Language Selection

English French German Italian Portuguese Spanish

Security Software Company Discovers Possible ID-Theft Ring

Filed under
Security

A Florida security software company says it has stumbled across what may be a major identity-theft effort.

Sunbelt Software Inc., which makes software used to protect computers from spyware, says it has discovered a server holding passwords and other personal information that may have been illegally collected using keylogging software.

"One of our researchers here, while doing some research for our anti-spyware tool, came across a server that happened to have a file on it that turns out to be a log file from a keylogger that's been deployed, it looks like, all over the world," David Bove, Sunbelt's director of spyware research, said in an interview.

Bove wouldn't provide more details about how the server was found or where it's located. Sunbelt has contacted the FBI about the discovery, he says. The FBI didn't immediately return calls seeking comment.

Keyloggers, whether hardware- or software-based, are used to capture information typed into computers, typically without the knowledge of the computer user. Used by law enforcement, they're a valuable tool for obtaining passwords criminals use to encrypt incriminating information. Used by criminals, they're a valuable tool for emptying online bank accounts and perpetrating identity-theft fraud. Keylogging software is usually distributed through Trojan software, worms, or viruses.

In July 2003, Juju Jiang pleaded guilty in federal court to computer fraud charges for using a keylogging program called Invisible KeyLogger Stealth at a number of Kinko's locations in Manhattan. In March, the British Hi-Tech Crime Unit foiled an attempt to steal some $420 million from a London branch of Japanese bank Sumitomo Mitsui. The thieves reportedly hacked the bank's systems through information obtained from a keylogger.

Bove says the log file contains user IDs, passwords, and associated URLs, along with IM chat logs that have been captured and transmitted over the Internet by the keylogger. Whoever is responsible has been periodically harvesting the suspected stolen data and resetting the file size, he says. When the file was discovered a week ago, it had 22 Mbytes of data. It currently has 4 Mbytes and is growing at a rate of 200 Kbytes per hour, Bove says.

Sunbelt president Alex Eckelberry brought the discovery to light through a Sunbelt blog posting. "We're sitting upon literally thousands of pages of stolen identities that are being used right now," Eckelberry wrote Friday afternoon.

"There is a LOT of bank information in here, including one company bank account with over US$350,000 and another small company in California with over $11,000 readily accessible," Eckelberry wrote. "This list goes on and on and on."

"We were trying to figure out if this was real or not," Bove says. "And we actually logged into those accounts. That's how we knew how much money was in there. Then we immediately attempted to contact the individuals to let them know."

By Thomas Claburn
InformationWeek

More in Tux Machines

Media player mini-PC runs Android on 64-bit octa-core SoC

We no longer cover every Android media player or HDMI stick that comes around, but the new Tronsmart “Orion R68″ certainly caught our attention. (So did its similar predecessor, the quad-core Rockchip RK3288 based Orion R28). First, it runs Android 5.1, a bug-fixed and more secure version of Android 5.0 Lollipop, on a new Rockchip RK3368 system-on-chip, which combines eight Cortex-A53 cores clocked at up to 1.5GHz. Read more

Red Hat and Fedora

  • Red Hat Gluster, Ceph storage roadmaps laid out at Red Hat Summit
    During the Red Hat Summit last week, the vendor provided roadmaps for its Ceph and Gluster storage software products including unified management technology and expanded protocol support for Ceph. Red Hat demonstrated the new unified capabilities that will allow users to install, manage and monitor Red Hat's Gluster and Ceph storage. Additional capabilities targeted next year for Red Hat Ceph Storage include support for iSCSI and NFS and improved multi-site capabilities, according to Neil Levine, a Red Hat director of product management.
  • Red Hat – Software Partnership Shakes Up Mobile Software Market
  • The open organization on main street
  • Analysts Evaluation on Red Hat, Inc. (NYSE:RHT)
  • Red Hat Inc (NYSE:RHT) a Buy: Oppenheimer
    According to Wall Street, Red Hat, Inc. (NYSE:RHT) is expected to report earnings per share for the current fiscal quarter of $0.29. This is the consensus mean estimate based on the individual covering sell-side analysts’ reported numbers. The company last reported earnings for the period ending on 2015-05-31 of $0.31.
  • Call for applications for Fedora Diversity Advisor (A Volunteer Position)
    Fedora is a big community that includes contributors and users from many different countries, each with their own experiences and historical backgrounds that contribute to a diverse mix of cultural, educational, and behavioral norms. To continuously create and foster an inclusive environment in the Fedora community, it’s important to respond to the needs of existing contributors and users, and welcome new contributors and users from diverse backgrounds.
  • Post Filtering
    In order to prevent users from being overwhelmed by a fire hose of notifications from the hubs they’re subscribed to and from all the other apps connected to Fedora Hubs, we decided to design a filtering system.

Btrfs In Linux 4.2 Brings Quota Updates, Many Fixes

Adding to the already lengthy list of new features for Linux 4.2 is the Btrfs file-system updates that were sent in today by Facebook's Chris Mason. The Btrfs file-system update for Linux 4.2 includes sub-volume quota updates, sysfs improvements, device management improvements, and various other changes. In total around 1,700 lines of Btrfs code were touched for this merge window. Read more Also: XFS Will Get DAX Support In The Linux 4.2 Kernel

Linux Mint 17.2 "Rafaela" MATE Officially Released - Screenshot Tour