta Airlines), financial institutions (AmEX, Citibank, Bank of America) and logistics services companies such as FedEx, UPS, etc.\u201d<\/p>\n<p>Unlike \u2018traditional\u2019 spam e-mails, which often convey a sense of urgency, recent spam methods are looser, according to the same article. \u201cThe phishing messages of today have far less urgency and the message is implicit: \u2018Your statement is available online\u2019; or \u2018Incoming payment received\u2019, or \u2018Password reset notification.\u2019\u201d The implication, of course, is that users may be lulled into a false sense of security by something that doesn\u2019t threaten unreasonable earth-shattering consequences&nbsp; if the user doesn\u2019t act immediately.<\/p>\n<p>According to the researchers, this new use of e-mail spam creates \u201cdifficulties for traditional antispam methods. Content-based filters, for instance, have a problem with the attacks because these use modified versions of legitimate emails, making detection and blocking more difficult to do.&#8221;<\/p>\n<p>This newer, looser approach to spam e-mail, combined with links to Blackole infested sites, ups the ante for IT professionals, since users need to be aware that just because a spam e-mail looks more legitimate \u2013 say, than one which uses poor writing and bad grammar \u2013 it\u2019s no safer to click on links in e-mails that purport to be from a financial institution, or a social media site for which they happen to have an active account. Humans are creatures of habit, and if they happen to read an e-mail that looks exactly like a legitimate e-mail that they may have received in the past, they\u2019re more apt to click the link without a second thought.<\/p>\n<p>As always, user education is paramount. If you\u2019re holding an information session with your staff, fabricate an e-mail from a legitimate site, swapping out the link for something else. Show them how a link can say one thing but be something totally different, using simple techniques like hovering over the link to see its true nature. And, as always, tell them to stop and think about what they\u2019re doing before they click.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uh-oh. Welcome to my lair, said the spider to the fly. And we all know how that worked out: spider meets fly, fly gets busy&hellip; <\/p>\n","protected":false},"author":3,"featured_media":295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[11,9,10,8,7],"class_list":["post-401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-spam","tag-allspammedup","tag-bot","tag-botnet","tag-malware","tag-spam","jsn-master"],"_links":{"self":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/comments?post=401"}],"version-history":[{"count":3,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/401\/revisions"}],"predecessor-version":[{"id":1799,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/401\/revisions\/1799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media\/295"}],"wp:attachment":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media?parent=401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/categories?post=401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/tags?post=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}