{"id":373,"date":"2007-06-23T00:00:00","date_gmt":"2007-06-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/23\/online-attacks-increase-at-financial-institutions\/"},"modified":"2021-12-30T11:37:09","modified_gmt":"2021-12-30T11:37:09","slug":"online-attacks-increase-at-financial-institutions","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/23\/online-attacks-increase-at-financial-institutions\/","title":{"rendered":"Online Attacks Increase at Financial Institutions"},"content":{"rendered":"<p>The RSA&#8217;s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on US financial institutions &#8212; that&#8217;s more than double since April.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the last year RSA&#8217;s Anti Fraud Command Center has seen attacks moving progressively downward, particular targets are the federal credit unions, and smaller, regional institutions.  The fraudsters, said Hinrichsen, are accomplishing their collection of information through spear phishing.  He noted that the Internal Revenue Service was one of the first government agencies to be attacked.  &#8220;At the end of the day, where ever there is a valuable credential, the fraudsters will go after it.&#8221;<\/p>\n<p>Hinrichsen noted that the use of crimeware, like the Man-in-The-Middle phishing kit that RSA researchers first discovered in January continues to be used, &#8220;there is greater use of multi redirectors in phishing attempts.  &#8220;It depends on what research you&#8217;re reading, consumers aren&#8217;t always know to look for the locks, but for the percent of internet users who do look for the lock, the attack is given that much more credibility,&#8221; he explained.  &#8220;This is basically the same type of phishing attack of old, but now instead of using static attack pages, the phishers are replacing those with the real website pages from the institution.&#8221;<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/articles.php?art_id=475<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-373","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=373"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/373\/revisions"}],"predecessor-version":[{"id":2860,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/373\/revisions\/2860"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}