Computer Crime Research Center

phishing/japan.gif

Barclay's clients under attack, phishing

Date: September 15, 2006
Source: financialmirror.com


PandaLabs has detected a large-scale phishing attack targeting clients of Barclays Bank's online services and involving at least 61 variants of a spoof email. The scale of this attack has seen the number of fraudulent emails detected by PandaLabs increase by 30% in just a few hours. In fact, of all phishing messages currently analyzed, some 64% target Barclays' clients.

Given the number of variants detected, estimates put the number of these emails in circulation at several million.

In order to combat this threat, Panda Software offers users the Panda ActiveScan free online scanner and an evaluation version of the Panda Internet Security 2007 security suite.

The false emails received by users are designed to appear as if they have been sent from Barclays' customer services, with the subject field chosen at random from a list of options. Some of these options include:

Barclays bank official update, Barclays bank - Security update, Please Read or Verify your data with Barclays bank (the full list is available at Panda Software's Virus Encyclopedia).

The message text, imitating Barclays' corporate image, informs users that the bank is upgrading software and that they should go to a link in order to confirm their bank details.

Users that click on the link will access a form, similar to those used by the bank, requesting their account number, credit card number or PIN.

There are 61 different variants of this message, using a wide range of message subjects and sender addresses. This tactic is used deliberately in order to bypass antispam systems. According to Luis Corrons, director of Pandalabs "We believe this could be a coordinated attack, initiated in several places at the same time in order to spread rapidly and gather a considerable amount of confidential bank details in record time."

It is significant that not all of the email messages point to the same Internet address in order to collect stolen data, but in fact the criminals have prepared at least five false domains to hinder attempts to close all of them down. In any event, PandaLabs is contacting the technicians in charge of the sites that have been located --all of them in Korea -- in order to shut them down as quickly as possible.
Original article



Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo