Your browser does not seem to support CSS. If images appear below, please disregard them.
It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.
Previous Thread
Next Thread
Print Thread
Rate This Thread
#39121 - 12/08/04 11:01 AM Banking site hijacked by fraudsters  
Joined: Nov 2002
Posts: 1,146
Ice Offline
UGN News Staff
Ice  Offline
UGN News Staff

Joined: Nov 2002
Posts: 1,146
Likes: 1
Canada
raudsters have used a clever web-programming trick to turn a legitimate banking site into a tool for stealing account information.

Suntrust, a bank based in Georgia, US, has fallen foul of the deception, according to web security experts who received emails designed to swindle customers.

Researchers at UK-based web-monitoring firm Netcraft received emails claiming to come from Suntrust that ask customers to verify their account information using a link embedded in the message.

But the email was not sent from the bank's own servers and the web page it linked to contained extra characters in the URL address line - added on to the bank’s legitimate web address. So, while the page was hosted by the bank’s servers, hackers had overlaid it with altered elements to give the appearance of a legitimate “Account Verification” page.

Decoding these altered elements revealed a link to an alternative server controlled by the hackers. Customers entering their account information onto the overlaid page were inadvertently sending their details to be recorded by the hackers’ web server.


Pass it on

Netcraft engineer Paul Mutton says the "phishing" trick is made worse because it exploits the bank’s own site. "As far as the user is concerned, they are visiting a legitimate site," he says.

Known as a "cross-site scripting vulnerability" the trick allows an outsider to add to and alter a real web page with their own text and links. The problem can be exploited when the code used by the website operator - to process information for their web page - has not been written specifically to exclude outside, or untrusted, data.

"If you're web programming, you should really make sure data [entered in a URL] is sanitised," Mutton adds.

Since being informed by Netcraft, Suntrust has modified its site to prevent the trick working. Following a link from one of the phishing emails now produces a genuine web page.

Experts had previously warned that many sites could be vulnerable to cross-site scripting. A report released in September 2004 by UK computer security firm Next Generation Security (NGS) suggested that as many as nine out of 10 bank websites could be open to this type of flaw.

Source: News Scientist


Good artists copy, great artists
steal.

-Picasso
Sponsored Links
#39122 - 12/08/04 03:36 PM Re: Banking site hijacked by fraudsters  
Joined: Feb 2002
Posts: 7,195
Gremelin Offline
Community Owner
Gremelin  Offline

Community Owner

Joined: Feb 2002
Posts: 7,195
Likes: 3
Portland, OR; USA
I've been getting these emails for years... It's sad though as I don't bank with them lol...


Donate to UGN Security here.
UGN Security, Back of the Web, and VNC Web Services Owner

Member Spotlight
Gremelin
Gremelin
Portland, OR; USA
Posts: 7,195
Joined: February 2002
Show All Member Profiles 
Forum Statistics
Forums45
Topics47,460
Posts82,630
Average Daily Posts8
Members2,159
Most Online1,567
Apr 25th, 2010
Latest Postings
Top Posters(All Time)
UGN Security 40,624
Gremelin 7,195
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Liked Users (All Time)
§intå× Likes: 1
Cold Sunn Likes: 1
Crime Likes: 1
Cyrez Likes: 1
Ghost Likes: 1
Gremelin Likes: 4
Ice Likes: 1
unreal Likes: 1
Top Liked Users (30 Days)
No Data Found
Powered by UBB.threads™ PHP Forum Software 7.6.0
(Snapshot build 20160902)