Received from 62.176.229.131 (some host in a DSL pool in Germany) on Wed, 16 Mar 2005 04:06:35 +0000, one phishy little spam targeting "regions.com" banking customers. A very ordinary phish, really. Here's a quick excerpt of the text.
Account Confirmation Required!
Dear Valued RegionsNet® Client,
Recently there have been a large number of identity theft attempts targeting RegionsNet customers. In order to safeguard your
account we require that you confirm your banking details. This process is mandatory.
You may do so by clicking Here and submitting the required information.
Failure to do so may result in a temporary cessation of your account services pending submission. Thank you for your prompt attention to
this matter and your co-operation in helping us maintain the integrity of our customers accounts.
Please do not reply to this e-mail, as this is an unmonitored alias. If you require further assistance refer to our support centre .
RegionsNet respects your privacy. Click here to read the RegionsNet Group Privacy Policy Statement.
Electronic Banking services are issued by the RegionsNet of United States (Electronic Banking services include
telephone banking, Netbank and Bpay). A Product Disclosure Statement (PDS) is available for these products on this website or from
any branch of the RegionsNet.
I haven't bothered to include the links or text formatting, etc -- life's too short. The above should be enough to identify the message. In my case, the fraudulent link was to <http://218.8.251.189/regions/>, which was a download-and-save copy of <https://secure.regionsnet.com/EBanking/logon/user?a=defaultAffiliate> according to comments in the HTML. This contained a login form which included the text, "Regions does not contact customers via e-mail to verify or request security information." Anyway, if you ignored that and provided some sort of login information (I made something up), then you proceeded to <http://218.8.251.189/regions/verification.htm>, which included a form wanting the following details.
- Card Number:
- Expiration date:
- PIN Code: * part of the bank verification process
- CVV2 Code: * 3 digit security code printed on card
- SSN Number: * social security number
I chose to submit this form without entering anything, and was redirected back to the real Regions home page. The site hosting the fake web pages appears to be a Red Hat box somewhere in China. Here's what nmap
thinks of it.
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-03-16 05:45 GMT
Interesting ports on 218.8.251.189:
(The 1652 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
80/tcp open http
111/tcp open rpcbind
135/tcp filtered msrpc
445/tcp filtered microsoft-ds
1521/tcp open oracle
6000/tcp open X11
7001/tcp open afs3-callback
8080/tcp open http-proxy
Regions bank seems to be on the ball with regards to phishing. They have a web page about email fraud.