Feeds

US phishermen trawl UK waters

Phishing forecast sees front moving away from eBay

Remote control for virtualized desktops

The biggest source of attempts to steal personal bank details via email originates in the US, according to stats from UK anti-spam firm ClearMyMail.

ClearMyMail has compiled a rogues gallery of the top 10 countries guilty of trying to steal domestic bank account information. According to ClearMyMail, more than half of all phishing attacks originate in the US.

  1. US (54%)
  2. Spain (3.8%)
  3. Germany (2.9%)
  4. Korea (2.8%)
  5. France (2.7%)
  6. China (2.7%)
  7. Russia (2.5%)
  8. Japan (2.2%0
  9. Uruguay (1.8%)
  10. UK (1.4%)

ClearMyMail is calling on the British Government and ISPs to engage with their foreign counterparts in an attempt to curtail phishing attacks. "To some degree you can understand the lack of a cohesive campaign to prevent this happening in less well developed countries," ClearMyMail managing director Dan Field said. "But when you see that USA is top of the poll, and you take into account all the tools at their disposal for ridding the world of these criminals, I cannot help but feel disappointed that the Americans are not doing more to prevent this happening."

A separate study of phishing trends by UK security firm Sophos discovered that PayPal and eBay phishing attacks, long the staple of fraudulent emails, are on the wane. In September 2007, only 21 per cent of phishing emails purported to come from either PayPal or eBay. A year earlier, 85 per cent of these fraudulent messages posed as communiques from the two web giants.

The switch is explained by a move by cybercrooks to target a wider range of online firms, including smaller credit card unions and online retailers as well as online banks and eBay, than ever before. Efforts by eBay and PayPal to educate their customers are also making the duo less tempting targets, according to Sophos.

Phishing attacks as a whole have almost doubled in the last year according to RSA Security, which recorded 9,621 attacks in September 2007 compared to 4,377 in September 2006. It attributes the surge in activity to the notorious Rock Phish gang. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.