Feeds

Trojan trawls recruitment sites in ID harvesting scam

All your CV are belong to us

Beginner's guide to SSL certificates

Hackers have turned the harvesting of personal information from Monster.com and other large US jobsites into a lucrative black market business

A Russian gang called Phreak has created an online tool that extracts personal details from CVs posted onto sites including Monster.com, AOL Jobs, Ajcjobs.com, Careerbuilder.com, Careermag.com, Computerjobs.com, Hotjobs.com, Jobcontrolcenter.com, Jobvertise.com and Militaryhire.com. As a result the personal information (names, email addresses, home addresses and current employers) on hundreds of thousands of jobseakers has been placed at risk, according to net security firm PrevX.

Phreak has begun selling its "identity harvesting services" to fraudsters, charging $600 for data that might be applied to targeted phishing attacks, ID fraud or other nefarious purposes. Would-be clients are able to contact the gang on ICQ. For a fee the gang will filter its database for entries that refer to a particular country or particular employer.

Jacques Erasmus, director of research at PrevX, explained that he came across adverts for the tool in an underground forum. The PHP-based utility uses built-in recruiter IDs to trawl jobsites and return results in a handy web form, he explained.

"This is way beyond email harvesting tools. The utility is quite sophisticated and attempts to make sense of the data format found in CVs, extracting only useful information," Erasmus told The Register. "Phreak is selling its services to people running higher-end [targeted] spear phishing attacks."

Jobsites have been a target for data sniffing attack for some time. PrevX said the latest attack is distinct from one carried out by a Trojan horse program last year.

This time around the attack affects far more sites than Monster.com alone. Also the attack involves a harvesting engine, rather than the use of malware.

Job sites might be able to guard against the latest assault on user data by limiting the number of searches a "recruiter" can carry out or by applying CAPTCHAs, Erasmus explained.

A CAPTCHA is a type of challenge-response test designed to distinguish between requests from an automated program and a human. The approach typically asks a user to identify the letter in an image before allowing a request, such as an attempt to sign up to a web-mail service. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.