Skip to main content

Phishing campaign uses VoIP to target dozens of banks, steal card data

  • April 29, 2014
  • 1 reply
  • 518 views

Petrovic
Gold VIP
Forum|alt.badge.img+52
Criminals in Eastern Europe have targeted dozens of U.S. banks over the past few years with an elaborate phishing scheme designed to capture victims' payment card data.
According to PhishLabs, a Charleston, S.C.-based cyber crime prevention firm, the fraudsters are currently compromising as many as 400 payment cards per day through “vishing” attacks, a social engineering ruse that phishes individuals via voice over internet protocol (VoIP) technology.
 
In the campaign, scammers use email-to-SMS gateways to pose as legitimate financial institutions by spamming bank customers with text messages, a Tuesday blog post by PhishLabs CEO John LaCour said.
The messages direct recipients to call their bank to reactive their payment card, but victims who call the number actually reach an interactive voice response (IVR) system set up by attackers, which requests their card and PIN number. With the stolen card data, members of the gang use the information to make online or phone purchases, or withdraw cash from ATMs using counterfeit cards, the firm revealed.
 
Full Article

1 reply

The following is a updated article on Phishing Campaigns
 
{Number and diversity of phishing targets continues to increase}
 
By/ HNS Staff/ Posted on 01 July 2014
 
The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest years for phishing on record, and Q1 2014 perpetuated that trend posting the second-highest number of phishing attacks ever recorded in a first quarter.

The APWG detected an average of 41,738 new phishing attacks per month in the first quarter. January saw a temporary rash of phishing on virtual servers; these phishing attacks use a technique where a cybercriminal creates and hosts phishing pages on multiple unique domains all hosted on a compromised Web server.
 


 
 
Help Net Security/ Full Read Here/ http://www.net-security.org/secworld.php?id=17070

Reply