Do you have a question? Post it now! No Registration Necessary. Now with pictures!
November 10, 2009, 10:14 am
rate this thread
Some phishers use compromised computers to host malicious or illegal=20
activities, including identity theft, fraudulent financial activities,=20
as well as collecting personal information and business identities from=20
their victims for future use.
Others attack or80=9Chack=E2=80=9D into and gain administrative cont=
rol over the=20
legitimate web sites1 of businesses and organizations of all sizes. Such =
hacked web sites disguise the bad acts the phishers perform. More=20
importantly, web site hackers are fully aware that the web sites they=20
hack and80=9Cown=E2=80=9D are reputably legitimate. Law enforcement =
anti=E2=80=90phishing responders respect and operate under established bu=
technical, and legal constraints when they seek to remedy or take down=20
hacked web sites.
These measures protect legitimate web site operators but unfortunately=20
serve the attacker as well by extending the duration of the attack.
The Anti=E2=80=90Phishing Working Group (APWG) offers this document as a =
reference guide for any web site owner or operator who suspects,=20
discovers, or receives notification that its web site is being used to=20
host a phishing site. The document explains important incident response=20
measures to take in the areas of identification, notification,=20
containment, recovery, restoration, and follow=E2=80=90up when an attack =
suspected or confirmed.
Dave (this is a public information announcement)