Phishing Sites Getting More Advanced with SSL


Phishing is a difficult enough form of fraud to avoid for most computer users, but when some of the biggest names in the financial industry fail to do their part to detect and eliminate these online scams, consumers often are placed in an untenable situation.

Case in point: A source recently forwarded a link to one of the “best” phishing attacks I’ve ever seen. This one — targeting the tiny Mountain America credit union in Salt Lake City, Utah — arrives in an HTML-based e-mail telling recipients that their Mountain America credit union card was automatically enrolled in the Verified by Visa program, a legitimate security program offered by Visa that is supposed to provide “reassurance that only you can use your Visa card online.”

The fake MountainAmerica.net Web site

The e-mail includes the first five digits of the “enrolled card,” but those five digits are found on all Mountain America bank cards, so that portion of the scam is likely to be highly convincing for some recipients. The message directs readers to click on a link and activate their new Verified by Visa membership.

Beware, make sure your non tech-savvy friends & relatives are aware of how tricky these scammers are getting.

Someone YOU know could be falling for this soon.

Sources: SlashdotWashington Post

Posted in: Phishing

,


Latest Posts:


Sooty - SOC Analyst All-In-One CLI Tool Sooty – SOC Analyst All-In-One CLI Tool
Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process.
UBoat - Proof Of Concept PoC HTTP Botnet Project UBoat – Proof Of Concept PoC HTTP Botnet Project
UBoat is a PoC HTTP Botnet designed to replicate a full weaponised commercial botnet like the famous large scale infectors Festi, Grum, Zeus and SpyEye.
LambdaGuard - AWS Lambda Serverless Security Scanner LambdaGuard – AWS Lambda Serverless Security Scanner
LambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner.
exe2powershell - Convert EXE to BAT Files exe2powershell – Convert EXE to BAT Files
exe2powershell is used to convert EXE to BAT files, the previously well known tool for this was exe2bat, this is a version for modern Windows.
HiddenWall - Create Hidden Kernel Modules HiddenWall – Create Hidden Kernel Modules
HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers.
Anteater - CI/CD Security Gate Check Framework Anteater – CI/CD Security Gate Check Framework
Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of filenames, binaries, deprecated functions, staging variables and more.


5 Responses to Phishing Sites Getting More Advanced with SSL

  1. Navaho Gunleg February 22, 2006 at 11:19 am #

    Yeh they are getting nastier by the day, and support for languages is increasing too.

    I always warn people that,
    1) banks usually do not do this without a snail-mailing informing about it,
    2) your bank doesn’t send those messages in English in the first place.

    Well the latter is rather obsolete now. About a year ago I’ve noticed the phishing attempts in my Junk folder, in badly translated Dutch (probably using some online translation service).

    Recently months I see them with better language. I guess that must be local people picking up on the same scam.

    So they now clone a website, including an SSL certificate that seems convincing enough to trick most people.

    If they would include real, complete, bank information from some leaked customer database, then things could get really scary…

  2. Darknet February 22, 2006 at 3:41 pm #

    Yeah I have noticed a few in local languages at various business around the world, they are definately getting a LOT more refined and advanced than the olden days.

    Last time was a saved version of hotmail login on a geocities site, and it still used to a fool a few people back in the day.

    Now they have proper domains, often with rotating DNS entries so they can’t shut the sites down, proper SSL certificates, first 4 digits of your credit card number…Pretty scary.

  3. karan February 23, 2006 at 12:59 pm #

    As a parody….I read about this simple scam about a bank website being cloned. Users actually logged on to this site and punched in their personal details without any apprehensions about security and exposure.

    These guys were later tracked when the bank allowed them to carry out a transaction using a stolen credit card number on e-bay. The guy was caught when he went to collect his nokia phone from the dealer.

    I was surprised how a user could be so gullible – the site itself was a shoddy clone of the original site with glitches in the background colors and layout. There will always be takers for the bait (big or small) – no matter how much you try to educate and publicize. Goes to show – ignorance is not always bliss…

  4. burn666 February 27, 2006 at 3:51 am #

    Lol!

    Ironically enough, just before reading this post i received an email ostensibly from JP Morgan for a bill payment… Gotta admit though, those phishers have really improved on their previously discernable minor errors in grammar, layout, and even product/services ‘lingo’.

    Check it:

    This is your official notification from Chase Bank that the service(s) listed below will be deactivated and deleted if not renewed immediately. Previous notifications have been sent to the Chase OnlineSM Contact assigned to this account. As the Primary Contact, you must renew (overview) the service(s) listed below or it will be deactivated and deleted.

    SERVICE: Chase Bank Chase OnlineSM with Bill Payment. EXPIRATION: February 25, 2006

    We recently reviewed your account, and suspect that your Chase OnlineSM Account may have been accessed by and unauthorized third party.

    Protecting the security of your account and of the Chase Networks is our primary concern.

    Oh the irony eh? ;)

    Was even curious enough to check out the site they had set up and it wasn’t half bad. Compare it for yourselves (login is obviously any username and password) here and contrast it with the actual Chase homepage.

    Still, its a worrying trend…

  5. madmax April 20, 2007 at 2:28 pm #

    hey Burn666

    I just tried goin to tht fake Chase site

    Turns out tht its been deleted!!