Feeds

AOL sues mystery phishers for $18m

Trawl

Internet Security Threat Report 2014

AOL filed three civil lawsuits against several major phishing gangs on Tuesday as part of the ISP's wider fight against identity theft scams and other internet security threats.

The suits (overview) cite Virginia's anti-phishing statute, adopted in July 2005. AOL's suit also uses the Federal Lanham Act (trademark law), and the Federal Computer Fraud & Abuse Act.

The ISP is seeking damages of $18m against unnamed groups who targeted AOL and CompuServe members with fraudulent emails that attempted to trick them into handing over confidential personal information (such as AOL screen names, passwords, and credit card numbers) to bogus websites that mimicked the appearance and feel of official AOL or CompuServe websites. According to the lawsuits, these phishing fraudsters used "vast resources and creativity" to design hundreds of fake websites. AOL has kept tens of thousands of examples of phishing fraud emails transmitted by these gangs.

Curtis Lu, senior VP and deputy general counsel at AOL said: "At AOL, we are using every legal and technical means at our disposal to drive phishers from the AOL service, not only to protect our members, but to make the internet a better, safer place for all consumers. The phishers targeted in our lawsuits spoof a variety of prominent internet brands, including AOL."

According to the Anti-Phishing Working Group almost 50,000 phishing websites were created last year, with more than 7,000 appearing in December alone. AOL said it is committed to fighting spamming and phishing both legally and by using technologies such as its recently introduced certified mail programs. It said it blocks an average 1.5bn spam emails a day, approximately 80 per cent of the email traffic sent to users' in-boxes. AOL also blocks delivery of emails with web links to known phishing sites. Access to known phishing sites is also blocked for users of AOL Explorer browsers. The ISP partners with anti-phishing firms MarkMonitor, Cyveillance and Cyota in delivering providing protection against phishing attacks. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.