Anatomy of a malicious host file hijack

Just for kicks and giggles, Patrick Jordan took apart a host file hijack that resulted in an obscenely accurate spoof of a Bank of America site and a large number of other financial institutions. Sunbelt BLOG: Anatomy of a malicious host file hijack

What is the HOSTS file? from How to effectively prevent Malware by using a HOSTS file

When surfing the Internet, when you try to access a previously unknown hostname your browser normally first checks the HOSTS file to see if the URL you have entered such as or has a corresponding IP address mapped to it before accessing the Domain Name System. "HOSTS files have long since given way to network-based naming systems such as DNS; however, they are still used with specific machines to override such naming systems for testing purposes and special situations". Malware Help.Org-Hosts file tutorial

Linked by shanmuga Friday, 13th January 2006 6:14AM