10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

web 2.0 sites (such as, social networking, video sharing and Voice-over-Internet-Phone<br />

sites), free e-mail service providers, banks and popular e-Commerce<br />

websites. 201 Phishing (technical) kits typically bundle all the content required to replicate<br />

a targeted website and <strong>of</strong>fer them freely on the Internet.<br />

Cloning the websites <strong>of</strong> retailers is one quick way to obtain financial and personal data.<br />

These cloned websites closely resemble the real ones and require close scrutiny to spot<br />

the difference. Another variation is for a request for sensitive information to be posted<br />

onto a legitimate website, so that a clearing bank might be seen on its website to be<br />

soliciting customer information following a major s<strong>of</strong>tware malfunction or crash.<br />

Nothing lost but precious data<br />

In December 2005, a group <strong>of</strong> cybercriminals set up a bogus website claiming to sell a<br />

variety <strong>of</strong> electrical goods at reasonable prices and which stated that it had stock <strong>of</strong> the<br />

‘must have’ Christmas gift: a Sony PSP. Over two thousand orders were placed, all<br />

providing personal identity information and bank details. Once the details were obtained,<br />

prospective purchasers were sent an e-mail advising them that their order could not be<br />

processed due to lack <strong>of</strong> stock. As no money was lost, there was nothing to cause any<br />

suspicion on the part <strong>of</strong> the buyer. It was only when the fraudsters starting using the<br />

financial details <strong>of</strong> the victims a few months later to perpetrate their fraudulent<br />

transactions that people felt the impact <strong>of</strong> the fraud.<br />

Apart from bogus or shame websites used to lure unsuspecting victims, site cloning<br />

involves the replication <strong>of</strong> the look and style <strong>of</strong> a genuine and trusted website that leads<br />

victims to purchase from that cloned website, and lose their financial details to<br />

fraudsters with no knowledge that they have done so.<br />

201 Trend Micro (2008), Threat Roundup and Forecast—1H. London.<br />

Page 67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!