Security Incidents mailing list archives
Re: A pretty neat Chase Phish
From: Bob <Bob () dexis net>
Date: Mon, 13 Mar 2006 12:20:04 -0800
Yes, my intent was not to have knowledgeable persons see all the errors. I feel that this phish which is in circulation will trap a lot of persons who are NOT savvy. The same ones who send emails to "everyone" because the emails tell them to.I sent this to chase also, so I am not claiming anything other than when viewed in certain browsers, it can confuse average joes or jills.
I am setting my mail servers to stop this kind of email from getting to one of my customers without my system marking it as a probable phish.
I have some friends who are not educated in the net and some have filled in information and were shocked to find money missing from their checking accounts.
This is a serious problem and most phish sites get closed right away, but this one has been live for at least 5 days already.
I could not forward the actual email, as securityfocus refuses to allow that and returned it to me as unacceptable.
That is a shame, because the actual email was very misleading as the hypertext was not visible and appeared only as a "login" prompt
The main problem here is that it uses Google to redirect and therefor is hard to trace to the real site.This is becoming more prevalent as Google and others do not qualify the redirects, so there is more to this problem than just the phish, as they are using other tools to mask the actual link to the phish site.
Bob Robin wrote:
Some notable distinctions are: 1. yes, it does say it is an HTTPS address, however, 2. there is no security certificate in the bottom right corner. 3. there is no security certificate information in the properties tab for this page. 4. the URL does NOT start with www.chase.com 5. the browser even shows the IP rather than Chase.com 6. if you do a whois lookup on the IP at ARIN you'll see its registered in Latin American/Caribbean registry 7. if you use neotrace pro you'll see that the IP is in Santa Fe De Bogota 8. the are errors on the page..... Just my two cents.......... Robin Noyes -----Original Message-----From: Bob [mailto:Bob () dexis net] Sent: Saturday, March 11, 2006 7:20 PMTo: incidents () securityfocus com Subject: A pretty neat Chase Phish This in one of the PHISHES I caught yesterday. It is still active as of this emailIt purports to be Chase Bank and wants me to validate my information, how clever.But this is a VERY SOPHISTICATED PHISH --- it looks real and even simulates an HTTPS addressIt does appear different in different browsers, looks most authentic in IE, Firefox looks pretty bad and non-convincing.http://www.google.com/url?q=http://200.75.49.126/webpai/webpai/images/chase_ com/index.html
Attachment:
Bob.vcf
Description:
Current thread:
- A pretty neat Chase Phish Bob (Mar 13)
- RE: A pretty neat Chase Phish Robin (Mar 14)
- Re: A pretty neat Chase Phish Valdis . Kletnieks (Mar 14)
- RE: A pretty neat Chase Phish Jason Burton (Mar 23)
- <Possible follow-ups>
- Re: A pretty neat Chase Phish Bob (Mar 14)
- RE: A pretty neat Chase Phish Robin (Mar 14)