Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2873
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2857
Total: 2858









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 22. April 2008., 19:31:36 »



Phishers are continuously seeking for new victims so although it seems like they’ve stopped their malicious 
activities, they're actually launching them in a different  corner of the world. What seems to be one of their
latest targets is Panama, a country which has been often avoided by phishing scams. According to Dmitry of Kaspersky Lab, a new phishing attack aiming to steal info from Panama users has been spotted on the web being sent by what seems to be a Spanish speaking phisher.

It looks like the victims were invited to access an e-card provided by the Latin American service Gusanito but, once a user clicked on the provided link, he was asked to download and install a file called 001002003.exe.

"The malicious program adds an IP record for the BBV Panama domain to the local DNS file. The 'title' field, which includes a phrase meaning 'They might not notice', indicates that the author is almost certainly Spanish speaking," the Kaspersky official wrote.

In case an affected client attempted to visit the website of the bank, he was instantly redirected to a whole fake copy of the page, probably with the purpose of stealing private information such as names, addresses and financial details.

"As I mentioned above, malicious users try and spread their creations within a limited area in order to evade detection by antivirus solutions for as long as possible. This case shows that the tactic does work, to some extent – three days after the attack, only 2 antivirus companies were detecting the malicious program. One of them was Kaspersky Anti-Virus, which detects the culprit behind this latest attack as Trojan.Win32.Qhost.alc," Dmitry added.

Just like usual, an up-to-date security solution is welcome, so in case you feel yourself vulnerable to this kind of scams, hit the update option and let the application do its job.

(Copyright by SoftPedia)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023