MESSAGE
DATE | 2004-11-05 |
FROM | From: "Inker, Evan"
|
SUBJECT | Subject: [hangout] Warnings On New Phishing Threat Nov. 3, 2004
|
From owner-hangouts-destenys-at-mrbrklyn.com Fri Nov 5 11:24:27 2004 X-UIDL: 7\Z"!-at-)R!!cX>!!<,^"! Received: from www2.mrbrklyn.com (LOCALHOST [127.0.0.1]) by mrbrklyn.com (8.12.11/8.11.2/SuSE Linux 8.11.1-0.5) with ESMTP id iA5GORO9028775 for ; Fri, 5 Nov 2004 11:24:27 -0500 Received: (from mdom-at-localhost) by www2.mrbrklyn.com (8.12.11/8.12.3/Submit) id iA5GORoC028774 for hangouts-destenys; Fri, 5 Nov 2004 11:24:27 -0500 X-Authentication-Warning: www2.mrbrklyn.com: mdom set sender to owner-hangouts-at-www2.mrbrklyn.com using -f Received: from mail68.messagelabs.com (mail68.messagelabs.com [193.109.255.67]) by mrbrklyn.com (8.12.11/8.11.2/SuSE Linux 8.11.1-0.5) with SMTP id iA5GOPMD028769 for ; Fri, 5 Nov 2004 11:24:26 -0500 X-VirusChecked: Checked X-Env-Sender: EInker-at-gam.com X-Msg-Ref: server-7.tower-68.messagelabs.com!1099671894!27980971!1 X-StarScan-Version: 5.4.2; banners=-,-,- X-Originating-IP: [193.202.231.225] Received: (qmail 20596 invoked from network); 5 Nov 2004 16:24:54 -0000 Received: from unknown (HELO w2gw-ldn02.gam.com) (193.202.231.225) by server-7.tower-68.messagelabs.com with SMTP; 5 Nov 2004 16:24:54 -0000 Received: from ntas-ldn15.gam.com (unverified) by w2gw-ldn02.gam.com (Content Technologies SMTPRS 4.3.12) with ESMTP id for ; Fri, 5 Nov 2004 16:24:54 +0000 Received: by ntas-ldn15.gam.com with Internet Mail Service (5.5.2653.19) id ; Fri, 5 Nov 2004 16:24:54 -0000 Message-ID: <386AEEE1B7BAC34CB4DDF394C2349278D6E7D0-at-w2cs-nyk02.gam.com> From: "Inker, Evan" To: hangout-at-nylxs.com Subject: [hangout] Warnings On New Phishing Threat Nov. 3, 2004 Date: Fri, 5 Nov 2004 16:23:45 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C4C353.D290BFA0" Sender: owner-hangouts-at-mrbrklyn.com Precedence: bulk Reply-To: "Inker, Evan" List: New Yorker GNU Linux Scene Admin: To unsubscribe send unsubscribe name-at-domian.com in the body to hangout-request-at-www2.mrbrklyn.com X-Spam-Checker-Version: SpamAssassin 3.0.0 (2004-09-13) on www2.mrbrklyn.com X-Spam-Status: No, score=-1.6 required=4.0 tests=AWL,BAYES_00,HTML_20_30, HTML_CONVERTED,HTML_MESSAGE,HTML_NONELEMENT_00_10 autolearn=no version=3.0.0 X-Spam-Level: X-Keywords: X-UID: 37310 Status: RO Content-Length: 7709 Lines: 157
This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible.
------_=_NextPart_001_01C4C353.D290BFA0 Content-Type: text/plain
Warnings On New Phishing Threat Nov. 3, 2004
New, "more insidious" phishing scam is triggered when unsuspecting users open an E-mail. By Thomas Claburn
Opening the wrong E-mail may soon be enough to empty your bank account. In an effort to woo security-conscious computer users, "phishers" have come up with a new technique to harvest online banking details without requiring users to click on a Web link and enter personal information on a submission form.
