Feeds

Phisherman's friend: Confused hacktivists deface FAKE BANK SITE

Anon Ghost op is full of fail

Using blade systems to cut costs and sharpen efficiencies

Anon hackers have been caught boasting about defacing a counterfeit Yorkshire Bank website.

Hacktivist crew Anon Ghost earned coverage on underground security blogs for defacing “Yorkshire Bank, one of the largest United Kingdom bank (sic)”.

However, the hackers actually hit "ybs-bank.com", a Malaysian imitation of the real Yorkshire Bank website – which can be found at ybonline.co.uk – as security researchers at Cambridge University point out.

The real website and that of a similarly named banking institution, Yorkshire Building Society (http://www.ybs.co.uk), were both unharmed and unaltered.

Ybs-bank.com, on the other hand, remains defaced as of late morning on Thursday with a message "We are watching you: Don't close your eyes" and a Japanese horror movie-themed clip complete with ominous music. Evidence from Google's cache suggests before this Ybs-bank.com was probably a phishing site.

"The pages appear to be an imperfect copy of www.cbmarkets.co.uk (a Clydesdale bank website) and this copy was was made some time in 2011, judging from the age of the news stories in the copy," writes security researcher Dr Richard Clayton, in a blog post on the Cambridge University Computer Laboratory's Light Blue Touchpaper blog.

"I have no reason to believe that anything good would happen to a Yorkshire Bank user (or a Yorkshire Building Society) user who used their credentials at the Malaysian-owned website,” he added.

According to Whois, the ybs-bank.com domain didn’t exist before 2011, Clayton adds. The whole incident illustrates the difficulty banks face in identifying and seeking the takedown of counterfeit sites, some of which rely on exploiting confusion about a bank's genuine online location.

The defaced domain has to be considered potentially harmful since malware might easily be served from the compromised site. This is unlikely to be Anon Ghost's intention, but why take the risk?

In any case, the article about their exploits is not one for Anon Ghost's scrapbook. Yet it is arguably a lot less embarrassing than an incident where hacktivists mistakenly attacked a French rugby fansite instead of their intended target, the German stock exchange. That misdirected assault meant the allezdax.com website, a fan site for French second division side rugby club Dax, was unavailable for two weeks back in 2011.

Pretty lame but for a complete fail try an incident the year before, when geographically mixed-up Algerian hackers defaced the site of Belvoir Castle, home of the Teddy Bears' picnic, instead of their intended target, Belvoir Fortress – a Christian outpost during the Crusades. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.