Forum Home
Press F1
 
Thread ID: 69995 2006-06-18 23:54:00 PayPal scam mejobloggs (264) Press F1
Post ID Timestamp Content User
464268 2006-06-18 23:54:00 Make sure you don't get sucked in.... This one is very convincing. It uses the real paypal.com site and everything, so it is hard to spot.

news.netcraft.com
mejobloggs (264)
464269 2006-06-19 00:04:00 Therefore I will not be clicking on your link.

:-)
Sweep (90)
464270 2006-06-19 00:36:00 Oh . . . heh . . . Oh well . I will post the info here then .


A security flaw in the PayPal web site is being actively exploited by fraudsters to steal credit card numbers and other personal information belonging to PayPal users . The issue was reported to Netcraft today via our anti-phishing toolbar .

The scam works quite convincingly, by tricking users into accessing a URL hosted on the genuine PayPal web site . The URL uses SSL to encrypt information transmitted to and from the site, and a valid 256-bit SSL certificate is presented to confirm that the site does indeed belong to PayPal; however, some of the content on the page has been modified by the fraudsters via a cross-site scripting technique (XSS) .


The genuine PayPal SSL certificate used by the scam


When the victim visits the page, they are presented with a message that has been 'injected' onto the genuine PayPal site that says, "Your account is currently disabled because we think it has been accessed by a third party . You will now be redirected to Resolution Center . " After a short pause, the victim is then redirected to an external server, which presents a fake PayPal Member log-In page . At this crucial point, the victim may be off guard, as the paypal . com domain name and SSL certificate he saw previously are likely to make him realise he has visited the genuine PayPal web site – and why would he expect PayPal to redirect him to a fraudulent web site?


Fraudsters manipulating content on genuine PayPal site


If the victim logs in via the fake login page, their PayPal username and password is transmitted to the fraudsters and they are subsequently presented with another page which requests them to enter further details to remove limits on the access of their account . Information requested includes social security number, credit card number, expiration date, card verification number and ATM PIN .

The server currently running the scam is hosted in Korea and is accessed via a hex-encoded IP address . The Netcraft Toolbar already protects PayPal users by blocking access to this site .

UPDATE: Paypal has now addressed this vulnerability . A company spokesman said Paypal is working with the Internet service provider that hosts the malicious site to get it shut down, and does not yet know how many people may have fallen victim to the scam .

Netcraft's Web Application Security Testing service can identify similar cross-site scripting flaws on your organization's web servers . Please contact us for further information .
mejobloggs (264)
464271 2006-06-19 00:37:00 Therefore I will not be clicking on your link.

:-)

its just a news article about the scam, its not the scam itself. i suggest anyone who uses paypal read this
Jimmy D (2061)
464272 2006-06-19 00:54:00 its just a news article about the scam, its not the scam itself. i suggest anyone who uses paypal read this

Fair enough. Earlier I heard bad news about Paypal and I am not about to use the service anyway.
Sweep (90)
1