Recently I received a phishing email from konzie2@usm.edu telling me that Maybank had installed new security features and that I need to validate my details on the Maybank2u web portal. The email was marked as SPAM by Gmail, and trying to visit the site further sparked more warnings from Firefox AND my anti-virus.
But I was curious as to what the link would entail, in much the same way I was curious about the RHB phishing emails I received some months back.
Hopefully this post gives you an indication of just how sophisticated these attacks are, and manages to educate you on the one true way to establish if the site you’re visiting is genuine.
The fake login page for Maybank2u looks exactly like the REAL login page of Maybank2u, there really is no difference from the victims perspective. What’s more interesting is when you go deeper, by just enter in ‘a’ username and a password you get to the following page (please don’t enter ‘your’ username and password, just ‘a’ username and password)
First it will ask you to change your Maybank2u challenge questions–these are questions you use in order to get back control of your account in case you’ve lost your password.
Then they ask you to change your withdrawal limits (those slimy sneaky fellas…)
Then it ask you to change your email–presumably so no warnings reach your email;
At each step of the way—the site request for your TAC, and performs an almost flawless man-in-the-middle attack on the would-be victim. The site was professionally coded (at least from the display perspective), and worked to get the user to change certain key elements of their account information to facilitate large withdrawals of money.
Finally they end with this:
Real sneaky guys, it reads that your details are being processed and advises you “NOT” login for the next 2 hours to “avoid errors in their database”—presumably so that they can rob you blind in those 2 hours.
The commonality between this and a past post I wrote about a RHB phishing scam is remarkable.
1. They both use hacked wordpress sites to host their page
2. They both use fake emails to start the phishing scam
3. They both look identical to the real bank websites.
So how can you make sure that the bank website you’re visiting is genuine and not these fakers. The one sure fire way, is too look for the green bar of SSL. If you use Chrome or Firefox you can see a green bar where you type the address of your banks website. The only way a criminal can fake a green bar is either by controlling your machine altogether ( in which case everything you do is already compromised) or by solving a really hard maths problem which is infeasible today–and I would argue if the criminal figured out how to that, he’s not coming for you.
Remember folks, if it ain’t green–don’t login. And if your bank doesn’t have a green bar website, my recommendation is to get a new bank.
Conclusion
I was really impressed by the sophistication of this attack, and downright amazed at the “Do not login for the next 2 hours to avoid errors in the database” message–that one was just slimeball move.
I can’t help but feel sorry for the people who did this, a lot of people I know don’t get IT at all–and they’re afraid of most things tech, so when a seemingly genuine email somehow breaks the barrier to their inbox, they just do as they’re told, and for the average person trying to figure out what’s real and what’s not is really hard.
If you’re going to take just one thing away from this post, take this–if it ain’t green, don’t login.
Very well written, and easy to remember – If it ain’t green, don’t login!