- RSA SecurityAsked on July 26, 2012 at 04:27 PM
It appears the form service you provide is being used in a phishing attack.
Please find the HTML/View-Source of the attack attached, in which the fraudster's use of your form service can be seen.
Once the victim completes filling out and submitting personal details, your form service is used by the fraudster to send the compromised details to a remote server or email address.
Form Information details:
<form class=jotform-form id=22067620612546 name=form_22067620612546 accept-charset=utf-8 action=http://submit.myjotform.com/submit/22067620612546/ method=post _prototypeuid="9" sizcache="2" sizset="0" validationset="true" novalidate="true">
<input type=hidden value=22067620612546 name=formid>
<input class=form-textbox id=input_1 size=25 name=q1_11 _prototypeuid="3">
<input class=form-textbox id=input_3 size=25 name=q3_2 _prototypeuid="5">
<input id=simple_spc type=hidden value=22067620612546-22067620612546 name=simple_spc>
Please take the necessary steps in order to disable this fraudulent activity.
To whom it may concern,
RSA, The Security Division of EMC (“RSA”), an information security company, has been appointed to assist Standard Bank in preventing or terminating online activity that targets, or may target Standard Bank’s clients as potential fraud victims.
RSA has been made aware that your company appears to be providing internet services to a website, which is making unauthorized use of Standard Bank’s trademarks. This site http://submit.myjotform.com/submit/22067620612546/ not only violates Standard Bank’s copyright, trademarks and other intellectual property rights, but may also become a host to a phishing attack, or other fraudulent scams directed against Standard Bank and Standard Bank’s clients.
The fraudulent website not only represents a misappropriation of Standard Bank’s intellectual property; its purpose is to mislead Standard Bank’s clients. Our experience has shown that such sites become a host of phishing* and other fraudulent scams against our customer’s account holders.
Please take all necessary steps to immediately shut down the fraudulent website, terminate its availability on the Internet and discontinue the transmission of any e-mails associated with this website.
We understand that you may not be aware of this improper use of your services and we appreciate your cooperation. We specifically ask that you also take the following actions wherever relevant or possible:
We specifically would ask that you also provide a copy of any records you maintain that indicate the name, contact information, method of payment or similar information that may be useful in helping learn the identity and location of the customer for whom the website has been operated.
The foregoing is without prejudice to any and all of rights and remedies of any financial institution in connection with this matter, which are hereby expressly reserved.
RSA is providing this notification to you in the interest of preventing the proliferation of phishing scams and the information contained herein is provided to you on an "AS-IS" basis, without representation or warranty of any kind.
Thank you for your cooperation to prevent and terminate this fraudulent activity.
If you need further information, please do not hesitate to contact RSA at the numbers below.
RSA SECURITY INC.
RSA Anti-Fraud Command Center
Tel: +44 (0)800-032-7751
*“Phishing” generally refers to a variety of web based scams that make use of an illegitimate website which passes itself off as being that of a targeted financial institution together with associated data collection points (including web based email accounts) in order to deceive the account holders of the financial institution into revealing their personal information, including but not limited to their credit or debit account numbers, checking account information, social security numbers, or banking account passwords. Once these account holder credentials are collected they can then be used to commit wire fraud or other similar activities of a criminal nature.
- AtacanCAnswered on July 26, 2012 at 04:49 PM
Thanks for bringing this to our attention. The said form and the responsible account has been suspended.