[ad_1]
Picture: twitter / PO3T1985
Criminals send fake Swisscom bills via e-mail – this is how you recognize the scam
A new wave of phishing has been raging in Switzerland since noon today. Fraudsters simulate Swisscom e-mails to obtain passwords, credit card details, etc. of their victims and thus empty the bank account. The federal government emergency response team writes on Twitter:
" Warning! Cyber criminals are currently sending fake e-mails containing so-called invoices on behalf of Swisscom. The goal is to infect computers with the Gozi banking Trojan. Do not open the attachment and delete the mail. "
The banking Trojan Gozi was discovered in 2007. The cybercriminals constantly modify it and rebroadcast it via fake emails or manipulated websites. Those who fall into the trap are caught by malware that transmits criminals user data such as passwords. Gozi is also able to perform unnoticed transactions from the user. Attackers redirect the online banking application to a copied online banking website. The online banking user therefore enters his password on a website that looks like the actual banking website, but which is exploited by the attackers.
In recent years, the attackers have developed banking Trojans such as Gozi and Retefe and their methods have been different.
The scam is identifiable by suspicious email addresses and links like this one:
Picture: twitter / @ralfbeyeler
In general, fraudsters are more and more prey to phishing emails that many Swiss are now accustomed to receiving their invoices by e-mail and of course want to check the amount, that is to say without fear, click on the usual button "View invoice". The link hides a dangerous ZIP file in the current case.
Such scams are often – but not always – based on the fake visible email address. Anyone who moves the mouse over the "View Bill" button also recognizes the phishing attempt. The fraudulent link is displayed in the browser at the bottom of the screen. In email applications on smartphones, e-mail addresses and dummy links are often hard to spot because apps hide the actual address behind a link.
The fraudsters claim that the email is signed by Swisscom:
To counter phishing, Swisscom, UPC and Co. send e-bills with an electronic signature (e-certificate). The signature is used as a digital signature. This means that the sender of the email is actually the respective telecommunication company. How to recognize if the e-mail contains an electronic signature, explains Swisscom.
Swisscom reacts
Swisscom has been aware of the attack since midday and has blocked some of the infected websites from which the Trojan is being downloaded. A clear light is still waiting. Virus scanners typically only detect new versions of Trojans after a certain time.
You may also be interested in this:
Phone fraud is rising rapidly
Video: srf
Subscribe to our newsletter
[ad_2]
Source link