BitDefender finds scammers posing as online payment services to gain personal information from victims

June 2009 Information Security

Stealth malware redirects browsers towards phony websites.

BitDefender researchers have found that scammers posing as online payment services continue to be one of the top 10 most spoofed identities in the world of spam and phishing, according to BitDefender’s latest E-Threats Landscape Report.

The latest phishing campaign targeting e-banking and e-payment customers features several malicious components. First, the unsolicited message that disseminates the malware purports to deliver the ultimate Open Source Antivirus Solution, asking users to visit a Web page where they can download the product.

However, upon clicking the link, the user does not receive the promised security suite, but a fake executable – setup.exe – which is, in effect, a self-extracting archive. Its purpose is to replace the content of C:\WINDOWS\System32\drivers\etc and to alter the Web browser’s behavior, by automatically loading maliciously crafted pages for phishing purposes of PayPal, Abbey and Halifax.

Each time the user types the address belonging to one of these financial institutions, he or she is automatically redirected towards the fake pages. Here, the log-in credentials (user name, password, security code) and other sensitive data (first and last name, complete home and e-mail address, credit card number, expiration date, card verification code, and even PIN) are pilfered using PHP scripts. All other menu options available on each page redirect the user towards the appropriate sections of the genuine Web site.

The analysis revealed that the bogus Web pages load from domains registered in China and Korea.

“The current economic turmoil inevitably led to the proliferation of e-crime phenomena,” said Vlad Vâlceanu, head of BitDefender Antispam Research. “The latest trends BitDefender observed reveal several alarming aspects: first, since the beginning of this year, the scams and phishing schemes followed an ascendant curve. Second, the complexity and aggressiveness of raids and attacks have dramatically increased. Lastly, the number of victims followed the same growing pattern. Along with paying close attention to the e-mails they receive, it is important for computer users to have a reliable security solution installed onto their systems in order to prevent future attacks.”

BitDefender’s E-Threats Landscape Report provides an overview of the security threats landscape over the last six months and takes a look at what lies ahead in 2009.

For more information contact Alina Anton, senior PR and marketing coordinator, EMEA and APAC Business Unit, Bitdefender, +40 212 063 470, [email protected], www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...