Brazil; that's no surprise. India is another one that's sending out fraudulent PayPal emails with obfuscated URL's trying to get user's login info. This is specifically why I have ALL of LACNIC and APNIC's IP ranges blocked.
Yeah, decent AV software should prevent any auto-executed script from happening, plus OE should be set to open/view emails in the "Restricted sites" zone which should also prevent it. I think OE is set that way by default now from 2k on, I know it's that way in XP. A word more on these "obfuscated" URL's: I just use that term since the full URL is not seen in HTML email, only the prefix which is the VALID URL to where you THINK you're going. There's also an IE exploit that deals with this, but in this case I'm just speaking of "cloaked" URL's. When you click these, the URL in the address bar at the site APPEARS valid, but it's not. If you check the HTML code of the email, you'll see something like [EMAIL PROTECTED] . It may or may not be the @ symbol, sometimes that won't work for some URL's. It might be a % and few other characters in place of the @, but these characters is what redirects you to the criminal domain. Like Jeff mentioned, reading HTML email in plain text will show these URL's as they REALLY are, but that can hurt your HTML content newletters and the like and you have to switch back and forth. Reading in plain text, or, having email open in the Restricted Sites zone along with the best AV software is the only way to notice these things. For newbies, they should subscribe to newletters in plain text ONLY, then set OE to view all email in plain text since that's the only SURE way of noticing it. The later would work for the more computer savvy people. I use that method, plus I always check the HTML code anyway of suspect emails. Just hovering over the link, or even copying the link shortcut and pasting it to view it won't always show the FULL REAL URL and the criminal domain suffix--it depends on the cloaking method used. That's why on suspected emails I just click "forward" on the email (and you have to keep it in HTML format), then open the "Source" tab, then I look for the URL(s) in the code. Of course if you use SpywareBlaster and SpyBot to name only two (which everyone SHOULD), these will lock your Hosts file so it can't be changed in this specific instance. (They are not set that way by default). (Harold for some reason I never got your original post, so I may not be able to see any of your replies. Maybe your IP changed to a range I had to block previously). -Clint God Bless Clint Hamilton, Owner http://OrpheusComputing.com ----- Original Message ----- From: "Jeff Dougherty" Harold, This is why I have my Outlook Express set to read mail in plain text only. Jeff ----- Original Message ----- From: "Harold B" <[EMAIL PROTECTED]> Hello again, I usually ignore these "the sky is falling" emails that often get around the internet. The following came to me and I'd like to know if there is any validity to it. It doesn't matter to me because as a matter of course, I always have the VBScript Script File disabled (I don't even know what it's used for). I quote: "A new and very dangerous Internet attack was reported this week in Brazil. This new danger is a phishing attack. Phishing is computer slang for attacks in which criminals pretend to be a bank or other institution. They try to trick you into giving up your password and user name. Most people have learned not to fall for this. But this new attack could fool the most careful people. Here's how it works: The criminals send you an e-mail (spam). When you open the e-mail, a small program called a script runs. Note that you only need to open the e-mail; there is no attachment. "The scripting program goes to your HOSTS file, located deep in your computer. The actual path in Windows XP is: C:\Windows\System32\Drivers\Etc\HOSTS It enters your bank's Web address--for instance, www.YourBank.com in the HOSTS file. It also enters an Internet Protocol (IP) number for the criminal's address. "The next time you need to surf to your bank, you attempt to go to www.YourBank.com. When you enter that address, or any other address, the browser first goes to the HOSTS file to find the IP number. If it isn't there (it normally would not be), it goes to a special computer on the Internet to find the IP number. "However, the criminals have put your bank's address in the HOSTS file, along with their IP number. So you are automatically sent to that IP number, which is the criminals' computer. It looks like the bank's Web site, so you enter your user name and password. That gives the criminals the information they need to enter your account and steal your money. How can you protect yourself? Some anti-virus programs guard against this kind of thing; others do not. To be safe, you must disable your computer's scripting ability. To do that: ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
