Feeds

Phishers bait hook with Verified by Visa scam

Bank of America hit with bogus claims

Choosing a cloud hosting partner with confidence

Fraudsters have begun garnishing phishing emails with claims that punters need to respond in order to enrol in the Verified by Visa programme.

Verified by Visa is a legitimate service that adds an additional layer of security to online credit card transactions. Anyone using a card enrolled in the programme needs to use a password in order to complete a transaction.

ID thieves are constantly looking at ways of making scam emails more plausible, so it comes as no great surprise that the new Verified by Visa scheme has begun to appear as a topic in phishing emails.

"Your Bank of America card has been automatically enrolled in the Verified by Visa programme," one version of the scam email says, the Better Business Bureau reports.

"To ensure your Visa card's security, it is important that you protect your Visa card online with a personal password. Please take a moment, and activate for Verified by Visa now."

Links in the email go to bogus sites, under the control of hackers, where prospective marks are prompted to enter their credit card information. Bank of America has many customers, so the chance of hitting the inbox of a genuine customer, even allowing for the scatter-shot approach favoured by scammers, is much higher than it would be for a smaller bank. And Bank of America customers are, of course, more likely to fall for the ruse than those who aren’t.

The email ends with a threat that punters who fail to respond to the ruse might find their card temporarily disabled. Such threats are a "dead giveaway" that the emails are part of a scam, the Better Business Bureau adds. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.