As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how?
Two Pharmings
Actually, two completely different fields use the term "pharming" now. We can say there exist two separate "pharmings".
If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is a very interesting matter, this article is not about it.
As for PC users, the term "phishing" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference.
Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers.
Dangerous Scams
A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website.
Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email? Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones.
Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information.
It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively.
Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability.
However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget the advice which they all are likely to have learned by heart:
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
The company's R&D department created an innovative technology, which disables information-stealing programs. Learn more -- visit the company's website http://www.anti-keyloggers.com
When it comes to reporting Internet scams most of us... Read More
Having a good Spyware eliminator on your computer is vital... Read More
File sharing on p2p is soaring despite the music and... Read More
As you know, this time the virus under the name... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Identity theft is one of the most common criminal acts... Read More
To blog or not to blog? Well, why not? Lots... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Credit card fraud is a growing problem for online businesses... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Viruses are, however, not the only malicious software programs out... Read More
As soon as almost all computer users already got used... Read More
The first thing people think about when defending their computers... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Imagine my surprise when I received a phone call from... Read More
A new variation of the Nigerian Scam theme ... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
The money being spent online is steadily growing. With billions... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
If spyware were a person and he set himself up... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Identity Theft is one of the most serious problems facing... Read More
The top five online scams on the Internet hit nearly... Read More
This really chapped my lips...I recently bought a new computer.... Read More
If you use emails actively in your communication, you must... Read More
Today,on most internet user's computers, we have the ability to... Read More
It's late. You've been scouring the web for that perfect... Read More
Whether we like it or not, we are all living... Read More
The words Corporate Security may conjure up images of a... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
When it comes to a secure website and passwords it... Read More
Phishing is the act of some individual sending an email... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Ok, ok, I know you've seen them. All those pop... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Well, if that would have been said to me by... Read More
As the number of people using the Internet as an... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
I am the victim of an internet scam. It is... Read More
Microsoft routinely releases new security updates, many of which are... Read More
If you are a parent, you have probably wondered at... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Be careful of sites that promise to send you "instant... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Spyware is software that runs on a personal computer without... Read More
Have you ever got an email asking you to confirm... Read More
P C. owners are constantly at risk from attacks by... Read More
File sharing on p2p is soaring despite the music and... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Before you enter your name, address or any other data... Read More
When it comes to reporting Internet scams most of us... Read More
By browsing a web page, you could infect your computer... Read More
At this point, if you've got the whole "turning the... Read More
Only the top spyware removers are successful at detecting and... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Pharming is one of the latest online scams and rapidly... Read More
If you have used a Windows machine for a while,... Read More
There is nothing more important that password security in world... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Internet Security |