Izlasīju, ka kaut kāda krāpšanas shēma internetā tika realizēta caur Latvijas serveriem.
Atklāta viena no vērienīgajām interneta krāpšanas shēmām, kuru realizējusi kompānija «Real Host», nomājot serverus no Latvijas interneta pakalpojumu sniedzēja «Junik», kas tīmekļa savienojumu piedāvā caur telekomunikāciju kompāniju «Telia», vēsta finanšu laikraksts «The Financial Times».
Te arī raksta oriģināls iekš Financial Times.
The servers controlled by Real Host are used to infiltrate and gain control of personal computers as part of a “botnet” network called Zeus, the men said. Zeus has captured 3.6m PCs in the US, more than any other such network, according to security firm Damballa.
Zeus has been attributed to Rock Phish, a Russian-led gang blamed in the past for half of all the world’s “phishing” attacks, which use official-looking emails to trick recipients into giving up financial information. The Zeus-infected PCs siphon credit card and banking information directly and send them off to criminals.
Šis ir piemērs tam cik ļoti ir komercializējusies hakošana.
Speaking at InfoSecurity 2009 at Earls Court today, Moloney said, “We are seeing the commercialisation of hacking. Attackers can buy HTML injection attacks to target [customers of] specific banks.”
Loģiski, ka pie šādām cenām var atļauties arī hostēties dažādās valstīs.
An attacker can purchase a non-exclusive payload, which is attached with other attack code on a Trojan horse, for just $23 per 1000 infections. He said an exclusive payload is priced at between $130 and $270.
He said phishing attacks were on the increase. We are now seeing combined phishing and malware attacks where the user is sent to a web site which downloads a Trojan.”
For would-be fraudsters, Moleney said malware was becoming much more affordable. A high- grade Trojan like Zeus costs $1000, but hackers can buy the Limbo Trojan kit for only $350.
Šādā veidā arī top šie krāpniecības mēģinājumi izvilkt no mūsu interneta bankām lietotāju datus.