需要修復電腦?
聘請專家
Target:Ohio Savings Bank
Date discovered:06/06/2006

 General The goal is to get the following information:
     Bank account
     Credit card


Phishing method:
     'text' link

 Email Details From: customerservice@ohiosavins.com
Subject: Ohio Savings Bank Security Issue

Visible link: Login
Actual link: http://restore.oohiostatesavins.us/.login/
IP address: 69.34.35.3


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
     The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: https://www.ohiosavings.com/OnlineBanking/authenticate.asp
Actual URL: http://restore.oohiostatesavins.us/.login/
IP address: 69.34.35.3


The page contains the following trick:
     Forged address bar


The phishing page will look like the following:



說明撰寫者 Dominik Auerbach 開啟 2006年6月6日星期二
說明更新者 Dominik Auerbach 開啟 2006年6月6日星期二

返回 . . . .
https:// 為了你的安全,此視窗已加密。