Your browser does not seem to support CSS. If images appear below, please disregard them.
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31
Sponsored Links
Latest Postings
Topic Options
Rate This Topic
#39121 - 12/08/04 11:01 AM Banking site hijacked by fraudsters
Joined: Nov 2002
Posts: 1,146
Ice Offline
UGN News Staff
Ice Offline
UGN News Staff

Joined: Nov 2002
Posts: 1,146
raudsters have used a clever web-programming trick to turn a legitimate banking site into a tool for stealing account information.

Suntrust, a bank based in Georgia, US, has fallen foul of the deception, according to web security experts who received emails designed to swindle customers.

Researchers at UK-based web-monitoring firm Netcraft received emails claiming to come from Suntrust that ask customers to verify their account information using a link embedded in the message.

But the email was not sent from the bank's own servers and the web page it linked to contained extra characters in the URL address line - added on to the bank’s legitimate web address. So, while the page was hosted by the bank’s servers, hackers had overlaid it with altered elements to give the appearance of a legitimate “Account Verification” page.

Decoding these altered elements revealed a link to an alternative server controlled by the hackers. Customers entering their account information onto the overlaid page were inadvertently sending their details to be recorded by the hackers’ web server.

Pass it on

Netcraft engineer Paul Mutton says the "phishing" trick is made worse because it exploits the bank’s own site. "As far as the user is concerned, they are visiting a legitimate site," he says.

Known as a "cross-site scripting vulnerability" the trick allows an outsider to add to and alter a real web page with their own text and links. The problem can be exploited when the code used by the website operator - to process information for their web page - has not been written specifically to exclude outside, or untrusted, data.

"If you're web programming, you should really make sure data [entered in a URL] is sanitised," Mutton adds.

Since being informed by Netcraft, Suntrust has modified its site to prevent the trick working. Following a link from one of the phishing emails now produces a genuine web page.

Experts had previously warned that many sites could be vulnerable to cross-site scripting. A report released in September 2004 by UK computer security firm Next Generation Security (NGS) suggested that as many as nine out of 10 bank websites could be open to this type of flaw.

Source: News Scientist

Good artists copy, great artists

Sponsored Links
#39122 - 12/08/04 03:36 PM Re: Banking site hijacked by fraudsters
Joined: Feb 2002
Posts: 7,194
Gremelin Offline
Community Owner
Gremelin Offline

Community Owner

Joined: Feb 2002
Posts: 7,194
Portland, OR; USA
I've been getting these emails for years... It's sad though as I don't bank with them lol...

Donate to UGN Security here.
UGN Security, Back of the Web, and VNC Web Services Owner

Member Spotlight

Portland, OR; USA
Posts: 7,194
Joined: February 2002
Show All Member Profiles 
Forum Statistics
Most Online1,567
Apr 25th, 2010
Top Posters(All Time)
UGN Security 38,905
Gremelin 7,194
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Newest Members
Herbert_Sherbert, codemauve, Lillysdragon1984, Brewwit, boa
2157 Registered Users
Who's Online Now
0 registered members (), 2 guests and 3 spiders.
Latest News