News.com Mobile
for PDA or phone
Login: Forgot password? | Sign up

Online scammers go spear-phishin'

By Timothy L. O'Brien
The New York Times
Published: December 4, 2005, 4:45 PM PST

About a year and a half ago, Amnon Jackont, an Israeli mystery novelist and Tel Aviv University history professor, became ensnared in a mystery of his very own: friends and students were receiving e-mail messages from him that he had never written.

A few months later, unpublished paragraphs and chapters from a book he was writing were plucked from his computer and began appearing on Israeli Web sites.

Jackont took his computer to the Israeli police last fall and was told to reformat it. But his problems persisted. So the police examined his computer more closely and discovered that a malicious program known as a Trojan horse lay hidden deep inside and had hijacked the machine from a remote location.


New York Times

For the latest breaking news, visit NYTimes.com

Sign up to receive top headlines

Get Dealbook, a daily corporate finance email briefing

Search the jobs listings at NYTimes.com

Search NYTimes.com:


"When they followed the link they found a lot of goodies, but they wouldn't tell me anything," Jackont said. "All they told me was that they found something big, something that was bigger than just me being harassed."

In May, Israeli investigators opened their bag of goodies, disclosing that the Trojan horse on Jackont's computer had also galloped onto the networks of about 60 other Israeli companies, unleashing the biggest corporate espionage scandal in Israeli history. Prosecutors indicted members of three of the country's largest private investigation firms on criminal fraud charges in July. And some of Israel's most prestigious corporations are now under investigation for possibly stealing information from companies in such assorted fields as military contracting, telephony, cable television, finance, automobile and cigarette importing, journalism and high technology.

While the Israeli victims were diverse, they shared one thing in common: the Trojan horses that penetrated their computers came packaged inside a compact disc or an e-mail message that appeared to be from an institution or a person that the victims thought they knew very well. Once the program was installed, it whirred along surreptitiously, logging keystrokes or collecting sensitive documents and passwords before transmitting the information elsewhere.

"It's like the Yom Kippur War or Pearl Harbor in the Israeli business market because of the great surprise the victims had when the problem was exposed," said Haim Wismonsky, a senior prosecutor in the Tel Aviv district attorney's office who is overseeing the investigation. "It's OK to get information about competitors from the Internet or from former employees, but using Trojan horses is an entirely other matter."

People in many other countries, including the United States, have reason to feel queasy as well, say Internet security specialists and government agencies that monitor cyberfraud. Over the last few years, enticing offers wearing the friendly guise of e-mail solicitations have been at the center of well-publicized frauds known as "phishing," in which con artists troll online for valuable personal and financial information. In September, the Anti-Phishing Working Group, a coalition of corporate and law enforcement groups that track identity theft and other online crimes, said it had received more than 13,000 unique reports of phishing schemes in that month alone, up from nearly 7,000 in the month of October last year.

A new threat emerges
More recently, however, a hybrid form of phishing, dubbed "spear-phishing," has emerged and raised alarms among the digital world's watchdogs. Spear-phishing is a distilled and potentially more potent version of phishing. That's because those behind the schemes bait their hooks for specific victims instead of casting a broad, ill-defined net across cyberspace hoping to catch throngs of unknown victims.

Spear-phishing, say security specialists, is much harder to detect than phishing. Bogus e-mail messages and Web sites not only look like near perfect replicas of communiqués from e-commerce companies like eBay or its PayPal service, banks or even a victim's employer, but are also targeted at people known to have an established relationship with the sender being mimicked.

 23 comments
Post a comment

TalkBack

Remember Those Intel Pentium S/Ns?

Mark Doiron   Dec 6, 2005, 12:24 PM PST

Israeli Trojan

Willy Kreim   Dec 5, 2005, 1:08 PM PST

Not sure

Jim Cho   Dec 5, 2005, 11:35 AM PST

Reinfected?

Kyle Miles   Dec 5, 2005, 10:11 AM PST

It's Social Engineering Not Windows

Garth Honhart   Dec 5, 2005, 8:26 AM PST

They know MAC users...

Yutimyshu Itiushu   Dec 5, 2005, 7:41 AM PST

Windows is THE problem

J Tilney   Dec 5, 2005, 3:48 AM PST

Be fair...

Joshua Ketelsen   Dec 4, 2005, 7:02 PM PST

Things the victims had in common...

Chris Habig   Dec 4, 2005, 6:05 PM PST


Did you know?

Select a tab below to set your default view.

Scan the 15 newest and most read stories on News.com right now. Learn more

Updated: 12:19 AM PST
View as:
New IM worm chats with intended victims Is the PowerPC due for a second wind? Itanium: A cautionary tale Glaser turns wrath on Apple, Jobs Do Xbox glitches belong in court? New Sony CD security risk found Can there be another Google? Gartner's advice: Halt BlackBerry deployments Microsoft offers a new angle on maps Feds side with Microsoft in Korea flap Tech executives: Time is of the essence ICANN told to clamp down on dodgy domain names ID theft fears overblown, study says Duffield estate plans get makeover Virgin Mobile board rejects NTL offer
Legend:
Older
Newer
Larger boxes indicate hotter stories.

Resource center from News.com sponsors

Concerned About Computer Security?

Education is the best defense

Computer security threats are part of daily life. But today's malware techniques present unprecedented challenges for businesses of all sizes. Learn how to protect yourself.

Learn from the experts>>

Top picks from News.com readers

Readers who read Online scammers go spear-phishin' also read...

More Info

Daily spotlight

Perspective: I want my BlackBerry

Attorney Eric Sinrod hopes that the courts won't take away his PDA. If they do, will he and others flock to RIM competitors?

Video: Calendar goes open source

OSA Foundation President Mitchell Kapor says Chandler, a free calendar software, could follow in the footsteps of Firefox.

Photos: New animal discovered in Borneo

A creature that looks like a cross between a cat and a fox is photographed in the rainforest.

Tech execs: Time
is of the essence

Technologists want to help you manage your time by overhauling the wall calendar.

Photos: Harnessing the wind

Wind turbines provide significant amounts of energy using only the natural power of the wind.

Greenpeace: HP stands for 'harmful products'

Demonstrating at HP headquarters, group calls for ban on brominated flame retardants.

Sony's Qrio does the robot rock

Thanks to Beck's new video, Qrio, a robot manufactured by Sony, is now a rising cyberstar.

Video: Ray Ozzie on 'calendaring'

Microsoft exec talks about bringing a two-way version of RSS to calendaring, and then admits to using paper for some purposes.

Ozone hole living longer than expected

Keep that sunscreen handy. The hole in the ozone layer will last 15 years longer than expected, scientists say.

Photos: The little Mars rovers that could

For far longer than anyone expected, Spirit and Opportunity have been exploring the red planet.
Signs of fatigue--and water

Photos: Moons over Saturn

The Cassini spacecraft delivers some new photos of the ringed planet's unusual moons.

Videos: Sun unleashes Niagara servers

At a press event in New York, Sun Microsystems unveils the Sun Fire T2000 and T1000 servers.


CNET.com
Copyright ©2005 CNET Networks, Inc. All Rights Reserved. Privacy Policy | About CNET Networks | Jobs | Terms of Use