Custom Spam Uses Personal Data

Thursday, June 20, 2013 @ 11:06 AM gHale


Spamming professionals are using cell phone users’ personal data to launch invasive, highly targeted attacks, new research said.

For the first time, mobile spammers can use information such as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective, according to a report from AdaptiveMobile.

RELATED STORIES
Botnet Hurt, so are Researchers
P2P Botnets Keep Growing
Global Cybercrime Botnet Breached
Reworked Trojans a Major Threat

The report said a major factor in the spam movement is the availability of cheap, databases of U.S. cell phone subscriber data. For $199, attackers can purchase a list of 50,000 mobile phone users’ data broken out by first name and zip code.

Researchers saw attacks such as:
• 11,500 bank card deactivation texts sent from spammers that came from a local bank in the Tennessee area
• A junk car buyback scam that blanketed the 786 area code, a location where 18 percent of the population lives below the poverty line.

This emerging source of spam is more difficult to detect and stop. Spam by virtual carrier occurs in low-level, long-running campaigns with a maximum of 150 texts per spammer vs. the fixed carrier model, which averages 2000 messages per sender.

These types of low-level spam are usually illegal, malicious messages that look to grab financial and other sensitive data or to monitor activity on the phone. Carriers increasingly need to protect subscribers against attacks that bypass traditional detection methods.

“The complexity of these attacks combined with their ability to use such targeted, personalized information make them lethal and highly effective,” said Gareth Maclachlan, COO and co-founder of AdaptiveMobile.

“Criminal elements know that mobile is an excellent revenue source and that the more targeted the attack, the more profitable it will likely be,” Maclachlan said. “Carriers are faced with the tasks of monitoring criminal activity, and stopping threats that are continually becoming more sophisticated.”



Leave a Reply

You must be logged in to post a comment.