Phishing Supply Chain Part 2
The two final links in the chain are the most important ones. Strangely enough, you see two groups here: international phishers and local criminals. The distinction is extremely important, and understanding the dynamics of these groups is crucial for building effective defense mechanisms against phishing.
A few years ago, phishers were both collecting the data and then using it to attack the financial institution. Today there's a clear separation between the people who conduct phishing and collect customers' credentials, and the people who use the stolen credentials to take money out of the respective accounts. Speaking of Security... | Blog Entry: Uri Rivner | Phishing Supply Chain--Part 2 of 2: 1090
Back to: PC Security, privacy news