|
Fraud :: SPAM :: Phishing |
- Agencies - - White House - - DHS - - NIST - - NTIA - - FCC - Reference - Cryptography Crimes Against Network - Worms, Viruses, Attacks - Hackers - DOS - WiFi Security - Cyberwar - Network Reliability - Infrastructure Protection - - Kill Switch Crimes Over Network - CyberStalking - Fraud - - Auctions - - Phishing - Gambling - ID Theft - Offensive Words Info Gathering - Wiretaps - CALEA - ECPA - FISA - Forensics - Carnivore - Patriot Act - Data Retention - Safe Web Act Emergency - EAS - Assessment - Reliability - Vulnerabilities |
During 2003 and early 2004, law enforcement authorities, businesses, and Internet users have seen a significant increase in the use of “phishing.” “Phishing” is a general term for criminals’ creation and use of e-mails and websites – designed to look like e-mails and websites of well-known legitimate businesses, financial institutions, and government agencies – in order to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The “phishers” then take that information and use it for criminal purposes, such as identity theft and fraud.
A growing number of phishing schemes are using for illegal purposes the names and logos of legitimate financial institutions, businesses, and government agencies in North America, Europe, and the Asia-Pacific region. One industry organization, the Anti-Phishing Working Group (www.antiphishing.org) has reported that in January 2004, there were 176 unique phishing attacks reported to it – an increase of more than 50 percent over the number of reported phishing attacks in December 2003.
The Department of Justice is issuing this Special Report to inform Internet users about the risks of responding to phishing e-mails and websites, whether phishing schemes violate federal criminal laws, and the steps that Internet users should take when they see possible phishing emails or websites.
What Are The Risks of Responding to Phishing E-Mails?
At first glance, phishing e-mails, and the websites associated with such e-mails, may appear completely legitimate. One recent phishing attempt falsely used the names of the Federal Deposit Insurance Corporation (FDIC) and two of its officials, as well as the Department of Homeland Security. What Internet users may not realize is that criminals can easily copy logos and other information from legitimate businesses’ websites and place them into phishing e-mails and websites.
In addition, if the e-mail recipient clicks on the link in the e-mail, even the window of the Internet browser he or she is using may contain what looks like the true Uniform Resource Locator (URL) of a legitimate business or financial institution. Unfortunately, some phishing schemes have exploited a vulnerability in the Internet Explorer browser. This vulnerability allows phishers to set up a fake website at one place on the Internet, but make it look like the Internet user is accessing a legitimate website at another place on the Internet.
Most phishing e-mails include false statements intended to create the impression that there is an immediate threat or risk to the bank, credit-card, or financial account of the person who receives that e-mail. In the case of the false FDIC e-mails mentioned above, the text of the e-mails falsely claimed that the Secretary of Homeland Security had advised the FDIC to suspend all federal deposit insurance on the recipients’ bank accounts. Other recent phishing e-mails have falsely claimed that the recipients’ Visa credit card was being used by another person, or that a recent credit-card transaction had been declined.
In some cases, phishing e-mails have promised the recipients a "prize" or other special benefit. Although the message sounds attractive rather than threatening, the object is the same: to trick recipients into disclosing their financial and personal data.
People who receive phishing e-mails also may not realize that the senders may have used “spamming” (mass e-mailing) techniques to send the e-mail to thousands and thousands of people. This means that many of the people who receive that spammed e-mail do not have accounts or customer relationships with the legitimate business or financial services company that the e-mails purport to come from. The people who create phishing e-mails count on the fact that some recipients of those e-mails will have an account or customer relationship with that legitimate business or company, and may be more likely to believe that the e-mail has come from a trusted source.
Ultimately, people who respond to phishing e-mails, and input the requested financial or personal information into e-mails, websites, or pop-up windows, may be putting their accounts and financial status at risk in three significant ways. First, phishers can use the data to access existing accounts of those Internet users, and withdraw money or buy expensive merchandise or services. Second, phishers can use the data to open new bank or credit-card accounts in the victims’ names, and use the new accounts to cash bogus checks or buy merchandise. If the phishers open those new accounts with the victims’ names, but use addresses other than the victims’, the Internet users may not realize that they have become victims of identity theft until they are contacted by creditors or they check their credit reports. Third, some recent phishing schemes have involved the use of computer viruses and worms to disseminate the phishing e-mails to still more people.
Can Phishing Violate Federal Criminal Laws?
Because they use false and fraudulent statements to deceive people into disclosing valuable personal data, phishing schemes may violate a variety of federal criminal statutes. In many phishing schemes, the participants in the scheme may be committing identity theft (18 U.S.C. § 1028(a)(7)), wire fraud (18 U.S.C. § 1343), credit-card (or “access-device”) fraud (18 U.S.C. § 1029), bank fraud (18 U.S.C. § 1344), computer fraud (18 U.S.C. § 1030(a)(4)), and the newly enacted criminal offenses in the CAN-SPAM Act (18 U.S.C. § 1037). When a phishing scheme also uses computer viruses or worms, participants in the scheme may also violate other provisions of the computer fraud and abuse statute relating to damage to computer systems and files (18 U.S.C. § 1028(a)(5)). Finally, phishing schemes may violate various state statutes on fraud and identity theft.
-Each of the federal criminal offenses mentioned above carries substantial penalties. Sentences can range as high as 30 years imprisonment under the wire fraud and bank fraud statutes, 15 years imprisonment for identity theft and credit-card fraud, and 5 years imprisonment under the CAN-SPAM Act. In addition, federal judges can impose substantial fines, which can be as high as $250,000 for an individual, and require forfeiture of a defendant's property. The Department of Justice has successfully prosecuted a number of criminal cases involving phishing, and will vigorously prosecute phishing schemes in appropriate cases in the future.
What Should Internet Users Do About Phishing Schemes?
The Department of Justice recommends that Internet users follow three simple rules when they see e-mails or websites that may be part of a phishing scheme: Stop, Look, and Call.
1. Stop. Phishers typically include upsetting or exciting (but false) statements in their emails with one purpose in mind. They want people to react immediately to that false information, by clicking on the link and inputting the requested data before they take time to think through what they are doing. Internet users, however, need to resist that impulse to click immediately. No matter how upsetting or exciting the statements in the e-mail may be, there is always enough time to check out the information more closely.
2. Look. Internet users should look more closely at the claims made in the e-mail, think about whether those claims make sense, and be highly suspicious if the e-mail asks for numerous items of their personal information such as account numbers, usernames, or passwords. For example:
- If the e-mail indicates that it comes from a bank or other financial institution where you have a bank or credit-card account, but tells you that you have to enter your account information again, that makes no sense. Legitimate banks and financial institutions already have their customers' account numbers in their records. Even if the e-mail says a customer's account is being terminated, the real bank or financial institution will still have that customer's account number and identifying information.
- If the e-mail says that you have won a prize or are entitled to receive some special “deal,” but asks for financial or personal data, there is good reason to be highly suspicious. Legitimate companies that want to give you a real prize don’t ask you for extensive amounts of personal and financial information before you're entitled to receive it.
3. Call. If the e-mail or website purports to be from a legitimate company or financial institution, Internet users should call or e-mail that company directly and ask whether the e-mail or website is really from that company. To be sure that they are contacting the real company or institution where they have accounts, credit-card account holders can call the toll-free customer numbers on the backs of their cards, and bank customers can call the telephone numbers on their bank statements.
. . . . .
Note: Internet users who want to e-mail, or go to a website for, one of the companies listed above should type in the e-mail address exactly as it appears above. Typing in the address is the only way to be certain that a browser will go to the legitimate company's website. No one should ever rely on any information that appears in a phishing e-mail.
In addition, people who use the Internet Explorer browser should immediately go to the Microsoft Security home page -- http://www.microsoft.com/security/ -- to download a special patch relating to certain phishing schemes. This URL should be typed into the browser window to make certain that the browser will go to the real Microsoft Security website.
The Department of Justice asks the public to report possible phishing schemes promptly to law enforcement. The sooner that law enforcement and legitimate businesses learn about new phishing e-mails and websites, the sooner those e-mails and websites can be shut down and appropriate law enforcement action taken.
If you may have disclosed your personal information to a possible phishing e-mail or website, you should immediately file an online complaint with the Internet Crime Complaint Center (a joint project of the FBI and the National White Collar Crime Center) at http://www.ic3.gov. Because that disclosure of personal information may put you at risk of becoming a victim of identity theft, you also should go to the Federal Trade Commission's identity theft website, at http://www.consumer.gov/idtheft, and follow the directions there for reporting information to credit bureaus, credit-card companies, and law enforcement.
If you have received a possible phishing e-mail, but have not yet responded to it, do not respond. Instead, send copies of the e-mail to the Federal Trade Commission at uce@ftc.gov and the Anti- Phishing Working Group at reportphishing@antiphishing.org.
