News
8/22/2014
02:49 PM
Sara Peters
Sara Peters
Quick Hits
Connect Directly
Twitter
RSS
E-Mail
50%
50%

JP Morgan Targeted In New Phishing Campaign

Double-whammy 'Smash and Grab' hits targets with two ways to steal credentials.

Corporate email provider Proofpoint discovered a new phishing campaign, this week, aimed at customers of JP Morgan Chase & Co.

The campaign has been dubbed "Smash and Grab" because it combines two methods of obtaining access credentials.

It uses social engineering tactics to try to persuade users to part with their JP Morgan credentials, specifically, by asking them to click to view a secure message from the bank. It also infects the target with Dyre, a banking Trojan that lifts login data for other places too.

The attack appears to have been launched on Tuesday. Proofpoint saw roughly 150,000 of the phishing emails that day.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AnonymousMan
50%
50%
AnonymousMan,
User Rank: Moderator
8/25/2014 | 8:53:32 AM
Re: Chase encourages phishing
I was just being sarcastic.  Simple misspelling are possible, but I would suggest something like chasesecurityalert.com or similar.  I don't buy your second argument.  The "no hyperlinks in email" only works for sophisticated users.  For the general population, that HTML email train has left the station IMHO.  It might transfer some risk from the bank to the user though, which is all the more reason to take that approach if you are the bank.
JohnRS
50%
50%
JohnRS,
User Rank: Apprentice
8/22/2014 | 5:42:48 PM
Re: Chase encourages phishing
It's possible.  First, phishing mail claiming to be from a company often comes from a "look alike" domain, something like chasse.com for example.  DMARK doesn't stop this sort of mail at all.

Second, a Chase customer will be more likely to click on a link in a phishing message because regular, valid messages from Chase encourage them to do so.  In their "E-mail Security Information" at the bottom of many of the messages which Chase sends to customers they tell them that if they suspect the authenticity of the message, to "click here" (a link inside the suspect message) - the exact OPPOSITE of what they should be advising customers to do.
AnonymousMan
50%
50%
AnonymousMan,
User Rank: Moderator
8/22/2014 | 5:15:51 PM
Re: Chase encourages phishing
http://agari.com/wp-content/uploads/2013/10/130819_Dmarc_JPMorgan.pdf

"JP Morgan Chase evaluated its options and embraced the DMARC (Domain-based Messaging Authentication and Controls) standard to stop phishing attacks, restore its brand and protect its customers."

emphasis added.  You see, JP Morgan can't be phished anymore.  Nothing to see here folks.
JohnRS
50%
50%
JohnRS,
User Rank: Apprentice
8/22/2014 | 3:04:27 PM
Chase encourages phishing
A phishing attack might be more effective against Chase customers than expected since Chase encourages customers to click on links in phishing messages.

I have some accounts with Chase.  Recently I realized that the boilerplate at the bottom of many of their messages includes instructions regarding phishing messages which is the OPPOSITE of what you should do.  Here it is, from a block boldly labelled "E-mail Security Information":

"If you are concerned about the authenticity of this message, please click here or call the phone number on the back of your credit card. If you would like to learn more about e-mail security or want to report a suspicious e-mail, click here".

Yes, Chase is telling you (twice) to click on a link in a suspected phishing message.  Duh!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?