New phishing attack outsmarts typical defenses
- 16 February, 2005 08:40
You might think that you know how to protect yourself from phishing: Don't click the links in e-mail that purports to be from banks or other institutions. But that defense is no longer ironclad: Phishers have found a new way to snare data without your clicking a link.
Anyone with an inbox has seen a standard phishing attack: You get an e-mail warning you that something terrible has happened to your bank account and asking you to go to the bank's site to reenter your personal data. If you click the link in the e-mail, however, you go not to your bank but to a server run by a criminal who gathers all the data you enter. The best advice has been to ignore the link in the e-mail and instead type the URL of your bank's site into your browser. But that was then. Now -- without protection -- you can't even trust your browser when you type the address yourself.
Spybot Search & Destroy lets you "lock" the Hosts file, preventing any other program from changing it. The Options tab in WinPatrol causes that program to pop up a dialog box if software attempts to change your Hosts file. And in the paid ZoneAlarm Pro firewall or ZoneAlarm Security Suite, you can enable an option in the Privacy Settings menu called Hosts File Protection that both locks the Hosts file and alerts you when something tries to change it.
While the impact of QHosts has been limited so far, phishers are likely to use this new technique much more in the near future. The fact that the Hosts file is easy to protect will be cold comfort to future victims who get hit with the next QHosts-like phishing scam.