The phishing scam uses e-mails claiming to come from the Better Business Bureau that carry a Trojan virus that can steal data sent from the victim's Internet Explorer browser.
The Better Business Bureau has issued a fraud alert
regarding the resurgence of a spam attack that targets high-level executives in various industries.
The spam e-mails purport to be sent by the BBB in an effort to entice users to click on a malicious link. The SANS Institute reported a similar wave of targeted spam attacks using the BBB name in March.
SecureWorks, a managed security services provider, discovered a cache of stolen data from the scam that included bank and credit card account numbers from 1,400 high-level executives. For the scam to work, the victim must click on a link within the spam e-mail, which then downloads a Trojan virus.
Is there a unified economy of spam? Click here to read more.
Once downloaded, the Trojan steals all interactive data sent from the victims Internet Explorer browser to remote Web sites, including data entered into SSL (Secure Sockets Layer) Web sites.
On the SecureWorks Web site,
Joe Stewart, a senior analyst at the Atlanta-based company, wrote that SSL encryption is of no use in stopping the theft of sensitive data because the BHO (browser helper object) intercepts the request before it is encrypted.
"Fortunately, only Internet Explorer is capable of loading the BHO, so users of other Web browsers are not affected in this case," he wrote.
For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.
"The effectiveness of this attack would be greatly diminished if it were massively spammed," Stewart said in an interview with eWEEK. "First, it would have gotten wider attention from the startmaking the social-engineering ploy less effective as more people become aware of itand second, there would be tons and tons of data being logged from all kinds of users that are just posting data to blogs, comment forms, surveys, etc., making it harder to sift through to find the high-value targets and data."
As of May 25, there were 1,400 victims and there were 145MB of data in the repository uncovered by SecureWorks. The cache of data contained bank and credit card account numbers, Social Security numbers, online payment accounts, prescription information, home addresses, user names, passwords, and other personal information. The repository was shut down by the ISP, Stewart said.
"Getting data from SSL streams is not all that new, actuallyI hope people arent under the impression that SSL encryption has been protecting them from malware stealing their dataSSL only provides privacy for the traffic out on the network," Stewart said. "Once someone manages to get their malware onto your system, they can pretty much see any data you are working with if they want to badly enough."
Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.