RSA, the security division of EMC, has uncovered a new phishing kit being sold and used online by fraudsters.
This new kit, a Universal Man-in-the-Middle Phishing Kit, is designed to facilitate new and sophisticated attacks against global organisations in which the victims communicate with a legitimate website via a fraudulent URL set by the fraudster. This allows the fraudster to capture victims’ personal information in real-time, said
RSA’s analysts researched and analysed a demo of the kit that was being offered as a free trial on one of the online fraudster forums that RSA’s 24×7 Anti-Fraud Command Center (AFCC) monitors regularly.
Using the Universal Man-in-the-Middle Phishing Kit, the fraudster creates a fraudulent URL via a simple and user-friendly online interface. This URL communicates with the legitimate website of the targeted organisation in real-time – whether it is the online banking site of a financial institution, the order tunnel of an ecommerce company, or any other such business transacting with its users online. The victim receives a “standard” phishing email, and when clicking on the link s/he is directed to the fraudulent URL. The victim then interacts with genuine content from the legitimate website – which has been “imported” by the attack into the phishing URL – thus allowing the fraudster seamless, invisible and immediate access to the victim’s personal information.
RSA’s analysts have identified two primary benefits that fraudsters using this kit are set to reap:
* It is a “universal” phishing kit, meaning it can easily be configured per target. Fraudsters who want to initiate a phishing attack do not have to purchase or prepare a custom phishing kit for each target. Once they acquire and operate this kit, the attack can be configured to “import” pages from any target website.
* Unlike standard phishing attacks, which only collect specific requested data (typically login and card-related credentials), this attack is designed to intercept any type of credentials submitted to the site after the victim has logged into his account as well.
The RSA 24×7 Anti-Fraud Command Center handles this attack in a similar fashion to the way it deals with “standard” phishing attacks – relying on a broad monitoring and detection network, its broad blocking network, as well as industry-leading experience in site shutdown – as it does for more than 150 customers of its FraudAction anti-phishing, anti-pharming service. And, uniquely, RSA can further identify, analyse and mitigate this specific type of attack via the RSA eFraudNetwork community – the company’s cross-institution anti-fraud network – by leveraging sophisticated analytics in the RSA Risk Engine to further protect customers that also use RSA Adaptive Authentication or RSA Transaction Monitoring.
“As institutions put additional online security measures in place, inevitably the fraudsters are looking at new ways of duping innocent victims and stealing their information and assets. While these types of attacks are still considered ‘next generation,’ we expect them to become more widespread over the course of the next 12-18 months,” commented Marc Gaffan, director of marketing, Consumer Solutions at RSA.
“We are working with many organisations to ensure they are positioned to withstand whatever threats fraudsters may create. Some of these organisations have already deployed various layers of protection and others are in the process of strengthening their security.” -TradeArabia News Service