The 9 Most Successful Social Media Scams of 2009 - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Canadian Pharmacy-6 Next

Canadian Pharmacy

The 'Canadian Pharmacy' was one of the top Internet scams of 2009. Interestingly, it was also one of the most prevalent e-mail spam campaigns. Users typically found the site after receiving an e-mail or while researching a new drug, perhaps one prescribed by their doctor or denied by insurance. Sites would appear on short-lived URLs, shifting rapidly to avoid being detected in spam filters or blocked by database-driven URL filters.

Many of these sites operated outside of North America and primarily conducted the transactions without using the SSL security most legitimate companies use for financial transactions. Users who submitted payments through these malicious sites either received a different product, a placebo or no product at all.

This is also an example of the trend towards greater complexity in blended threats. Some of these scam sites have been linked to distributing credit card and other personal information gathered during the transaction process. Many also launch malware known as Trojan 'droppers' onto the PCs of visitors. The 'Canadian Pharmacy' has been a very successful campaign, so cybercriminals have applied it to a variety of attacks.

The most successful attacks of 2009, as in previous years, required a successful social engineering component at one stage of the attack or another. For instance, fake antivirus scams exploit common security fears, while fake code malware teases individuals to the point where they lack the patience to really think about what they are being asked to do.

In addition, death, disaster and drama have become hugely effective vehicles for spreading malware. These tactics are explored in more detail below.

As part of a comprehensive review of 2009, Blue Coat Systems has compiled this list of the most common (and successful) bait and scams the bad guys are using to install malware on unsuspecting users' systems and steal personal information.
 

Related Topics : Cox Communications, Business Development, Contact Center Solutions, CRM Solutions, Database Acceleration

 
More Slideshows

Media1-190x128.jpg 5 Ways to Boost Productivity with Content Automation

An effective content automation solution can ease the transition to a digital-first distribution strategy, helping companies preview and approve content across all platforms and media types. ...  More >>

Analytics19-290x195 How to Evaluate Predictive Analytics for Your Business

Predictive analytics uses past data to forecast outcomes and target the right prospects – a move that's redefining the use of data and insights in marketing. ...  More >>

Misc64-190x128 5 Ways to Patch the IT/Marketing Disconnect (and Thrive)

Five steps CIOs and CMOs can take to patch the IT/marketing disconnect and create a cohesive, efficient working environment. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.