Date: 16 February 2004
References: AU-2004.0013 AU-2004.0014 AL-2004.032 AU-2004.0015 ESB-2004.0720 ESB-2004.0776
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
A U S C E R T A L E R T
AL-2004.03 -- AUSCERT ALERT
"Police investigation" Fraudulent E-mail and Malicious Web Site
16 February 2004
===========================================================================
Overview:
AusCERT has become aware of an e-mail with the subject "Police
investigation" circulating in Australia and overseas which is used to
entice the reader to visit a malicious web site. This web site contains
executable Java code which, if successfully executed, will install a
trojan program which in turn captures keystrokes when the user visits
particular banking related web sites.
Vulnerability:
This malicious web site attempts to exploit a vulnerability in the
Microsoft Virtual Machine (VM) [1] , for which Microsoft have released a
patch on April 9, 2003 with security bulletin MS03-011 [2].
Mitigation:
Installation of the patch mentioned in Microsoft security bulletin
MS03-011 [2] will protect a computer from ByteCode attacks, such as the
one being used by this malicious web site. Additionally, all major
anti-virus updates prior to September 2003 have contained signatures for
this malicious code [3].
Exploit Details:
The e-mail currently circulating appears as:
---
Subject: Police investigation
Hello...
It has come to my attention that you are being under the police investigation.
Is that true? Have you really committed such crimes?
Please read the following article located at:
(*Note: malicious web sites removed by AusCERT*)
---
The trojan program will capture the users' keystrokes and send them out
via e-mail when the title bar of the web browser contains any of the
following text:
Westpac
Bendigo
commbank
Commonwealth
NetBank
Citibank
Bank of America
EVOCash
INTGold
PayPal
BankWest
National Internet Banking
CIBC
ScotiaBank
Bank of Montreal
RoyalBank
TD Canada Trust
TD Waterhouse
President's Choice
suncorpmetway
Macquarie
GoldMoney
HyperWallet
Wells Fargo
Bank One
CAIXA
SunTrust
Discover Card
Washington Mutual
Wachovia
Chase
This is a partial list covering the majority of banking web sites
involved, however it is possible that future iterations of this code
may target other web sites.
References:
[1] - http://www.microsoft.com/mscorp/java/
[2] - http://www.microsoft.com/technet/security/bulletin/MS03-011.asp
[3] - http://securityresponse.symantec.com/avcenter/venc/data/trojan.byteverify.html
- http://www3.ca.com/virusinfo/virus.aspx?ID=36725
- http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100261
- http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=JAVA_BYTEVER.A
- http://www.sophos.com/virusinfo/analyses/trojbyteveria.html
[4] - http://spamwatch.codefish.net.au/modules.php?op=modload&name=News&file=article&sid=55
- ---------------------------------------------------------------------------
The AusCERT team has made every effort to ensure that the information
contained in this security bulletin is accurate at the time of publication.
However, the decision to follow or act on information or advice contained in
this security bulletin is the responsibility of each user or organisation, and
should be considered in accordance with your organisation\'s site policies and
procedures. AusCERT takes no responsibility for consequences which may arise
from following or acting on information or advice contained in this security
bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
AusCERT maintains a World Wide Web service which is found on:
http://www.auscert.org.au.
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
Postal:
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
AUSTRALIA
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQDBawyh9+71yA2DNAQHDIQP/S3bxt1U4BpjSRP6wJXTWZaQo9ruX3OC5
/B/KAm/D0+7EQc7jkQsGyJvWPJJDgHauWwCiLMvA/aCzdVTm6sFrhIv2S5emUqtn
zi5wjW2X995tJdZryUhUr4QlxlzGMerKPa9fOEbtChMHfhJLNkbmZaghY+uAIxX1
wliW8Z3paxc=
=ruMG
-----END PGP SIGNATURE-----
|