Phishing Cost The U.S. $3.2 Billion In 2007

Stamford (CT) - A report coming out of Gartner has pinned the cost of phishing attacks at $3.2 billion for the U.S. alone. There were 3.6 million adults who lost money in the time period between September 1, 2006 and August 31, 2007. That's up from only 2.3 million the year before, with 3.3% of those who received phishing emails saying they lost money because of it, up from only 2.3% in 2006 and 2.9% in 2005.

The attackers have stepped up their game. Avivah Litan, VP and "distinguished analyst" at Gartner, said, "Criminals have stepped up attacks on debit card and bank accounts, where back-end fraud detection systems are traditionally weaker than they are with credit card accounts."

Banking regulators in the dark
A cited U.C. Berkeley Freedom of Information Act request, whereby Gartner and the university obtained information from FDIC (Federal Depositor Insurance Corporation) for all bank-reported fraud attacks between January 27, 2005 and May 30, 2007, showed a staggering find. The analysis indicated "spotty, unreliable and unstructured data reported by U.S. banks to the regulator. Just 451 unique incidents were reported in this period. The data quality was so poor that it was impossible to draw any conclusions from it other than that the regulatory reporting on fraud attacks is severely lacking."

Gartner predicts that phishing and malware attacks will increase through 2009 because it is so lucrative. Still, the questions remain, how lucrative are these markets? And why can't the authorities track them down?

Big bucks
No one knows for sure how much these companies and individuals are making right now. However, our own Wolfgang Gruener had the opportunity several years ago while working for a German magazine to interview a German mail-fraud mastermind. His interview uncovered the global aspect of the operation. More than 150 people were employed at that time, in dozens of countries around the world, none of them in the U.S. He also had an undisclosed number of "spam bots", computers that had been taken over with malware that does not render the machine ineffective or disabled, but rather it receives commands to execute from the mastermind's home computer. The end-user is still able to use their computer, and may be completely unaware of the illicit operations taking place right on their own machine, via their own Internet connection.

TOPICS