How To: Manage columns of data (was Re: How To: Delete columns of data)

J. Landman Gay jacque at hyperactivesw.com
Sun Sep 7 02:00:37 EDT 2014


On 9/7/2014, 12:12 AM, JB wrote:
> I was not thinking correctly and you are right
> about DNS but it goes back to the same issue
> of why do you think B of A techs would not be
> aware of this and have me change my password.

A DNS spoof is outside of their control, and they wouldn't know you are 
trying to connect through a modified server. When you spoke with them, 
I'm sure they assumed you had a clean connection. It's similar to 
dialing a wrong phone number; the person you intended to call will never 
know you're trying to reach them.

DNS translates web addresses containing words into web addresses 
containing only numbers. Your computer stores some DNS entries which 
tell your Mac where to get those translataions, and other servers 
between you and the rest of the net can also modify DNS on every hop. If 
your computer, or one of the servers in between your computer and the 
bank, has been modified, your request can be re-routed to a fake site. 
The fake site will look virtually identical to the real one in many 
ways. Usually they copy the images and layout of the real site. In your 
case, the fake site included ads that were not on the real site, which 
would be a tip-off. You said the URL had been changed too; that's a red 
flag that you'd been re-routed.

BofA has no way of knowing that a server somewhere has intercepted your 
request. If the problem is on your own computer (which is what a trojan 
would do,) then all requests to your bank (or any site that has been 
intercepted) will be re-routed to a fake one. If the problem is on a 
server in between your computer and the bank, then anyone who tries to 
connect to the bank through that server will be re-routed. You should 
first check your own computer to be sure it has the right DNS entries. 
Your service provider will know what those are and can verify if yours 
are correct. If they are, then the problem is, unfortunately, largely 
out of your control. Your service provider can try to track where the 
problem is, and you should tell them about it.

The bank would be unaware of any problems. There are millions of paths 
through the internet from one point to another. In the cases where you 
did connect to their site successfully, your request likely travelled 
through an uninfected server. A browser request is not guaranteed to 
take the same path each time it travels to a certain site.

The point is, somewhere along the line it sounds like you got re-routed 
to a fake site. If you entered your bank credentials on that fake site, 
the malware authors now have your password and login details. The bank 
won't know anything about it because you never arrived there. But if our 
guess is right, you should change your password immediately. When you 
do, make sure you are at the real site. Look closely at the URL and 
verify it really belongs to BofA.

This is kind of techy, but here is one explanation:

<http://www.networkworld.com/article/2277316/tech-primersow-dns-cache-poisoning-works/tech-primers/how-dns-cache-poisoning-works.html>

I tried to find one with the clearest explanation for the layman, but it 
is a confusing topic. There is a lot going on between you and the rest 
of the net, and without some basic info about how it works, it's pretty 
geeky.

-- 
Jacqueline Landman Gay         |     jacque at hyperactivesw.com
HyperActive Software           |     http://www.hyperactivesw.com




More information about the use-livecode mailing list