DNS wildcards used in new phishing attacks

Julian Field jkf at ecs.soton.ac.uk
Tue Mar 8 08:59:54 GMT 2005

    [ The following text is in the "ISO-8859-1" character set. ]
    [ Your display is set for the "US-ASCII" character set.  ]
    [ Some characters may be displayed incorrectly. ]

As highlighted here on Slashdot:


which links to the full Netcraft article at


I have just tested the examples given by Netcraft, and the current
phishing net already traps these phishing attacks and needs no changes
or improvements in this case.

If you are running an old version of the phishing net, I strongly advise
you to upgrade. You should at least test the 3 URLs given by Netcraft
and ensure that you can catch them. Use an HTML segment like this:

Barclays bank wildcard DNS attack here:

Beware that the above paragraph should have 4 lines in it, in case my
mail client messes with it.

Julian Field                Teaching Systems Manager
jkf at ecs.soton.ac.uk         Electronics & Computer Science
Tel. 023 8059 2817          University of Southampton
                            Southampton SO17 1BJ

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!

More information about the MailScanner mailing list