mersenneforum.org  

Go Back   mersenneforum.org > Fun Stuff > Lounge

Reply
 
Thread Tools
Old 2009-02-05, 22:49   #1
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

22×3×641 Posts
Default Computer security: a precursor of more attacks?

Folks,

There's another phishing scam a-brewing, and this new clever social-engineering scam may arrive on your car's windshield instead of in e-mail.

"Parking tickets actually malware attacks in disguise"

http://tech.yahoo.com/blogs/null/118488

Quote:
Originally Posted by Christopher Null
The last place anyone would expect to face a computer security attack is on the windshield of their car in the form of a parking ticket.

But that's the latest -- and intensely clever -- way that hackers are attempting to goad people into visiting infected websites and willingly install malware on their machines.

The scam is instantly clever once you hear how it works: Hackers print up phony "PARKING VIOLATION" notices and plaster them on cars parked on the street. The phony ticket directs the car's owner to visit a certain website, and of course the website in question (which largely seems to comprise of photos of badly parked cars) is a hack site which attempts to install malware on your PC.

Essentially what we have here is a phishing attack that takes place in the real world instead of via email. The use of fliers on parked cars is what's truly ingenious: A similar attack sent via postal mail would probably have minimal effect, but people are incredibly protective of their cars, and I imagine these windshield fliers will actually have a pretty good percentage of people typing in the URLs typed on them.

The good news -- for now -- is that the fliers are extremely crude, printed on yellow paper and offering nothing in the way of legal language that would compel a sophisticated and naturally skeptical reader to even visit the website in question. Like the earliest email phishing attacks, this attack may be simplistic, but it's probably a precursor of more advanced attacks to come. When hackers scan in real parking tickets and reprint them, replacing the URL printed there with one for a sophisticated attack site, then the sparks are going to start flying. (Installing malware is boring by comparison... I expect the real attacks will involve collecting money and hijacking credit cards and bank accounts wholesale.)

This appears to be a very limited attack (reported only in Grand Forks, North Dakota) for the time being, but it's a good idea to keep your skepticism handy next time you receive a parking "violation," just in case.
cheesehead is offline   Reply With Quote
Old 2009-02-06, 00:18   #2
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

22·2,939 Posts
Default

I wonder if the same trick works for these as one uses to spot e-mail-based phishing scams: just hover your mouse over the URL on the parking ticket and see if the resulting hovertext-URL matches the one printed on the ticket. Ya think?
ewmayer is offline   Reply With Quote
Old 2009-02-06, 00:24   #3
TimSorbet
Account Deleted
 
TimSorbet's Avatar
 
"Tim Sorbera"
Aug 2006
San Antonio, TX USA

11×389 Posts
Default

Quote:
Originally Posted by ewmayer View Post
I wonder if the same trick works for these as one uses to spot e-mail-based phishing scams: just hover your mouse over the URL on the parking ticket and see if the resulting hovertext-URL matches the one printed on the ticket. Ya think?
Yeah, but it's hard to understand the mouse's squeaks to see if it is the same as the one printed.
TimSorbet is offline   Reply With Quote
Old 2009-02-06, 04:02   #4
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

22×3×641 Posts
Default

Quote:
Originally Posted by Mini-Geek View Post
Quote:
Originally Posted by ewmayer View Post
I wonder if the same trick works for these as one uses to spot e-mail-based phishing scams: just hover your mouse over the URL on the parking ticket and see if the resulting hovertext-URL matches the one printed on the ticket. Ya think?
Yeah, but it's hard to understand the mouse's squeaks to see if it is the same as the one printed.
After the mouse hover, you have to do a cat scan!

http://todays-joke.blogspot.com/2007/04/cat-scan.html

Botta-boom
cheesehead is offline   Reply With Quote
Old 2009-02-06, 04:04   #5
Uncwilly
6809 > 6502
 
Uncwilly's Avatar
 
"""""""""""""""""""
Aug 2003
101×103 Posts

22×2,767 Posts
Default

Quote:
Originally Posted by cheesehead View Post
After the mouse hover, you have to do a cat scan!

http://todays-joke.blogspot.com/2007/04/cat-scan.html

Botta-boom
Then you have to wait for the lab work to come back.
Uncwilly is online now   Reply With Quote
Old 2009-02-06, 16:45   #6
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

22·2,939 Posts
Default

Quote:
Originally Posted by cheesehead View Post
After the mouse hover, you have to do a cat scan!

http://todays-joke.blogspot.com/2007/04/cat-scan.html

Botta-boom
LOL ... but why discriminate against dog lovers - use a PET scan.

Quote:
Originally Posted by Uncwilly View Post
Then you have to wait for the lab work to come back.
There are very few labs that do this sort of forensic mouse-squeak-ology, and they tend to be very secretive ... they are thus usually referred to in the trades as "black labs".

(I know, that was a simply arful joke).

Last fiddled with by ewmayer on 2009-02-06 at 16:47
ewmayer is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
Unclear Security Nick Soap Box 234 2023-04-15 13:50
Water security Nick Soap Box 131 2021-10-05 07:55
v5 security problems ixfd64 PrimeNet 12 2008-11-10 09:31
Key fob security. Xyzzy Science & Technology 13 2007-03-09 02:39
A security puzzle T.Rex Puzzles 12 2007-02-11 11:54

All times are UTC. The time now is 14:58.


Fri Jul 7 14:58:30 UTC 2023 up 323 days, 12:27, 0 users, load averages: 0.79, 1.01, 1.08

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.

≠ ± ∓ ÷ × · − √ ‰ ⊗ ⊕ ⊖ ⊘ ⊙ ≤ ≥ ≦ ≧ ≨ ≩ ≺ ≻ ≼ ≽ ⊏ ⊐ ⊑ ⊒ ² ³ °
∠ ∟ ° ≅ ~ ‖ ⟂ ⫛
≡ ≜ ≈ ∝ ∞ ≪ ≫ ⌊⌋ ⌈⌉ ∘ ∏ ∐ ∑ ∧ ∨ ∩ ∪ ⨀ ⊕ ⊗ 𝖕 𝖖 𝖗 ⊲ ⊳
∅ ∖ ∁ ↦ ↣ ∩ ∪ ⊆ ⊂ ⊄ ⊊ ⊇ ⊃ ⊅ ⊋ ⊖ ∈ ∉ ∋ ∌ ℕ ℤ ℚ ℝ ℂ ℵ ℶ ℷ ℸ 𝓟
¬ ∨ ∧ ⊕ → ← ⇒ ⇐ ⇔ ∀ ∃ ∄ ∴ ∵ ⊤ ⊥ ⊢ ⊨ ⫤ ⊣ … ⋯ ⋮ ⋰ ⋱
∫ ∬ ∭ ∮ ∯ ∰ ∇ ∆ δ ∂ ℱ ℒ ℓ
𝛢𝛼 𝛣𝛽 𝛤𝛾 𝛥𝛿 𝛦𝜀𝜖 𝛧𝜁 𝛨𝜂 𝛩𝜃𝜗 𝛪𝜄 𝛫𝜅 𝛬𝜆 𝛭𝜇 𝛮𝜈 𝛯𝜉 𝛰𝜊 𝛱𝜋 𝛲𝜌 𝛴𝜎𝜍 𝛵𝜏 𝛶𝜐 𝛷𝜙𝜑 𝛸𝜒 𝛹𝜓 𝛺𝜔