Officials at Sunbelt Software, a Clearwater, Florida-based vendor of anti-spyware tools, say the company stumbled upon a massive ID theft ring that is using a well-known spyware program to break into and systematically steal confidential information from an unknown number of computers worldwide.
The operation was discovered last week during research Sunbelt was doing on a spyware program belonging to a particularly dangerous class of browser hijacking tools called CoolWebSearch (CWS), according to Sunbelt's president, Alex Eckelberry.
CWS programs are extremely hard to detect and remove, and are used to redirect users to Web sites that use spyware tools to collect a variety of information from infected computers.
Treasure Trove of Information
The CWS variant being researched by Sunbelt turned infected systems into spam zombies and uploaded a wide variety of personal information to a remote server apparently located in the U.S. That server holds a "treasure trove of information" for ID thieves, Eckelberry says.
Sunbelt's research showed that the information being uploaded to the remote server included chat sessions, user names, passwords and bank information, he says. The bank information included details on one company bank account with more than $350,000 in deposits and another belonging to a small California company with over $11,000 in readily accessible cash, he says.
Many of the records being uploaded also contained EBay account information, he says. Among the highly personal bits of information Sunbelt was able to retrieve from the server were one family's vacation plans, instructions to a limo driver to pick up passengers from an airport, and details about one computer user with a penchant for pedophilia.
Sunbelt officials did not say how they accessed the material. But the existence of a large file that the company said it retrieved from the remote server was confirmed by Computerworld. Sunbelt says the file contained user names, addresses, account information, phone numbers, chat session logs, monthly car payment information, and salary data.
"It's one of the most egregious things we have ever seen," says Eckelberry. "We know this kind of data is out there, but this is the first time we actually have the data that the criminals are using."
Information gathered from infected computers is uploaded to the remote server and stored in highly organized files that appear to be accessed by multiple ID thieves, Eckelberry says. The files grow to anywhere from 10MB to 20MB in size before they are refreshed with new information, he says.
The FBI has been contacted and is working on the case, Eckelberry says. In addition, Sunbelt has contacted some of the individuals and banks whose data has been logged to warn them of the compromise.
The domain of the remote server appears to have been registered in China, although the server itself is located in the U.S., Eckelberry says. "We are working to get that server taken down."
He declines to offer more details.
A spokesperson for the FBI could not be reached for comment.
Sunbelt's discovery brings home the seriousness and scope of the growing ID theft problem, says Pete Lindstrom, an analyst at Spire Security in Malvern, Pennsylvania.
"I think this stuff is much more significant than the notification of [compromises] by credit card companies," Lindstrom says. That's because the credit card industry as a whole has better controls in place to detect and prevent abuses resulting from such compromises than individuals, he says.
"This stuff hits home because it's personal. It's like taking something out of your home," Lindstrom says. "Each and every one of these accounts can be compromised, and it hurts someone."
This story, "Massive ID Theft Ring Uncovered" was originally published by Computerworld.