DNS wildcards used in new phishing attacks
jkf at ecs.soton.ac.uk
Tue Mar 8 08:59:54 GMT 2005
[ The following text is in the "ISO-8859-1" character set. ]
[ Your display is set for the "US-ASCII" character set. ]
[ Some characters may be displayed incorrectly. ]
As highlighted here on Slashdot:
which links to the full Netcraft article at
I have just tested the examples given by Netcraft, and the current
phishing net already traps these phishing attacks and needs no changes
or improvements in this case.
If you are running an old version of the phishing net, I strongly advise
you to upgrade. You should at least test the 3 URLs given by Netcraft
and ensure that you can catch them. Use an HTML segment like this:
Barclays bank wildcard DNS attack here:
Beware that the above paragraph should have 4 lines in it, in case my
mail client messes with it.
Julian Field Teaching Systems Manager
jkf at ecs.soton.ac.uk Electronics & Computer Science
Tel. 023 8059 2817 University of Southampton
Southampton SO17 1BJ
------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).
Support MailScanner development - buy the book off the website!
More information about the MailScanner