IPhone scams ramp up, target overeager buyers
One 'Apple iPhone' site wants payment by Western Union or MoneyGram
Computerworld - Hackers are playing off the buzz about Apple Inc.'s iPhone to craft malware targeting people who plan to buy the device or believe they've won one in a contest.
Over the weekend, Sunbelt Software Distribution Inc. spotted a custom-built Trojan horse that redirects unwitting iPhone shoppers to a bogus Web site when they surf to iphone.com, a legitimate address that normally takes users to Apple's own iPhone site.
The Trojan horse, which has not yet been named by antivirus vendors, produces a pop-up when users on infected Windows PCs head to either Yahoo.com or Google.com. The pop-ups tout iPhone.com as "the only place to buy iPhone," and use the Apple logo and the actual price ($499) of the 4GB model to add weight to the offer.
The Trojan horse pulls content from the infected machine and injects code into Microsoft Corp.'s Internet Explorer browser to build what looks like an Apple-owned site. As the duped buyer makes his way through the purchase screens, he selects the iPhone model, its color -- a dead giveaway, since the iPhone comes in only one design -- and then is told to send the money via Western Union or MoneyGram. According to Eckelberry, the recipient is in Latvia, a hacker hotbed like its Baltic neighbors and former occupier, Russia.
Other iPhone-associated scams are on the prowl, added Secure Computing Corp., another security software maker. For example, Secure Computing has detected a rogue Web site that hosts a multi-exploit strike package, and it found spams that dangle free iPhones in front of users to get them to click through a link to the attack URL.
The malicious site, said Secure, packs more than 10 exploits against both patched and unpatched ActiveX vulnerabilities in Windows and/or Internet Explorer. If any one of the exploits is successful, the PC is hijacked and turned into a spam-spewing bot. Rootkit components in the malware try to cloak it from antivirus scanners.
"This threat is particularly insidious in that scripts contain exploit code for multiple vulnerabilities to improve the hacker's chances of gaining the necessary access to install the rootkit/spambot malware," said Paul Henry, vice president of technology evangelism at Secure.
ScamBusters.org, a site that has been tracking Internet scams and hoaxes since 1994, posted a list of iPhone scam predictions last week. ScamBusters.com has already seen several prove out, including its No. 6, "Fake iPhone Web sites and phishing scams" and No. 7, "iPhone viruses, Trojans and spyware."
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Macintosh White Papers | Webcasts