This new form of attack, directed specifically at users of online banking, runs a script when a phishing E-mail message is opened, according to E-mail and virus security company MessageLabs Ltd. The script tries to rewrite the host files on the machine of the recipient. On subsequent attempts to access online banking services, victims will unknowingly be redirected to a fraudulent Web site designed to capture their log-in details.
Alex Shipp, senior antivirus technologist at MessageLabs, says such developments only make it harder to defend against phishing. Traditional phishing attacks rely on tricking the user into following a Web link and then entering personal information. "This one is much more insidious," he says.
Some 3% of those targeted by phishers reveal personal information, according to a study released in April by research firm Gartner.
Shipp adds that this new technique, which has only been detected in Brazil, is probably being tested for wider deployment. That's what happened with first-generation phishing attacks that were tested in Australia before being directed at users in the United States.
Only systems that have enabled Windows Script Host are vulnerable to this attack. WSH lets users run VBScript and JScript scripts within the Windows operating system. Sophos plc, an antivirus company, offers instructions on how to disable WSH.
"Most businesses these days probably have this disabled," Shipp says. "But home users are more vulnerable
Regards,
Evan M. Inker (New York) x. 4615
**************************************************************************** This message contains confidential information and is intended only for the individual or entity named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e-mail transmission. If verification is required please request a hard-copy version. This message is provided for informational purposes and should not be construed as an invitation or offer to buy or sell any securities or related financial instruments. GAM operates in many jurisdictions and is regulated or licensed in those jurisdictions as required. ****************************************************************************
------_=_NextPart_001_01C4C353.D290BFA0 Content-Type: text/html
Message
size=2>Warnings On New Phishing Threat Nov. 3, 2004
New, "more insidious" phishing scam is triggered when unsuspecting users open an E-mail.By Thomas Claburn Opening the wrong E-mail may soon be enough to empty your bank account. In an effort to woo security-conscious computer users, "phishers" have come up with a new technique to harvest online banking details without requiring users to click on a Web link and enter personal information on a submission form. This new form of attack, directed specifically at users of online banking, runs a script when a phishing E-mail message is opened, according to E-mail and virus security company MessageLabs Ltd. The script tries to rewrite the host files on the machine of the recipient. On subsequent attempts to access online banking services, victims will unknowingly be redirected to a fraudulent Web site designed to capture their log-in details.
Alex Shipp, senior antivirus technologist at MessageLabs, says such developments only make it harder to defend against phishing. Traditional phishing attacks rely on tricking the user into following a Web link and then entering personal information. "This one is much more insidious," he says.
Some 3% of those targeted by phishers reveal personal information, according to a study released in April by research firm Gartner.
Shipp adds that this new technique, which has only been detected in Brazil, is probably being tested for wider deployment. That's what happened with first-generation phishing attacks that were tested in Australia before being directed at users in the United States.
Only systems that have enabled Windows Script Host are vulnerable to this attack. WSH lets users run VBScript and JScript scripts within the Windows operating system. Sophos plc, an antivirus company, offers href="http://www.sophos.com/support/wsh.html" target=_blank>instructions on how to disable WSH.
"Most businesses these days probably have this disabled," Shipp says. "But home users are more vulnerable
Regards,
Evan M. Inker (New York) x. 4615
****************************************************************************
This message contains confidential information and is intended only
for the individual or entity named. If you are not the named addressee
you should not disseminate, distribute or copy this e-mail.
Please notify the sender immediately by e-mail if you have received
this e-mail by mistake and delete this e-mail from your system.
E-mail transmission cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed, arrive
late or incomplete, or contain viruses. The sender therefore does not
accept liability for any errors or omissions in the contents of this
message which arise as a result of e-mail transmission.
If verification is required please request a hard-copy version.
This message is provided for informational purposes and should not
be construed as an invitation or offer to buy or sell any securities or
related financial instruments.
GAM operates in many jurisdictions and is
regulated or licensed in those jurisdictions as required.
****************************************************************************
------_=_NextPart_001_01C4C353.D290BFA0-- ____________________________ NYLXS: New Yorker Free Software Users Scene Fair Use - because it's either fair use or useless.... NYLXS is a trademark of NYLXS, Inc
|
|