I don't like spam!
Dec. 8th, 2003 06:19 pm... but by and large I just shrug and delete it, even though recently the sheer volume of the stuff has been truly incredible.
But today, on a whim, I went to look at the website for one of those Natwest scams. The mail claimed to be from support@natwest.com, and the text of the message was as follows:
Now, to me it's perfectly obvious that this isn't kosher. For one thing, the peculiar translationese ("will help you to avoid frequently fraud transactions and to keep your investments in safety"?) isn't at all what I'd expect from an official Natwest email. For another thing, I've never heard of a "Bank Mail"; it sounds like a scammy invention. (I'm sure people will now tell me that it's a perfectly legit term and has a very specific meaning!) But the real clincher is that I haven't had an account with Natwest for over 7 years now.
Nonetheless, I went to have a look at the site out of curiosity, and it's really quite impressive -- the site pointed to in the email looks just like the Natwest online banking login page. And indeed, https://www.nwolb.com/ is the Natwest OB page. So, as the TV show asks, "How do they do that?"
Well, that's when
sion_a pointed me at the source:
To log into your account, please visit the NatWest Online Banking
https://www.nwolb.com/
Weird linebreak, yeah, but so what? Well, after that "nwolb.com" comes an eternity of whitespace, followed by this:
:UserSession=2f4d0zzz899amaiioiiabv5589955&userrstste=SecurityUpdate&StateLevel=CameFrom@64.174.108.131/
Ah-HA. Suddenly it becomes a lot clearer (not that I know exactly what they're doing, but at least it tells me how one page can be a stinking great bear-trap and another apparently-identical page can be the genuine article).
This is a really, really dirty trick. I can't help but be impressed at the deviousness, but at the same time it's horrifying to think of how many people are likely to be taken in by this kind of thing. Oh, I know, it's probably old news by now (and indeed the IP address in the clever-hacky-stuff above is unpingable, suggesting that this one's already been nailed) but it's still a scary thought -- not least because even if this particular scam has been stopped, there's nothing to stop other people doing the same thing again, only more cleverly. And even without the added cleverness, there will always be new people to fall for the same old tricks...
But today, on a whim, I went to look at the website for one of those Natwest scams. The mail claimed to be from support@natwest.com, and the text of the message was as follows:
Dear Valued Customer,
- Our new security system will help you to avoid frequently fraud transactions and to keep your investments in safety.
- Due to technical update we recommend you to reactivate your account.
Click on the link below to login and begin using your updated NatWest account.
To log into your account, please visit the NatWest Online Banking https://www.nwolb.com/
If you have questions about your online statement, please send us a Bank Mail or call us at 0846 600 2323 (outside the UK dial +44 247 686 2063).
We appreciate your business. It's truly our pleasure to serve you.
NatWest Customer Care
This email is for notification only. To contact us, please log into your account and send a Bank Mail.
Now, to me it's perfectly obvious that this isn't kosher. For one thing, the peculiar translationese ("will help you to avoid frequently fraud transactions and to keep your investments in safety"?) isn't at all what I'd expect from an official Natwest email. For another thing, I've never heard of a "Bank Mail"; it sounds like a scammy invention. (I'm sure people will now tell me that it's a perfectly legit term and has a very specific meaning!) But the real clincher is that I haven't had an account with Natwest for over 7 years now.
Nonetheless, I went to have a look at the site out of curiosity, and it's really quite impressive -- the site pointed to in the email looks just like the Natwest online banking login page. And indeed, https://www.nwolb.com/ is the Natwest OB page. So, as the TV show asks, "How do they do that?"
Well, that's when
To log into your account, please visit the NatWest Online Banking
https://www.nwolb.com/
Weird linebreak, yeah, but so what? Well, after that "nwolb.com" comes an eternity of whitespace, followed by this:
:UserSession=2f4d0zzz899amaiioiiabv5589955&userrstste=SecurityUpdate&StateLevel=CameFrom@64.174.108.131/
Ah-HA. Suddenly it becomes a lot clearer (not that I know exactly what they're doing, but at least it tells me how one page can be a stinking great bear-trap and another apparently-identical page can be the genuine article).
This is a really, really dirty trick. I can't help but be impressed at the deviousness, but at the same time it's horrifying to think of how many people are likely to be taken in by this kind of thing. Oh, I know, it's probably old news by now (and indeed the IP address in the clever-hacky-stuff above is unpingable, suggesting that this one's already been nailed) but it's still a scary thought -- not least because even if this particular scam has been stopped, there's nothing to stop other people doing the same thing again, only more cleverly. And even without the added cleverness, there will always be new people to fall for the same old tricks...
no subject
Date: 2003-12-08 11:04 am (UTC)(no subject)
From:no subject
Date: 2003-12-08 11:33 am (UTC)(no subject)
From:no subject
Date: 2003-12-08 01:52 pm (UTC)If I were El Presidente Dictator For Life, the first thing I'd do (after sleeping for a week, sleeping with lots of cute people for a few weeks, and arranging for various unpleasant people to have nasty gardening accidents, of course) would be to fix the URI spec so that / wasn't a valid character in a username and you couldn't pull off this sort of evil masquerade. Unfortunately it's a bit late now.
(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:no subject
Date: 2003-12-09 12:28 am (UTC)They assured me their technical people were working to 'resolve the matter as quickly as possible' and I couldn't help but wonder 'HOW?' because aside from brainwashing all users into not being gullible, there's not really a 'solution' is there? People will continue to send these emails forever.
no subject
Date: 2003-12-09 07:23 am (UTC)The source looks like this (from one of the seven copies which fell into my spamtrap yesterday):
To log into your account, please visit the NatWest Online Banking <a href="http://www.nwolb.com :U serSession=2f4d0zzz899amaiioiiabv5589955&userrstste=SecurityUpdate&StateLevel=Ca meFrom@64.174.108.131/ ">https://www.nwolb.com/<a>(Now actually everything from `<a' up to and including `131/' was on the same line in my copy, but I've broken it here to avoid making this page three miles wide.)An important thing to note here is that there is no slash between `http://' and the at-sign [because after a slash, an at-sign is just an at-sign]. As discussed in some of the other comments, a generic URI is allowed to contain `userinfo' (usually a username and password which may for instance be needed in order to log into an FTP site). What this boils down to is that your client will strip off everything between the `http://' and the at-sign and use it as login info, thus leaving `http://64.174.108.131/' - which is, of course, Mr. EvilHacker's web site.
In an above comment, it's discussed that stripping off the userinfo in this way for an HTTP URL is probably against the RFCs, but I doubt this behaviour will change in the real world. However, the developers of some clients [I think Lynx is one] are considering warning you before you visit a URL if it contains such userinfo, which is a nice compromise.
In Lynx, the whitespace in the HTML source had the desired effect (the nonsense at the end of the URL is not visible when you cursor over the link as it has been pushed off the side of the screen). However, Mozilla cunningly elides the middle of the URL, showing you the beginning and the end when you hover over it, so you can see that it looks a bit fishy.
SpamAssassin heavily penalises URLs that have userinfo in them, and with good reason - it's a very well used spammer trick. However, it didn't seem to notice this one. I think the whitespace fooled it.
(no subject)
From:(no subject)
From:Not so
From:(no subject)
From:(no subject)
From:(no subject)
From: