Account holders with at least two Australian banks have become victims of a phishing scam in which malicious code reveals the physical location of affected IP addresses using Google Maps. Bank account holders in Germany and the United States have also been targeted.The software installs a trojan capable of keylogging user activity, hijacking infected computers.The scam was circulated as a false news report claiming the Australian prime minister had suffered a heart attack. It installs a trojan and backdoor code to capture all user input as well as compromising a Web server to allow the hacker to hijack the victim’s computer.The hacker is then provided with details on the number of infected machines in each country, while the Google Maps server is used to translate IP information to pinpoint the machines’ physical location. Websense Australia and New Zealand country manager Joel Camissar believe hackers could potentially use Google Maps to assist in identity theft.“The hackers could correlate user information acquired from the keylogger with knowledge of where a user is located from Google Maps to masquerade as them,” Camissar said. “With this they could access bank accounts and Social Security numbers.” Camissar said there are about 750 infected desktops in Australia.Westpac and the Commonwealth Bank were among those specifically targeted in Australia, while Bank of America and Germany’s Deutsche Bank were also attacked. Westpac and the Commonwealth Bank were unavailable to comment at the time of publication.Sophos senior technology consultant Graham Cluley said users are directed to a 404 error page, which downloads the code.“Recipients of the e-mail are encouraged to click on a link to obtain the latest information on Howard’s health; however, this link takes users to a webpage which downloads malicious code to their PC, and then displays the real ‘404 page not found’ error page,” Cluley said.“The scammers have registered several domain names that appear to be associated with a newspaper, and have gone to great effort to make people think that they really are visiting the genuine site by pointing to a real error page,” he said. “Everyone should be on their guard against this kind of e-mail con-trick, or risk having their PC infected.”Camissar was unsure whether Websense acquired the information through sample code provided by AusCERT or by accessing the hackers’ servers. -Darren Pauli, Computerworld Australia Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe