The Artima Developer Community
Sponsored Link

.NET Buzz Forum
Phishing...for EVIL!

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Scott Hanselman

Posts: 1031
Nickname: glucopilot
Registered: Aug, 2003

Scott Hanselman is the Chief Architect at Corillian Corporation and the Microsoft RD for Oregon.
Phishing...for EVIL! Posted: Jun 9, 2004 8:22 AM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by Scott Hanselman.
Original Post: Phishing...for EVIL!
Feed Title: Scott Hanselman's ComputerZen.com
Feed URL: http://radio-weblogs.com/0106747/rss.xml
Feed Description: Scott Hanselman's ComputerZen.com is a .NET/WebServices/XML Weblog. I offer details of obscurities (internals of ASP.NET, WebServices, XML, etc) and best practices from real world scenarios.
Latest .NET Buzz Posts
Latest .NET Buzz Posts by Scott Hanselman
Latest Posts From Scott Hanselman's ComputerZen.com

Advertisement

Just happened to get this in my evening email.  It's obviously a standard Phishing scam.  If you look at the source (as I usually do to most suspicious looking HTML email) you can see that the links point to urls like: http://www.scgi3-ebay-saw-cgi-ebayisapi-dll-registerenterinfo.xx.com.  Note that the first part of the URL is really just a very long subdomain, pointing to the evil person's actual domain (xx.com in this example.)  Additionally that domain's WHOIS record points to a fake person, blah blah.  Their domain points to freeservers.com which does roaming DNS which points to a webserver on their personal computer lord knows where.  When you submit your Credit Card it goes via an unencrypted Form POST right to their computer.  Evil!

What I found particularly interesting was what is revealed in this screen shot from my Outlook.  What's interesting...do you see it? 

The scrollbar is on the LEFT.  Further digging shows that the HTML body for this message was created with FrontPage and they've explicitly set the encoding to Windows-1252 and attempted to switch all the tags to dir="ltr."  However, Microsoft FrontPage when running in Right-To-Left Locales (Arabic, Hebrew, etc.) will default the HTML root tag as <html dir="rtl">.  As every OTHER tag in the document is explicitly marked dir="ltr" the document elements look OK, but since they missed the root tag, Outlook moves the scrollbar to the left, thus making their chicanery even more obvious.  Additionally it makes me wonder what country these folks are phishing from.

Read: Phishing...for EVIL!

Topic: Discussion group - Telerik r.a.d.Editor MCMS edition Previous Topic   Next Topic Topic: Learn How to Program Outlook using C#

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use