Feeds

Malware scammers target iPhone

iFraud

The Power of One Infographic

Fraudsters have been busy at work exploiting the hype surrounding last week's launch of the Apple iPhone.

One strain of scam email makes the bogus claim that recipients have won one of the much sought after devices in a bid to trick prospective marks into visiting a malware loaded site. The site attempts to exploit a number of well-known IE vulnerabilities in order to turn the unprotected PCs of victims into spam bots.

Another scam relies on infecting PCs with a new custom Trojan. Windows machines infected by the malware produce a popup, triggered by visiting either yahoo.com or google.com, which prompts users to visit iPhone.com. But system changes on infected systems mean surfers clicking on these ads are redirected not to Apple's site but a bogus site under the control of fraudsters.

The site has nothing to do with Apple but looks the part. However, prospective victims may well smell a rat when they are asked to send payment for their shiny new device through Western Union or Moneygram rather than via a credit card purchase. Marks taken in by the ruse end up handing over their money to cybercrooks based in the Baltic republic of Latvia, according to an analysis of the attack by anti-spyware firm Sunbelt Software.

The social engineering-based scams against wannabe iPhone owners come as security researchers and white hat hackers attempt to spot security vulnerabilities in Apple's iPhone, already unearthing ways to subvert the device's browser and uncover passwords hiding in Apple software. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Orange spent weekend spamming customers with TXTs
Zero, not infinity, is the Magic Number customers want
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.