F ake is a counterfeit. The word fake is used in many different situations and terminologies, but the meaning remains the same.
We carders are interested in everything to do with the Internet and other people’s money. What do we need to get other people’s money? Right, private information! What is meant by the concept of “private information” I think everyone knows. So, what is it and where can you get it? Let’s start in order: how many times a week John Smith has sex is private information, but it (at least for me) is not necessary, but his credit card number, login and password from e-gold, ebay, e-mail, bank account, etc. might be useful ;-). Question number two. Where and how to get this information? There’s always two options here: 1. buy; 2. get it yourself; . I will not describe how and from whom you can buy the private information, but I will skip straight to the second option. . So, how do you get the information, that even the owner’s relatives do not know about? How to get the passwords that are in the owner’s head? How do I find out the ID that he only enters on the bank’s website??
.We’re talking about phishing. What is it? The word phishing itself comes from English fishing, which in turn translates to fishing. This is not surprising. Phishing is a special kind of phishing in the Global Net, very much like fishing. All you have to do is to drop the bait and catch all the internet fish that will bite.
Let me tell you how to phish with spam. The text of the email should simply invite the victim to go to the corporate website at the link provided (the link is a fake, of course) and perform the necessary operations themselves. For example, one day many cardholders of a major bank received a special email. It said something like the following: Today a transfer has arrived to your account, the amount of which exceeds 1000 dollars. In accordance with the regulations and the contract you need to confirm its receipt. If you do not do it within three days the money will be sent back. To confirm receipt of the transfer, open the link at the end of this email and enter the required information. By necessary information, of course, we mean your plastic card number, expiration date, whether or not you have an overdraft, etc. And many people could not overcome their greed, leaving important information at the mercy of the phisher.
Phishing threesome is certainly easier in terms of time spent on writing emails and selecting spam bases, but harder in terms of… So, what should a threesome do? All very simple, when you request a specific URL, it should not open the real site and our fake with this browser in the address bar display url real site. With this approach is worth to think, how many fakes to do? Of course, the more the better, fakes should be chosen and made after we know the location of traffic that will infect your troj. For example you buy 1k downloads in Canada. You should ask what banks are most popular among Canadians and what is good for phishing. Or vice versa, having decided what information and from where you are going to phish, pick up traffic. How should phishing work?
to be contined
Copyright (C) 2005 JunkieWEB
credit card dumps with pin