Brazil; that's no surprise.  India is another one that's 
sending out fraudulent PayPal emails with obfuscated URL's 
trying to get user's login info.  This is specifically why I 
have ALL of LACNIC and APNIC's IP ranges blocked.

Yeah, decent AV software should prevent any auto-executed 
script from happening, plus OE should be set to open/view 
emails in the "Restricted sites" zone which should also prevent 
it.  I think OE is set that way by default now from 2k on, I 
know it's that way in XP.

A word more on these "obfuscated" URL's: I just use that term 
since the full URL is not seen in HTML email, only the prefix 
which is the VALID URL to where you THINK you're going. 
There's also an IE exploit that deals with this, but in this 
case I'm just speaking of "cloaked" URL's.  When you click 
these, the URL in the address bar at the site APPEARS valid, 
but it's not.  If you check the HTML code of the email, you'll 
see something like 
[EMAIL PROTECTED] . 
It may or may not be the @ symbol, sometimes that won't work 
for some URL's.  It might be a % and few other characters in 
place of the @, but these characters is what redirects you to 
the criminal domain.  Like Jeff mentioned, reading HTML email 
in plain text will show these URL's as they REALLY are, but 
that can hurt your HTML content newletters and the like and you 
have to switch back and forth.  Reading in plain text, or, 
having email open in the Restricted Sites zone along with the 
best AV software is the only way to notice these things.  For 
newbies, they should subscribe to newletters in plain text 
ONLY, then set OE to view all email in plain text since that's 
the only SURE way of noticing it.  The later would work for the 
more computer savvy people.  I use that method, plus I always 
check the HTML code anyway of suspect emails.  Just hovering 
over the link, or even copying the link shortcut and pasting it 
to view it won't always show the FULL REAL URL and the criminal 
domain suffix--it depends on the cloaking method used.  That's 
why on suspected emails I just click "forward" on the email 
(and you have to keep it in HTML format), then open the 
"Source" tab, then I look for the URL(s) in the code.

Of course if you use SpywareBlaster and SpyBot to name only two 
(which everyone SHOULD), these will lock your Hosts file so it 
can't be changed in this specific instance.  (They are not set 
that way by default).

(Harold for some reason I never got your original post, so I 
may not be able to see any of your replies.  Maybe your IP 
changed to a range I had to block previously).
-Clint

God Bless
Clint Hamilton, Owner
http://OrpheusComputing.com

----- Original Message ----- 
From: "Jeff Dougherty"


Harold,
This is why I have my Outlook Express set to read mail in plain 
text only.
Jeff

----- Original Message ----- 
From: "Harold B" <[EMAIL PROTECTED]>

Hello again,

I usually ignore these "the sky is falling" emails that often 
get around the
internet. The following came to me and I'd like to know if 
there is any
validity to it. It doesn't matter to me because as a matter of 
course, I
always have the VBScript Script File disabled (I don't even 
know what it's
used for). I quote:

"A new and very dangerous Internet attack was reported this 
week in Brazil.
This new danger is a phishing attack. Phishing is computer 
slang for attacks
in which criminals pretend to be a bank or other institution. 
They try to
trick you into giving up your password and user name. Most 
people have
learned not to fall for this. But this new attack could fool 
the most
careful people. Here's how it works: The criminals send you an 
e-mail
(spam). When you open the e-mail, a small program called a 
script runs. Note
that you only need to open the e-mail; there is no attachment.

"The scripting program goes to your HOSTS file, located deep in 
your
computer. The actual path in Windows XP is:
C:\Windows\System32\Drivers\Etc\HOSTS It enters your bank's Web 
address--for
instance, www.YourBank.com in the HOSTS file. It also enters an 
Internet
Protocol (IP) number for the criminal's address.

"The next time you need to surf to your bank, you attempt to go 
to
www.YourBank.com. When you enter that address, or any other 
address, the
browser first goes to the HOSTS file to find the IP number. If 
it isn't
there (it normally would not be), it goes to a special computer 
on the
Internet to find the IP number.

"However, the criminals have put your bank's address in the 
HOSTS file,
along with their IP number. So you are automatically sent to 
that IP number,
which is the criminals' computer. It looks like the bank's Web 
site, so you
enter your user name and password. That gives the criminals the 
information
they need to enter your account and steal your money. How can 
you protect
yourself? Some anti-virus programs guard against this kind of 
thing; others
do not. To be safe, you must disable your computer's scripting 
ability. To
do that:
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to