For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine ? or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.
Now, imagine coming across your phone bill, thicker and heavier than normal. When you open it, instead of "statement stuffers" from the phone company's marketing department, the bill is dozens of pages long ending in a one-month total of almost $5,400.
A quick glance at the details reveals hundreds of calls to the same 1-900 number. "A mistake," you insist. After all, you're the only person in the house and you have never called a 900 number before. Actually, this is no mistake. In this true story, the homeowner had fallen victim to one of the oldest computer scams around: the "Auto-Dialer" virus.
How Did This Computer Security Nightmare Begin
-----------------------------------------------------------
What is an "auto-dialer"? Some time ago, the phone companies came up with a feature that allowed merchants to reach a broader range of customers by allowing consumers to make payments via your phone bill. If you did not have a credit card, you just dialed a 900 number, connected by voice or modem (for Internet sites). Every minute you used the service, you were charged a fee ranging from $1 to $5 or more per minute. At month's end, the charge appeared on the phone bill. Many services were legit: Consumers called weather, horoscope and gambling services offering this feature. But many merchants sold expensive phone or online adult content.
How Did An Auto-Dialer Get Installed
-----------------------------------------------------------
But how did $5,400 in charges end up on the person's phone bill? Although many of these services require the user to physically dial the number or connect to the online site by instructing the modem to dial the number, this can happen without the user's knowledge. In the above case, the person's computer was infected with an auto-dialer virus. Somewhere during his Web travels, he connected to a site that popped up a rather confusing message instructing him to "Hit OK" to make the message go away. What this person didn't know was he was agreeing to download,install, and execute an adult content auto-dialer.
Behind the scene, the auto-dialer installed itself, checked for the presence of a modem and dial tone, and then proceeded to dial an overseas 900 number over and over again. Even though the person surfed using an always-on broadband Internet connection, the modem remained so he could send and receive faxes. One problem: When he wasn't using the modem, it remained plugged into the phone jack. Why should he have unplugged it? It's not like it could hurt anything, right? Wrong.
How To Protect Yourself
-----------------------------------------------------------
Unfortunately, there is no single solution to avoid these types of malicious acts. A short list of protective measures would include:
1) If you no longer need a modem in your computer, remove it. Or at least disconnect the phone line from the modem;
2) Install anti-virus software such as Trend Micro or Symantec's Norton Anti-Virus. Many are designed to prevent this kind of malicious software, or "Malware." More importantly, make sure your subscription for new virus patterns is current and configured to automatically download and install updates;
3) Install and regularly run Adware protection solutions such as LavaSoft's Ad-Aware or SpyBot Search & Destroy;
4) And do not, under any circumstances, blindly hit "OK" to pop-ups or similar annoyances without first making sure what you are agreeing to.
This tale is not fiction; in fact, it happens frequently, to businesses and consumers, kids and adults. But even the least savvy among us can thwart such an attack. A neighborhood teenager recently avoided potentially thousands in fees when an auto-dialer was downloaded and installed. How? She had unplugged the modem.
About The Author
----------------
Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home business and small business computer users. Sign up for defending the nets newsletter and stay informed and empowered to stay safe on the Internet. You can reach Darren at mailto:darren.miller@paralogic.net or at mailto:defendthenet@paralogic.net
URL
---
http://www.defendingthe
net.com/NewsLetters/Auto-Dialer-Newsletter.htm
There has not been a time in the history of... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Phishing is the act of some individual sending an email... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Imagine this ? you open up your email box and... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Since its birth, the Internet has grown and expanded to... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
There is nothing more important that password security in world... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
There are several basic concepts to keep in mind when... Read More
You can detect spyware online using free spyware cleaners and... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Pharming is one of the latest online scams and rapidly... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
A couple of years back, I paid my dues the... Read More
When surfing the Internet you probably take your anonymity for... Read More
Some months ago, before there was much publicity regarding phishing... Read More
There you are busily typing away on your PC or... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Can you protect your computer from all possible viruses and... Read More
We all get the odd virus now and then, but... Read More
If you use emails actively in your communication, you must... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Every now and then you can read about a new... Read More
You'd better learn news from media, not from emails, security... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
It has been said that with the wealth of information,... Read More
If you are a parent, as am I, I think... Read More
Ok, you've got a computer, and you get online. You... Read More
Ebay is a great site and is used by many... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
While clicking from site to site on the internet you... Read More
As soon as almost all computer users already got used... Read More
You and I are a lot alike. We are both... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
If you have used a Windows machine for a while,... Read More
Identity Theft is one of the most serious problems facing... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Can you protect your computer from all possible viruses and... Read More
Identity theft is one of the most common criminal acts... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
When we think of adware, what comes to mind are... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Ebay is a great site and is used by many... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Huge number of spyware software applications are available in the... Read More
There has not been a time in the history of... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
You've seen it in the news - 40 million credit... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
There are folks out there who use their powers for... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Imagine this ? you open up your email box and... Read More
Ok, ok, I know you've seen them. All those pop... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Sooner or later everyone with an email account will receive... Read More
There is no doubt that "how-to articles" have become a... Read More
Fishing on the Internet has come a long way. However,... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Working from home has its advantages, including no commute, a... Read More
Over the past few years as the internet has become... Read More
By browsing a web page, you could infect your computer... Read More
This is the second in a series of articles highlighting... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Internet Security |