I got a phish last week, but didn't see it until today because my isp put it in a junk mail folder. Oddly enough, it's still up. Here's the link
http://203.144.227.202/.www.paypal.com/index.htmThe body of the phish/cross-site script is:
Notification of Limited Account Access
As part of our security measures, we regularly screen activity in the PayPal system. We recently noticed the following issue on your account:
Unusual account activity has made it necessary to limit sensitive account features until additional verification information can be collected.
We have been notified
that a card associated with your account has been reported as lost or stolen, or that there were additional problems with your card. Case ID Number: PP-071-362-996
Click here to verify your account Please understand that this is a security measure intended to help protect you and your account. We apologize for any inconvenience.
If you choose to ignore our request, you leave us no choice but to temporary suspend your account.
Sincerely,
PayPal Account Review Department.
Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance,
log in to your PayPal account and choose the "Help" link in the footer of any page.
To receive email notifications in plain text instead of HTML, update your preferences
here.
How would I go about finding the true owner of this Apache server? If you go to
http://203.144.227.202:80 you get the test page.
All the links on the page lead to the real Paypal. The following text is the page source, but I don't see anything useful.
http://www.w3.org/TR/html4/loose.dtd">
PayPal - Welcomehttps://www.paypalobjects.com/css/xptLite.css">
https://www.paypalobjects.com/css/xptlive.css">
https://www.paypalobjects.com/en_US/i/icon/pp_favicon_x.ico">
|
|
|
https://www.paypalobjects.com/en_US/i/scr/pixel.gif" width="1"> |
|
|
|
https://www.paypal.com/cgi-bin/webscr?cmd=xpt/bizui/WhatIsPayPal-outside">http://www.paypalobjects.com/en_US/i/header/hpPrivacy_shopwoutsharing_563x115.jpg" border="0" alt=""> |
|
https://www.paypalobjects.com/en_US/i/header/spot_buyerTab_178x29.gif" border="0" alt="">https://www.paypalobjects.com/en_US/i/scr/pixel.gif" width="11" height="1">https://www.paypalobjects.com/en_US/i/header/spot_sellMerchTab_374x29.gif" border="0" alt="">
|
|
|
|
|
|
|
|
|
Other than reporting this as a phish/cross-site scripting, is there any 'fun' we can have with this bottom-dwelling filter feeder?