Further Information
Federal Activity
- Consumer Information
- Identity Thief Goes "Phishing" for Consumers' Credit Information, FTC 7/23/03
- OnGuard Phishing
- US CERT Avoiding Social Engineering and Phishing Attacks
- OCC Internet Pirates Are Trying to Steal Your Personal Financial Information
- FDIC Consumer Alerts - Phishing Scams
- SEC "Phishing" Fraud: How to Avoid Getting Fried by Phony Phishermen
- NIH Avoid Being a Victim of a Phishing Scam
- Reports
- Phishing Activity Trends Report: 1 st Half 2009 , APWG
- CipherTrust Proves Worldwide Phishing Attacks Originate from Fewer Than Five Zombie Network Operators (2004)
- USDOJ SPECIAL REPORT ON PHISHING
- Treasury Announces Release Of Report On "Phishing" At Identity Theft Forum In Kansas City May 2005
- FDIC Winter 2003/2004: When Internet Scam Artists Go "Phishing," Don't Take the Bait
- Lessons Learned by Consumers, Financial Sector Firms, and Government Agencies during the Recent Rise of Phishing Attacks Prepared by the Financial and Banking Information Infrastructure Committee and the Financial Services Sector Coordinating Council PDF
- Digital Phishnet FBI
Statistics
News
- Phishing 101, COMCAST 3/7/2011
- Google adds phishing alerts to network services, CW 10/15/2010
- Twitter hit with second phishing attack this week, CNET 2/25/2010
- Social Network Members Increasingly Vulnerable to Phishing Attacks, Ask Mariam 10/20/2009
- Phishing attack reveals poor Hotmail passwords, CW 10/20/2009
- F.B.I. Arrests Dozens for 'Phishing' ID Theft Scheme, NYT 10/13/2009
- Operation "Phish Phry" Nets 100 Cybercriminals in Global Ring, Ask Mariam 10/13/2009
- The Internet Has Never Been More Dangerous - latest research from the APWG, Halping Families 10/1/2009
- Spear-phishing attacks have hooked 15,000, says Verisign, CW 6/6/2008
- U.S. agents nab 38 in phishing investigation, Globe and Mail 5/20/2008
- 38 in U.S., Romania charged in phishing schemes, CW 5/20/2008
- A Free Speech Double Whammy: Flawed Anti-Phishing Bill Would Dilute Trademark Fair Use and Anonymity Protections, EFF 3/13/2008
- Senate antiphishing bill outlaws...what's already illegal, CNET 2/26/2008
- FBI warns of rise in phone-based 'vishing' attacks, CW 1/22/2008
- Vishing Attacks Increase, IC3 1/22/2008
- Phishers Now Targeting Domain Registrars, CircleID 8/9/2007
- DNS attack could signal Phishing 2.0, CW 12/11/2007
- Phishing URLs Skyrocket, Overwhelming Browser Blacklists, CircleID 5/30/2007
- New On-line Phishing Depository - From the folks that brought you OpenDNS, Broadband Reports 10/3/2006
- Phish Tank, PhishTank 10/3/2006
- Phishers Spoof Record Number Of Brands, Internet Week 9/12/2006
- Study: eBay, PayPal Remain Top Phishing Targets, eWeek 7/28/2006
- Phishers try to beat banks' strong authentication, Network World 7/14/2006
- Phishing Scam Calls on VoIP Phones, PC World 7/10/2006
- Phishers Latch Onto VoIP Systems, Ecommerce Times 4/28/2006
- Phishing attacks soar as viral onslaught wanes, Register 7/29/2005
- Phishing, Pharming, And Spyware Targeting Federal Agencies, Internet Week 6/14/2005
- Phishing Up By 226 Percent, InternetWeek 7/5/2005
- Digital PhishNet launched to combat phishing scams, NWFusion 12/10/2004
- Police arrest phishing mob suspect, CNET 11/12/2004
- Vendors Search for Ways To Slow Phishing Attacks, Ecommerce 9/29/2004
- Google Phishing Holes Found, Newsfactor 10/22/2004
- E-mail scam plays on US elections, BBC 10/5/2004
- Banks sound alarm on online fraud, BBC 10/5/2004
- Latest Phishing Scam Silent But Violent, Ecommerce 11/5/2004
- Phishers Spoof FDIC Site to Collect Card Info, eWeek 9/24/2004
- Symantec Rolls Out Anti-Phishing Service, eweek 9/14/2004
- Users Find Too Many Phish in the Internet Sea, NYTimes 9/21/2004
- FDIC warns of fraudulent e-mails, CNN 4/23/2004
- Study: MasterCard, others unwittingly help 'phishers', NWFusion 7/20/2004
- IRS warns taxpayers about identity theft e-mails, CNN 5/4/2004
- "Phishers" Settle Federal Trade Commission Charges, FTC 6/17/2004
- Something's phishy at Citibank, CNET 1/13/2004
- U.S. shuts down Internet 'phishing' scam, CNN 3/23/2004