Scammers have set up an exact copy of the download page for Google’s Toolbar plug-in in an attempt to lure users to download a Trojan back door.Reported by security outfit Surfcontrol, some versions of the scam even spoof the correct Google Toolbar Web address for Internet Explorer, using Google’s own redirection service in an attempt to hide the real, non-Google address.The Trojan itself, W32.Ranky.FW, is designed to turn the PC into a bot zombie, and is spread using the conventional technique of asking recipients of a spam e-mail to follow an embedded link.According to Surfcontrol, the version detected by the company fails because of poor programming of defective compilation, but it remains a proof-of-concept in how to attack users using a simple combination of convincing elements. Outwardly simple, the scam has a clever combination of tricks. Although using parts of established websites is standard in phishing scams, it is relatively unusual to go to the length of reproducing an entire page precisely, in combination with a convincingly spoofed web address.The fact that the spammed e-mail appears to come from Google could convince recipients to follow the link. Assuming that a re-engineered version appears—highly likely—once infected, users will notice nothing untoward, although their PCs will have become part of a bot-controlled network.Google has been attacked in similar ways before. Last September, scammers faked the Google search page itself in order to aid the spread of a worm.More recently, a Trojan attacked the company’s adsense advertisements, replacing them, in-browser, with fake ones on any PC infected with the malware.-John E. Dunn, Techworld.com (London)Related Link: Ad on MySpace Serves Up Adware to 1M PCsCheck out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Palo Alto Networks Operational technology systems require a robust Zero Trust strategy in 2024 Zero Trust provides a foundation for creating a stronger security posture in 2024. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security brandpost Sponsored by AWS in collaboration with IBM How digital twin technology is changing complex industrial processes forever As the use cases for digital twins proliferate, it is becoming clear that data-driven enterprises with a track record of innovation stand the best chance of success. By Laura McEwan Dec 05, 2023 4 mins Digital Transformation brandpost Sponsored by AWS in collaboration with IBM Why modernising applications needs to be a ‘must’ for businesses seeking growth Around one-third of enterprises are spending heavily on application modernisation and aiming for cloud native status. The implications for corporate culture, structure and priorities will be profound. By Laura McEwan Dec 05, 2023 5 mins Digital Transformation opinion 11 ways to reduce your IT costs now Reorienting IT’s budget toward future opportunities is a big reason why CIOs should review their IT portfolios with an eye toward curbing unnecessary spending and realizing maximum value from every IT investment. By Stephanie Overby Dec 05, 2023 11 mins Budget Cloud Management IT Governance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe