Target:Ohio Savings Bank
Date discovered:06/06/2006

 General The goal is to get the following information:
    • Bank account
    • Credit card

Phishing method:
    • 'text' link

 Email Details From: customerservice@ohiosavins.com
Subject: Ohio Savings Bank Security Issue

Visible link: Login
Actual link: http://restore.oohiostatesavins.us/.login/
IP address:

The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
    • The Body of the email contains HTML content.

This screenshot is how the phishing email looks like:

 Page Details Visible URL: https://www.ohiosavings.com/OnlineBanking/authenticate.asp
Actual URL: http://restore.oohiostatesavins.us/.login/
IP address:

The page contains the following trick:
    • Forged address bar

The phishing page will look like the following:

説明の挿入者 Dominik Auerbach の 2006年6月6日火曜日
説明の更新者 Dominik Auerbach の 2006年6月6日火曜日

戻る . . . .