IPhone scams ramp up, target overeager buyers
One 'Apple iPhone' site wants payment by Western Union or MoneyGram
Computerworld - Hackers are playing off the buzz about Apple Inc.'s iPhone to craft malware targeting people who plan to buy the device or believe they've won one in a contest.
Over the weekend, Sunbelt Software Distribution Inc. spotted a custom-built Trojan horse that redirects unwitting iPhone shoppers to a bogus Web site when they surf to iphone.com, a legitimate address that normally takes users to Apple's own iPhone site.
The Trojan horse, which has not yet been named by antivirus vendors, produces a pop-up when users on infected Windows PCs head to either Yahoo.com or Google.com. The pop-ups tout iPhone.com as "the only place to buy iPhone," and use the Apple logo and the actual price ($499) of the 4GB model to add weight to the offer.
The Trojan horse pulls content from the infected machine and injects code into Microsoft Corp.'s Internet Explorer browser to build what looks like an Apple-owned site. As the duped buyer makes his way through the purchase screens, he selects the iPhone model, its color -- a dead giveaway, since the iPhone comes in only one design -- and then is told to send the money via Western Union or MoneyGram. According to Eckelberry, the recipient is in Latvia, a hacker hotbed like its Baltic neighbors and former occupier, Russia.
Other iPhone-associated scams are on the prowl, added Secure Computing Corp., another security software maker. For example, Secure Computing has detected a rogue Web site that hosts a multi-exploit strike package, and it found spams that dangle free iPhones in front of users to get them to click through a link to the attack URL.
The malicious site, said Secure, packs more than 10 exploits against both patched and unpatched ActiveX vulnerabilities in Windows and/or Internet Explorer. If any one of the exploits is successful, the PC is hijacked and turned into a spam-spewing bot. Rootkit components in the malware try to cloak it from antivirus scanners.
"This threat is particularly insidious in that scripts contain exploit code for multiple vulnerabilities to improve the hacker's chances of gaining the necessary access to install the rootkit/spambot malware," said Paul Henry, vice president of technology evangelism at Secure.
ScamBusters.org, a site that has been tracking Internet scams and hoaxes since 1994, posted a list of iPhone scam predictions last week. ScamBusters.com has already seen several prove out, including its No. 6, "Fake iPhone Web sites and phishing scams" and No. 7, "iPhone viruses, Trojans and spyware."
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!