The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   The Coat Room (http://hintsforums.macworld.com/forumdisplay.php?f=8)
-   -   Very authentic-looking phishing e-mail (http://hintsforums.macworld.com/showthread.php?t=57208)

CAlvarez 06-18-2006 11:21 PM

Very authentic-looking phishing e-mail
 
I get bad ones all the time, but I just got one that is very convincing. I bet lots of people will fall for it. First off, it came address to ME by name at my real Paypal address (an address I use ONLY for Paypal). So it looks like someone I've done business with in the past has sold my address to spammers. Secondly, it uses reasonably good grammar and proper spelling. And finally, the URL is nicely diguised so a non-technical reader would likely assume it's a real URL. The site is well done and it uses real, live credit card authentication (I entered bogus but plausible info to test it, and it failed authentication).

As always, the only safe way to be protected is to delete ALL e-mails like this and then MANUALLY enter the address for Paypal or your bank into your web browser.

acme.mail.order 06-18-2006 11:29 PM

Care to post it here? I'd like to see how they are hiding the url.

solipsism 06-19-2006 12:05 AM

I'm curious too.

hayne 06-19-2006 12:13 AM

Quote:

Originally Posted by CAlvarez
So it looks like someone I've done business with in the past has sold my address to spammers.

Don't forget the possibility that that person's machine has been infected with a virus or other malware which is sending out the collected email addresses. Or even that their machine has been taken over and is being used to send out the phishing email!

voldenuit 06-19-2006 01:02 AM

What are you going to do about it ?
Have you been able to find out more about this specific scam, by googling for the fraudulent site, for example ?

Might sending a word of caution to your PayPal correspondents be appropriate ?
haynes suggestion sounds like quite a likely explanation to me.

Norm Nager 06-20-2006 12:42 PM

See this Macworld report and discussion.

http://www.macworld.com/news/2006/06...ypal/index.php

CAlvarez 06-20-2006 08:02 PM

I can't think of anything useful to do about it other than report it to Paypal and spread the info on forums like this. On another forum, several people reported getting the same thing.

http://www.cbr1100xx.org/temp/jun/paypal.png

solipsism 06-20-2006 08:16 PM

Carlos, what is the destination of the hyperlink?

fat elvis 06-20-2006 08:27 PM

FWIW, the account info which was blacked out is still legible (in a photo editing program). I tried viewing it just to see if it was possible. It was suspect because the brush you used was feathered and as a result not 100% black.

I doubt many nefarious characters are in this forum, but better safe than sorry.

ThreeDee 06-20-2006 09:24 PM

It's easy to spoof a link:

http://www.apple.com

Anyway, just check the full email headers to see where it came from, although most people won't bother to look.

hayne 06-20-2006 09:42 PM

In Mail.app, you just hover the mouse over the link and it tells you the actual URL as a tooltip. I use this all the time to detect phishing emails, almost all of which are already classified as Junk by Mail's junk mail filter.
You will usually see that the URL is something like paypal.evildoers.com or just an IP address.

solipsism 06-20-2006 09:46 PM

The trickier ones will do a http://www.paypal.com-cgi-bin.evildo.../from/you.html

I've even seen one that used the actual numerical value of the IP address (not the IP address) to create the spoof. I'm trying to remember the math, but so far I'm coming up short.

ThreeDee 06-20-2006 10:06 PM

Another one is http://www.paypal.com@192.168.0.100/cgi-bin/haha.pl, but Camino and Firefox catch the spoof and warn you.

They sometimes use ascii numbers/symbols/whatever to confuse thr browser/mail app.

Norm Nager 06-20-2006 11:01 PM

Quote:

Originally Posted by hayne
In Mail.app, you just hover the mouse over the link and it tells you the actual URL as a tooltip.

Is there a way to do something like that when a link appears on a website, such as in a forum, accessed by Safari and/or Firefox. (I know that both browsers have been upgraded to deal with some spoofing. And PithHelmet, which I use with Safari, has a preference that can be selected to "check host spoofing.)

Respectfully, Norm

Edited to add: Specific example, the apple.com link in ThreeDee's post that take you to a Microsoft site.

solipsism 06-20-2006 11:08 PM

Quote:

Originally Posted by Norm Nager
Is there a way to do something like that when a link appears on a website, such as in a forum, accessed by Safari and/or Firefox. (I know that both browsers have been upgraded to deal with some spoofing. And PithHelmet, which I use with Safari, has a preference that can be selected to "check host spoofing.)

Respectfully, Norm

Edited to add: Specific example, the apple.com link in ThreeDee's post that take you to a Microsoft site.

1) Use the Status Bar at the bottom of the window. If you don't have one turn it from teh Menu Bar by choosing View => Show Status Bar.

2) I have a plugin, app or component that creates a small box with the address when I hover over a link. I'll have to hunt it down as I can't remember it's name.

Norm Nager 06-20-2006 11:41 PM

Quote:

Originally Posted by solipsism
1) Use the Status Bar at the bottom of the window. If you don't have one turn it from the Menu Bar by choosing View => Show Status Bar.

Thanks very much. What a pleasant surprise to see that this works in both Safari and Firefox!

Respectfully, Norm

CAlvarez 06-21-2006 04:23 PM

Quote:

I doubt many nefarious characters are in this forum, but better safe than sorry.
Yeah, I figured it wasn't a completely secure job, but I wasn't sure why I was blocking it out anyway. It's not like that's secret info.

The URL is:

http://www.paypal.com.webscr-cmd-j4u...e.com&ref=pp18

So while it's obvious to most of us here, the common user would simply see the first part and assume it's a valid URL. Mail was happy to open the URL for me.

acme.mail.order 06-22-2006 09:19 AM

The page Carlos got pulls it's images form paypalobjects.com (legit). Stupid question, but I wonder why doesn't paypal just check the referrer page for it's images and sent out alternate graphics?

hayne 06-22-2006 12:36 PM

Quote:

Originally Posted by acme.mail.order
I wonder why doesn't paypal just check the referrer page for it's images and sent out alternate graphics?

That would work, but I guess PayPal doesn't want to get into an arms race with the phishers. The latter could just grab the images from a real PayPal page and copy them to their own server. Using the REFERER header would put more of a load on PayPal's servers.
Also, the current situation allows PayPal to see in their logs how much phishing is going on.

voldenuit 06-22-2006 01:29 PM

Quote:

Originally Posted by acme.mail.order
The page Carlos got pulls it's images form paypalobjects.com (legit). Stupid question, but I wonder why doesn't paypal just check the referrer page for it's images and sent out alternate graphics?

If that's true, then two particularly stupid morons have met:
The phishers for basically waving their hands while jumping up and down yelling: "we so 0wn you, we even steal your bandwidth to serve our scam pages" and paypal for not doing what acme suggested. Then, like hayne said, they'd at least have to copy the site.

Anyway, as long as paypals policy in these matters, once you cut through the crap, basically reads: "Should Bad Things happen, whoever makes a case that costs paypal as little money as possible" wins, don't expect anything significant to happen.
Some PP customers get screwed real bad. Typically PP charges the party stupid enough to leave some money on his account, case closed.

ThreeDee 06-22-2006 01:54 PM

Doing a Whois on the domain returns odd stuff:
http://www.dnsstuff.com/tools/whois....d-j4udria6.com

EDIT: Found it, probably false information:

Registrant:
Sorial, Andrew

5040 NW 24th Circle
Boca Raton, FL 33431-4330
US

http://www.google.com/maps?f=q&hl=en...06781&t=h&om=1

ThreeDee 06-22-2006 02:05 PM

BTW, did you at least report it to PayPal yet?

spoof@paypal.com

acme.mail.order 06-22-2006 08:47 PM

Quote:

Originally Posted by hayne
Using the REFERER header would put more of a load on PayPal's servers.
Also, the current situation allows PayPal to see in their logs how much phishing is going on.

Yeah, it's not perfect. I sent the suggestion to PayPal and they actually sent me a personally-written reply (not canned or an autoresponder) , so at least they hire thinking staff!

chabig 06-22-2006 10:05 PM

Any email that asks you to confirm account information and threatens loss of privileges unless done within a certain time period should be considered a phishing scam. No reputable business will do that.

voldenuit 06-23-2006 03:53 AM

Quote:

Originally Posted by chabig
Any email that asks you to confirm account information and threatens loss of privileges unless done within a certain time period should be considered a phishing scam. No reputable business will do that.

Not so sure, how would an organization deal with it if their customer database, including login information, gets stolen ?
Sit tight ?
Hopefully not.

chabig 06-23-2006 07:41 AM

A reputable business whose customer database got stolen would notify their customers about the security breach and ask them to take some action. However, phishing emails always contain the additional threat that if action is not taken within a certain timeframe (usually a few days), the account will be limited or terminated in some way. No reputable business would send a threat to their customers.

ThreeDee 07-19-2006 06:27 PM

BTW, they (PayPal, feds, whoever) closed down the site. not sure exactly when, though.


All times are GMT -5. The time now is 04:09 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.