Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

E-threat report focuses on online payment fraud

BitDefender UK : 09 June, 2009  (Technical Article)
Spoof websites posing a significant threat with online payment service users re-directed to fraudulent web sites
BitDefender researchers have found that scammers posing as online payment services continue to be one of the top ten most spoofed identities in the world of spam and phishing, according to BitDefender's latest E-Threats Landscape Report.

The latest phishing campaign targets e-banking and e-payment users by deploying several malicious components. The initial approach is an unsolicited message advertising a product claiming to offer the ultimate 'open source Antivirus solution', and inviting readers to visit a web page where they can download the product.

However, upon clicking the link, the victim does not receive the promised security suite, but a fake executable - setup.exe - which is, in effect, a self-extracting archive. Its purpose is to replace the content of C:WINDOWSSystem32driversetc and to alter the Web browser's behavior, by automatically loading maliciously crafted pages for phishing purposes of PayPal, Abbey and Halifax.

Each time the victim types the address belonging to one of these financial institutions, he or she will be redirected automatically towards the fake pages. Here, the log-in credentials (user name, password, security code) and other sensitive data (first and last name, complete home and e-mail address, credit card number, expiration date, Card Verification Code, and even PIN) are harvested by using PHP scripts. All other menu options available on each page redirect the user towards the appropriate sections of the genuine Web site.

According to BitDefender, the bogus Web pages load from domains registered in China and Korea.

"The current economic turmoil inevitably led to the proliferation of e-crime phenomena," said Vlad Valceanu, Head of BitDefender Antispam Research. "The latest trends BitDefender observed reveal several alarming aspects: first, since the beginning of this year, the scams and phishing schemes have followed an ascendant curve. Second, the complexity and aggressiveness of raids and attacks have dramatically increased. Finally, the number of victims followed the same growing pattern. Along with paying close attention to the e-mails they receive, it is important for computer users to have a reliable security solution installed onto their systems in order to prevent future attacks."

BitDefender's E-Threats Landscape Report provides an overview of the security threats landscape over the last six months and takes a look at what lies ahead in 2009.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo