Computer Crime Research Center


New phishing attack outsmarts typical defenses

Date: February 17, 2005
Source: PC World Australia
By: Andrew Brandt

You might think that you know how to protect yourself from phishing: Don't click the links in e-mail that purports to be from banks or other institutions. But that defense is no longer ironclad: Phishers have found a new way to snare data without your clicking a link.

Anyone with an inbox has seen a standard phishing attack: You get an e-mail warning you that something terrible has happened to your bank account and asking you to go to the bank's site to reenter your personal data. If you click the link in the e-mail, however, you go not to your bank but to a server run by a criminal who gathers all the data you enter. The best advice has been to ignore the link in the e-mail and instead type the URL of your bank's site into your browser. But that was then. Now -- without protection -- you can't even trust your browser when you type the address yourself.

Here's how the new phishing scam works. You receive an HTML e-mail message, and you open (or even just preview) the message in your e-mail client software. Windows PCs lacking one particular Microsoft security patch (available here) will run a tiny JavaScript applet as the client renders the HTML. The QHosts Trojan horse applet modifies the PC's Hosts file so that when you type in a bank's URL you actually go to a site controlled by the fraudsters. Since phishers have gotten very good at mimicking real sites, you may never know you're at the wrong one.

Spybot Search &Destroy lets you "lock" the Hosts file, preventing any other program from changing it. The Options tab in WinPatrol causes that program to pop up a dialog box if software attempts to change your Hosts file. And in the paid ZoneAlarm Pro firewall or ZoneAlarm Security Suite, you can enable an option in the Privacy Settings menu called Hosts File Protection that both locks the Hosts file and alerts you when something tries to change it.

While the impact of QHosts has been limited so far, phishers are likely to use this new technique much more in the near future. The fact that the Hosts file is easy to protect will be cold comfort to future victims who get hit with the next QHosts-like phishing scam.

Add comment  Email to a Friend

Discussion is closed - view comments archieve
2007-01-16 05:47:04 - Hello, Very Excellent site.... None
2007-01-08 05:45:56 - Hello, Very good site with nice info's... None
2006-12-30 01:11:15 - Hello, very nice site!... None
2006-12-24 13:27:37 - Hello, This site is simply very good...... None
2006-12-21 11:50:38 - Hello, wonderful site.... User
2006-12-18 17:00:29 - Hello, This site is simply very good...... None
2006-11-23 23:35:39 - Great new site about gays gay wrestling... Johnnie M.
2006-11-17 19:16:42 - Just hot, just swift, just hard - my love!... Jay
2006-11-06 23:31:23 - This is a fetish site russian femdom video... Dennis
2006-10-22 00:42:21 - Hello, Very good site with nice info's... Tosha
Total 12 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo