Feeds

Phishers target Yahoo! Photos

Picture teaser tempts unwary

Beginner's guide to SSL certificates

Updated Internet crooks looking to capture login details of Yahoo! accounts are changing tactics. Phishing attacks that attempt to capture a user's Yahoo! ID and password by tricking the gullible into handing over their credentials to fake sign-in pages have been around for months if not years. Recently, though, these phishing sites have begun using alternative Yahoo! Sign In pages, such as Yahoo! Photos, net security firm Websense reports.

Users typically receive an email or instant message that claims to be from a friend wanting to show off photos of a recent event, such as a vacation or a birthday party. The message contains a link to a phishing site, which records the user's Yahoo! ID and password, and then forwards the Yahoo! ID and password on to the real Yahoo! Photos site. What started off at a crude attack has evolved with the introduction of a more subtle form of social engineering attack.

Websense reports that the majority of these sites are hosted in the US on free web space provided by the Yahoo! Geocities service. A phishing screen shot example can be found here.

Yahoo! Photos users are advised to go the Yahoo! site itself rather than following links in suspicious-looking emails.

In a statement, Yahoo! said that phishing is an industry-wide issue which it treats very seriously. "When we learn about phishing sites, we remove them as quickly as possible. Yahoo! treats users' security as a top priority and continues to take a hard look at how to effectively combat phishing," it said. Users can report phishing issues at Yahoo! abuse here. The firm's security advice to consumers can be found here. ®

Internet Security Threat Report 2014

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.