Home > Identity Theft > Bin Phishin’?

Comments 0 Comments

Last week, the President and Commander in Chief announced something many Americans had been anticipating (though less and less, as time passed) for nearly a decade. Osama bin Laden, the person responsible for the single largest murder of Americans in history had been found and summarily executed in a stunningly efficient covert operation carried out by the Navy Seals.

Not everyone reacted with the same celebratory response seen outside the White House and at Ground Zero. Bin Laden’s acolytes immediately threatened revenge, and some Pakistanis wondered just how a James Bond-like attack could have been carried out on their soil without their knowledge. (Perhaps they should be wondering how the most wanted man in the world could have been living the high life in their midst for almost five years.) For others, the news created an opportunity.

Within 24 hours of the President’s newscast announcing bin Laden’s death, email inboxes started receiving predictable bin Laden-related spam. The two most common subject lines I’ve seen are “Osama bin Laden captured!” and “Osama hanged!” Each purports to contain a photo attachment of the killing. These are intriguing offers, considering the U.S. government has yet to release a photo of the late bin Laden (and that he died by gunshot, not by noose).

[Article: Playstation Invasion—Child Identity Theft is No Game]

Needless to say, the attachment is a complete fraud. This is not to say that it’s one of the many phony Photoshop images with which the web is rife these days.  Rather, there is no photo at all—only a virus. I’ve personally seen at least two distinct iterations in this first spam wave (yes, there is a second wave): one email attachment that simply destroys your hard drive, and another that installs a nasty tracking worm.

While security researchers investigate who is wiping out hard drives, it’s probably safe to say that whoever is sending the tracking worms is after email contact lists, online bank or retail account information, birthdays, Social Security Numbers, physical addresses, or anything else that could fill in the blanks of your financials or your life for an identity thief.

The senders of these emails purport to be organizations sounding vaguely patriotic, and at least one claiming to the FBI. Predictably, the second wave followed the first almost immediately. This more sophisticated round of phishing attacks was marked by better grammar and spelling, and relied on emails that purported to have come from a person the potential victim would know—obviously someone whose address book had already been compromised. Some of these second-wave emails were even more clever; not only were they spelled correctly and came from someone the recipient knows—they actually “warned” of bin Laden-related phishing scams! In cases like these, the attachment is labeled something like “CNN: watch for fake bin Laden emails.”

[Article: The End of Digital Innocence—What Does the Epsilon Breach Mean?]

Further, many of the second wave emails have links to Facebook and Twitter accounts, quite possibly to YOUR Facebook or Twitter account! Phishing attacks are commonly being geared toward Facebook, Twitter, and perhaps other social networking sites. In fact it appears identity thieves have learned to post their malware on the pages of innocent people.

Like a virus of the physiological kind, the scams and the malware they contain mutate very, very quickly. They become more sophisticated, more credible, and more targeted with each successive wave. These mutations are possible because identity thieves have so much information available to them that the really clever ones can correlate facts in order to make their attacks more likely to succeed.

Their success rate will inevitably become much higher as data thefts on a grand scale continue to happen every week. We are being surrounded, and they are closing in for the kill. The more data that is available to the thieves, the more likely it becomes that you will one day open the wrong attachment. If a thief has your email address and date of birth from one data breach, your email and the fact that you visit a veterans’ hospital from a different data breach, it may be safe to assume—and the thief certainly will—that you would be particularly interested in those bin Laden photos. Unfortunately, the assumption we need to make is that to the extent we use the web for commercial or social networking purposes, some identity thief somewhere has at least some information about us.

Bin Phishin’? (cont.) »

Image: Lenore Edman, via Flickr.com

Pages: 1 2

Comments on articles and responses to those comments are not provided or commissioned by a bank advertiser. Responses have not been reviewed, approved or otherwise endorsed by a bank advertiser. It is not a bank advertiser's responsibility to ensure all posts and/or questions are answered.

Please note that our comments are moderated, so it may take a little time before you see them on the page. Thanks for your patience.

Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them.

Hello, Reader!

Thanks for checking out Credit.com. We hope you find the site and the journalism we produce useful. We wanted to take some time to tell you a bit about ourselves.

Our People

The Credit.com editorial team is staffed by a team of editors and reporters, each with many years of financial reporting experience. We’ve worked for places like the New York Times, American Banker, Frontline, TheStreet.com, Business Insider, ABC News, NBC News, CNBC and many others. We also employ a few freelancers and more than 50 contributors (these are typically subject matter experts from the worlds of finance, academia, politics, business and elsewhere).

Our Reporting

We take great pains to ensure that the articles, video and graphics you see on Credit.com are thoroughly reported and fact-checked. Each story is read by two separate editors, and we adhere to the highest editorial standards. We’re not perfect, however, and if you see something that you think is wrong, please email us at editorial team [at] credit [dot] com,

The Credit.com editorial team is committed to providing our readers and viewers with sound, well-reported and understandable information designed to inform and empower. We won’t tell you what to do. We will, however, do our best to explain the consequences of various actions, thereby arming you with the information you need to make decisions that are in your best interests. We also write about things relating to money and finance we think are interesting and want to share.

In addition to appearing on Credit.com, our articles are syndicated to dozens of other news sites. We have more than 100 partners, including MSN, ABC News, CBS News, Yahoo, Marketwatch, Scripps, Money Magazine and many others. This network operates similarly to the Associated Press or Reuters, except we focus almost exclusively on issues relating to personal finance. These are not advertorial or paid placements, rather we provide these articles to our partners in most cases for free. These relationships create more awareness of Credit.com in general and they result in more traffic to us as well.

Our Business Model

Credit.com’s journalism is largely supported by an e-commerce business model. Rather than rely on revenue from display ad impressions, Credit.com maintains a financial marketplace separate from its editorial pages. When someone navigates to those pages, and applies for a credit card, for example, Credit.com will get paid what is essentially a finder’s fee if that person ends up getting the card. That doesn’t mean, however, that our editorial decisions are informed by the products available in our marketplace. The editorial team chooses what to write about and how to write about it independently of the decisions and priorities of the business side of the company. In fact, we maintain a strict and important firewall between the editorial and business departments. Our mission as journalists is to serve the reader, not the advertiser. In that sense, we are no different from any other news organization that is supported by ad revenue.

Visitors to Credit.com are also able to register for a free Credit.com account, which gives them access to a tool called The Credit Report Card. This tool provides users with two free credit scores and a breakdown of the information in their Experian credit report, updated twice monthly. Again, this tool is entirely free, and we mention that frequently in our articles, because we think that it’s a good thing for users to have access to data like this. Separate from its educational value, there is also a business angle to the Credit Report Card. Registered users can be matched with products and services for which they are most likely to qualify. In other words, if you register and you find that your credit is less than stellar, Credit.com won’t recommend a high-end platinum credit card that requires an excellent credit score You’d likely get rejected, and that’s no good for you or Credit.com. You’d be no closer to getting a product you need, there’d be a wasted inquiry on your credit report, and Credit.com wouldn’t get paid. These are essentially what are commonly referred to as "targeted ads" in the world of the Internet. Despite all of this, however, even if you never apply for any product, the Credit Report Card will remain free, and none of this will impact how the editorial team reports on credit and credit scores.

Your Stories

Lastly, much of what we do is informed by our own experiences as well as the experiences of our readers. We want to tell your stories if you’re interested in sharing them. Please email us at story ideas [at] credit [dot] com with ideas or visit us on Facebook or Twitter.

Thanks for stopping by.

- The Credit.com Editorial Team