On Wednesday 08 March 2006 12:14, Kevin A. McGrail wrote:
>A co-worker of mine just pointed this out to me today.  He tested it
> in Thunderbird and I tested it in OE6.  It warrants serious
> attention.
>
>Ignoring the munged part, this would trick a very savvy internet user
> that allows HTML email, clicks on a link and doesn't check the
> browser address line.
>
>Any input on rules or techniques to block this nasty fellow?
>
>Sincerely,
>KAM
>
>> I just received a phishing e-mail claiming to be from eBay.  All of
>> the links LOOKED legit, including what displayed in the status bar
>> when you moused over a link.  I knew this was not legit, so I looked
>> in the source code and found this:
>>
>> <div><a
>
>href="https://signin.ebay-MUNGED.com/ws/eBayISAPI.dll?SignIn&sid=verif
>y&co_p artnerId=2&siteid=0"><table><caption><a
>href="http://211.254.130.108-MUNGED/...../";><u style="cursor:
> pointer"><font color="#008000">eBay Update
>Center</font></u></a></caption></table></a></div>
>
>> Note the double use of an a href tag, one inside a caption tag, one
>
>outside.  The outside a href displays, while the a href within the
> caption tag is what would actually be triggered.
>
>> Interesting way of masking the true URL.

Its an elderly method in fact, in common useage for 2-3 years at least.  
The inside, bogus address will show in most browsers and email agents 
if you hover the mouse over it.

-- 
Cheers, Gene
People having trouble with vz bouncing email to me should add the word
'online' between the 'verizon', and the dot which bypasses vz's
stupid bounce rules.  I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2006 by Maurice Eugene Heskett, all rights reserved.

Reply via email to