Free NewsletterGlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business

August 30, 2004

Automated Phisher Is Launched

New Tolger line of phishing programs steals through captured keystrokes while user is at financial site.

Courtesy of

Online banking customers should be wary of a new series of Trojan horses out to filch financial information, said a security firm Monday.

The Tolger line of Trojan horses, said U.K.-based Sophos, target online users of a slew of British-based banks, including users Barclays, HSBC, Lloyds, and Nationwide.

Unlike phishing attacks, which come in singly as individual e-mails, one the Tolger Trojan infects a system, it sits invisibly in the background, monitors which Web sites are put on the browser, and if it recognizes one as an online banking site it ambushes the user by capturing keystrokes and snapping screen shots.

Periodically, that information is packaged and sent to a remote server controlled by the attacker.

"This is very different from the fraudulent e-mails which many computer users receive everyday, trying to lure you to a bogus Web site," said Graham Cluley, senior technology consultant for Sophos in a statement. "This Trojan waits for the customer to visit the real banking site, and then it captures passwords and account information making robbery a breeze."

Although Tolger watches for British bank access, the technique could easily be used to nab account information from U.S. institutions, which have also been the frequent target of phishing scams.

E-mail This Story
Print This Story




Get the latest Messaging news, product info, and trends every week.




Related Content




Editorial and vendor perspectives






What onling conferencing technologies are you using? (Check ALL that you are using)
None
Voice conferencing
Web conferencing
Videoconferencing


Product Finder
Find Out About Enterprise Linux Distros
Compare released versions enterprise Linux, the most popular open-source operating system.

Fast and Free Open-Source Databases

The Secret's Out On Open-Source App Servers



The Best Times To Send E-Mail Marketing Messages
The delivery rate varies by up to 10 percent depending on the time of day and the day of the week that messages are sent.


What To Consider When Signing Up For Outside E-Mail Hosting
Excedent's CEO shares his company's advice on the key issues of an important buying decision.

E-Mail Compliance May Yield BI Gold

Red Earth Adds SURBL Scanning To Policy Patrol 3.5


Messaging Pipeline Marketplace (sponsored links)

Take control of your filings through Bowne 8-K Express, our secure, flexible and cost-effective self filing solution that enables you to research, create, manage, convert and self file Form 8-K's.

Storactive LiveBackup enterprise backup software automatically protects Windows desktop, laptop, mobile/wireless & remote PCs. Rapid file, system & disaster recovery tools easily restore data up-to-the-moment of loss and reduce downtime. Free Trial!

Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.

Trade-in older printers and reduce maintenance issues. If you have printers over 3 years old, you're able to dramatically increase speed and print quality with a new or refurbished printer. Click here for more details.

Buy, Sell, Rent used, refurbished, Cisco Routers and Switches at great discount at Digital Warehouse. Thousands of satisfied customers, One-Year Warranty.


Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   |   |   | 
 |   |   |   |   | 
 |   |  Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2004 | MESSAGING PIPELINE All rights reserved . |