[IS&T Security-FYI] Newsletter, March 7, 2008

Monique Yeaton myeaton at MIT.EDU
Fri Mar 7 12:44:49 EST 2008


In this issue:

1. Beware Phishing Attempts for MIT Webmail Passwords
2. US Data Breaches Quadrupled in 2007
3. Tip of the Week: Protecting Your Identity


------------------------------------------------------------------------ 
-
1. Beware Phishing Attempts for Webmail MIT Passwords
------------------------------------------------------------------------ 
-

Since last December, several higher education organizations have been  
hit with a repeated wave of phishing attacks, attempting to steal  
email account passwords from unsuspected recipients. MIT has been one  
of the targets of these attacks (see the December 14 Security-FYI  
newsletter). Do not reply to these emails and delete them  
immediately. To prevent receiving such emails in the future, you may  
want to set your spam threshold to a more sensitive level <https:// 
nic-too.mit.edu/cgi-bin/spamscreen#scoring>.

An example of the phishing emails reads as follows (typos intact):

====

Dear Mit Webmail Subscriber,

To complete your Mit Webmail account, you must reply to this email  
immediately and enter your password here (*********)

Failure to do this will immediately render your email address  
deactivated from our database.

You can also confirm your email address by logging into your Mit  
Webmail account at

https://webmail.mit.edu/

Thank you for using Mit Webmail !

THE  Mit Webmail TEAM

===

Efforts are being made to spread the message to the MIT community  
regarding these emails. Notices have been posted on 3-DOWN <http:// 
3down.mit.edu/3down/> and on the Webmail login page, warning email  
users to NEVER respond to emails asking for passwords. MIT would  
never request users to share their passwords with anyone at MIT,  
including email or IT administrators.


-----------------------------------------------------
2. US Data Breaches Quadrupled in 2007
-----------------------------------------------------

The loss or theft of personal data such as credit card and Social  
Security numbers soared to unprecedented levels in 2007.  While  
companies, government agencies, schools and other institutions are  
spending more to protect ever-increasing volumes of data with more  
sophisticated firewalls and encryption, the investment often is too  
little, too late.

The San Diego-based Identity Theft Resource Center  
<www.idtheftcenter.org> lists more than 79 million records reported  
compromised in the United States through December 18th — a nearly  
fourfold increase from the estimated 20 million records reported in  
all of 2006. Another group, Attrition.org, estimates more than 162  
million records were compromised through December 21st worldwide.  
Attrition reported 49 million worldwide in 2006.

[source of this article: SANS Newsbites]


------------------------------------------------------
3. Tip of the Week: Protecting Your Identity
------------------------------------------------------

Criminals have learned that they don’t need to pull a gun on you to  
get your wallet or purse. They’re using the Internet to steal  
everything in your accounts — and your good credit too. How are they  
doing this?

Phishing (such as in the example given in the article above) involves  
sending an email that claims to be a legitimate business in an  
attempt to scam the user into surrendering private information.  
Pharming involves the same goals with a different method; malicious  
users employ spyware, keyloggers, domain spoofing, domain hijacking,  
or domain cache poisoning to obtain personal or private (usually  
financial) information.

To put it bluntly, criminals try to steal your identity by getting  
you to divulge financial data such as credit card numbers, account  
usernames, passwords, and social security numbers. They sell this  
information, and it then becomes an identity theft crime.

Take a few simple steps to stop them, and don’t become an identity  
theft statistic. Here are four rules to live by:

  * Rule 1: Stop clicking links in emails that direct you to your  
bank or a financial institution. Stop filling out forms sent to you  
by your bank or financial institution. If you want to visit the site  
to see if you need to confirm/update/verify your account, open up a  
browser and type the link or retrieve it from your favorites.

  * Rule 2: If you suspect an email is part of a phishing scheme,  
report it. Report it to the financial institution, the FTC, and the  
Internet Crime Complaint Center. Often the financial institution is  
aware of the scheme and will add a message to its website to warn its  
clients.

  * Rule 3: Update your browser, your antivirus software, and any  
other security software. The latest versions of such software have  
phishing filters that detect attempts and warn you if it suspects  
you’ve surfed to a site that isn’t legitimate.

  * Rule 4: Stop using public computers to access private  
information. Internet kiosks at hotels and other business are  
convenient but often have Trojans and keyloggers installed that  
collect and transmit your information to the criminals. Access  
personal and financial information only from a computer you trust to  
be free from these evils. In addition, turn off peer-to-peer file  
sharing when on an unsecured network using your own computer.

[source of this article: TechRepublic.com]


=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security







More information about the ist-security-fyi mailing list