Home / malwarePDF  

PWS:HTML/Barfraud.AP


First posted on 07 November 2012.
Source: Microsoft

Aliases :

PWS:HTML/Barfraud.AP is also known as Trojan-PWS.HTML.Barfraud (Ikarus), PHISH/Barclays.R (Avira), Mal/Phish-A (Sophos).

Explanation :



PWS:HTML/Barfraud.AP is a password-stealing malicious webpage, known as a phishing page, that disguises itself as a legitimate Barclays bank webpage.

The webpage attempts to steal your online banking information by tricking you into filling out your details in a form on a fake page, and then sending that information to a remote attacker.

It may use images, logos and layouts that the authors of PWS:HTML/Barfraud.AP have copied from an authentic Barclays bank website.

The phishing page is an HTML page that is usually hosted on compromised or malicious websites, which an attacker may attempt to lure you to by clicking a link in an email.

Alternatively, a visit to a compromised or malicious website can be used to redirect you to a website that hosts phishing pages that are then detected as PWS:HTML/Barfraud.AP.

In the wild, we have observed the following example webpage:



We have observed these phishing pages using the following page name to steal your information:

Barclays Login - Form.htm

The following is an example of what the URL for one of these pages might look like:

hxxp://www.<removed>.com/Barclays Login - Form.htm

PWS:HTML/Barfraud.AP attempts to obtain personal, banking-related data from you, by tricking you into filling out a form for a particular reason, such as a "security check".

The information that PWS:HTML/Barfraud.AP attempts to gain from you includes the following:

  • Your personal information:
    • First Name
    • Last Name
    • Date of birth
  • Credit or debit card information, including:
    • Five-digit telephone banking number
    • Account number
    • Account sort code (your account's bank/branch identification number)


If you click "submit" or "update" or a similar button after filling out the form, the information is sent to a remote server. We have observed the information being sent to the following URL using HTTP POST, which is a type of basic Internet data communication:

  • www.auction5555.com/wp-admin.php




Analysis by Jonathan San Jose

Last update 07 November 2012

 

TOP