List of AOL CatWatch Members
List of AOL CatWatch Members

Subj:      ¥—¤(J.a.W.)¤—(CaTwAtCh NaMeS)¤—¥)”UPDATED”

Date:      97-08-01 23:11:27 EDT

From:     Bo0gYmAn

BCC:      BeAwareX1

«–=•º|[    TRauMaTiZeD MassMailer   ]|º•=–»

«–=•º|[            ßý: ßaÑiÇKuLa          ]|º•=–»

«–=•º|[ Dedicated to Jenny in Heaven ]|º•=–»

«–=•º|[    Mail Number: 103 of 283     ‘]|º•=–»

«–=•º|[ Maybe Bo0gYmAn’s last MMs! ]|º•=–»


Forwarded Message:

Subj:      ¥—¤(J.a.W.)¤—(CaTwAtCh NaMeS)¤—¥)”UPDATED”

Date:      97-07-24 03:25:15 EDT

From:     BuBBLe HoP

Early Phishing
Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

AOL Prog Passwords

All Passwords Are Case Sensitive. Prog Name Password Acid Burn PiXY RuLEz You! Adidas toolz poiuyt Afterlife Eraser is GoD Agent Orange I Crap On Lamers America Off Line maxuck or ivan is a fairy Anti Mass Mailer bud is blah AoBliss Tosser Welcome to the wonderful world of Bliss AOExtacy BoW 2 MaTT AOExtacy Phisher Matt is king   AOFuck 1."PiXY RuLEZ!" 2."WaNG DanG".....
AOL Warez Arise Group
AOL Warez Arise Group

2014-10-22 13_29_16-1264410_10105281608895370_5920015541346424548_o - Windows Photo Viewer

http://www.AriseWarez.com

Arise Macro Created by X99

glassyabout_arise

 

About Arise Warez

A long, long, time ago, hehe, I was in a group called DGG. GaL ran the group and eventually I ran it as well. Unfortunately for me I learned the hard way when a person other then yourself controls the site as well as the bots, well you got problems. GaL decided she wasn’t going to be involed with the group anymore and yanked the site. Well Arise was born that day. I borrowed a botnet and got a T-3 release site. First mistake: using a borrowed botnet. Ok so I got a few bots, Second mistake: Never have anybody but yourself be botmaster. Well eventually I learned bots and the group Arise flourished. One small problem was we were an AOL group but had no AOL presence. Chemical came on board and changed all that. Arise has seen members come and go, usually to see them start there own warez group. Hehe, I see more warez groups that have former Arise members and it amazes me, and I wish them all the BesT. Some say now we’re the best, the only true 0day group left. Well that is a nice complement. Ya know nothing lasts forever, but while its happening I say 0-Day Everyday!!
-Evil, Founder Of Arise