For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine ? or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.
Now, imagine coming across your phone bill, thicker and heavier than normal. When you open it, instead of "statement stuffers" from the phone company's marketing department, the bill is dozens of pages long ending in a one-month total of almost $5,400.
A quick glance at the details reveals hundreds of calls to the same 1-900 number. "A mistake," you insist. After all, you're the only person in the house and you have never called a 900 number before. Actually, this is no mistake. In this true story, the homeowner had fallen victim to one of the oldest computer scams around: the "Auto-Dialer" virus.
How Did This Computer Security Nightmare Begin
-----------------------------------------------------------
What is an "auto-dialer"? Some time ago, the phone companies came up with a feature that allowed merchants to reach a broader range of customers by allowing consumers to make payments via your phone bill. If you did not have a credit card, you just dialed a 900 number, connected by voice or modem (for Internet sites). Every minute you used the service, you were charged a fee ranging from $1 to $5 or more per minute. At month's end, the charge appeared on the phone bill. Many services were legit: Consumers called weather, horoscope and gambling services offering this feature. But many merchants sold expensive phone or online adult content.
How Did An Auto-Dialer Get Installed
-----------------------------------------------------------
But how did $5,400 in charges end up on the person's phone bill? Although many of these services require the user to physically dial the number or connect to the online site by instructing the modem to dial the number, this can happen without the user's knowledge. In the above case, the person's computer was infected with an auto-dialer virus. Somewhere during his Web travels, he connected to a site that popped up a rather confusing message instructing him to "Hit OK" to make the message go away. What this person didn't know was he was agreeing to download,install, and execute an adult content auto-dialer.
Behind the scene, the auto-dialer installed itself, checked for the presence of a modem and dial tone, and then proceeded to dial an overseas 900 number over and over again. Even though the person surfed using an always-on broadband Internet connection, the modem remained so he could send and receive faxes. One problem: When he wasn't using the modem, it remained plugged into the phone jack. Why should he have unplugged it? It's not like it could hurt anything, right? Wrong.
How To Protect Yourself
-----------------------------------------------------------
Unfortunately, there is no single solution to avoid these types of malicious acts. A short list of protective measures would include:
1) If you no longer need a modem in your computer, remove it. Or at least disconnect the phone line from the modem;
2) Install anti-virus software such as Trend Micro or Symantec's Norton Anti-Virus. Many are designed to prevent this kind of malicious software, or "Malware." More importantly, make sure your subscription for new virus patterns is current and configured to automatically download and install updates;
3) Install and regularly run Adware protection solutions such as LavaSoft's Ad-Aware or SpyBot Search & Destroy;
4) And do not, under any circumstances, blindly hit "OK" to pop-ups or similar annoyances without first making sure what you are agreeing to.
This tale is not fiction; in fact, it happens frequently, to businesses and consumers, kids and adults. But even the least savvy among us can thwart such an attack. A neighborhood teenager recently avoided potentially thousands in fees when an auto-dialer was downloaded and installed. How? She had unplugged the modem.
About The Author
----------------
Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home business and small business computer users. Sign up for defending the nets newsletter and stay informed and empowered to stay safe on the Internet. You can reach Darren at mailto:darren.miller@paralogic.net or at mailto:defendthenet@paralogic.net
URL
---
http://www.defendingthe
net.com/NewsLetters/Auto-Dialer-Newsletter.htm
![]() |
|
![]() |
|
![]() |
|
![]() |
What is computer security? Computer security is the process of... Read More
Some months ago, before there was much publicity regarding phishing... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
In a word, no - an email message has always... Read More
Have been an Internet user for more than 9 years,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
A friend called me one day and asked if I... Read More
Only the top spyware removers are successful at detecting and... Read More
The first thing people think about when defending their computers... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Imagine my surprise when I received a phone call from... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
As the number of people using the Internet as an... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Ebay is a great site and is used by many... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
If you use emails actively in your communication, you must... Read More
There are folks out there who use their powers for... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Before we start, I want to make it clear that... Read More
There is nothing more important that password security in world... Read More
You've seen it in the news - 40 million credit... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Computer infections can be broken up into 4 main categories... Read More
Working from home has its advantages, including no commute, a... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Whether we like it or not, we are all living... Read More
If spyware were a person and he set himself up... Read More
You'd better learn news from media, not from emails, security... Read More
A couple of days ago, I was searching for a... Read More
Despite the current wave of identity theft and corporate security... Read More
When it comes to reporting Internet scams most of us... Read More
Over the past few years as the internet has become... Read More
If you are a parent, you have probably wondered at... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
As you know, this time the virus under the name... Read More
Many of us have run into an annoying and time-consuming... Read More
Every now and then you can read about a new... Read More
A friend called me one day and asked if I... Read More
Phishing is the act of some individual sending an email... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Let us take the example of scrambling an egg. First,... Read More
Watching how the traditional media covers the latest virus or... Read More
The Internet is a vast International Network of people and... Read More
As soon as almost all computer users already got used... Read More
Today,on most internet user's computers, we have the ability to... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
If spyware were a person and he set himself up... Read More
Afraid that someone is monitoring your PC or installed a... Read More
There is nothing more important that password security in world... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
History and BackgroundThe virus was one of the first ever... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Since its birth, the Internet has grown and expanded to... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
In recent days, I was one of the unfortunate persons... Read More
Much has been said on the theory of password protection... Read More
Millions of people make purchases online, but many people are... Read More
Huge number of spyware software applications are available in the... Read More
Did you know...? 1 in 5 children who use computer... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Internet Security |