lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20090326162953.318821A003A@smtp.hushmail.com>
Date: Thu, 26 Mar 2009 12:29:52 -0400
From: mac.user@....hush.com
To: funsec@...uxbox.org, full-disclosure@...ts.grok.org.uk, ge@...uxbox.org
Subject: Re: phishing attacks against ISPs (also with
	Google translations)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

nuking israel would solve this spam issue and quite a few other
global issues.  i figure myself a humanist and would welcome any
other ideas but it seems that this new spam issue is forcing the
rest of the world to take drastic issues.  who is with me?

On Wed, 25 Mar 2009 08:40:06 -0400 Gadi Evron <ge@...uxbox.org>
wrote:
>In this email message I'd like to discuss two subjects:
>a. Phishing against ISPs.
>b. Phishing in different languages against ISPs as soon as Google
>adds a
>new translation module.
>
>[My apologies to those who receive this email more than once. I am
>approaching several different industries on this matter]
>
>In the past few weeks there has been an increasing number of
>phishing
>attacks against clients of Israeli ISPs. I've only seen a few of
>these,
>but the local ISPs confirm it's happening across the board.
>
>In all these cases, the phishing email is in Hebrew.
>
>While we have seen ISP phishing and Hebrew phishing before, these
>attacks started when Google added translation into Hebrew.
>
>Is this a trend? Have other countries (or populations) been
>targeted
>when Google added a translation module for more languages?
>
>Notes:
>a. Some Israeli ISPs emailed their clients warning against such
>attacks.
>Saying they'd never ask for their password, etc.
>
>b. While I was certainly heavily involved with phishing originally
>and
>even started the first coordination group to deal with the issue,
>I am
>somewhat removed from it now, dealing more with phishing/banking
>Trojan
>horses.
>Can anyone educate me as to how often ISPs get phished, if at all?
>
>c. If you get phished, what strategies if any have you taken to
>prevent
>the attacks/respond to them/educate your clients? What worked?
>
>d. I wonder if these translation misuses could eventually
>translate into
>some intelligence we will see in Google security reports, such as
>on
>malware.
>
>	Gadi.
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAknLrYEACgkQfuF4tUz/X+JTNAQArEEpkRlcP+tFk2jpCaQkkRlF52c5
83u+6hK2/3HfEoB1SRSM3eoRUsgyrjxSNUz1rW/UHVMcX2Jvjl04v34fBn6M6nDkXyDJ
b2Dc58DvSHbwHsyZ7CZygZ26uTHHNW+fXfQsug3irSTJxUDGAVApfLXYpz4zo4OwtwGx
X8E6ulo=
=Qzjg
-----END PGP SIGNATURE-----

--
Rock Solid Web Hosting. Click Here.
 http://tagline.hushmail.com/fc/BLSrjkqe38URcofaYP0V07VNZkWFJgQw20bQ5Vmdy0sJ0RzaeOXqvrY9oBq/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