Account holders with at least two Australian banks have become victims of a phishing scam in which malicious code reveals the physical location of affected IP addresses using Google Maps.

Bank account holders in Germany and the U.S. have also been targeted.

The software installs a Trojan capable of key-logging user activity, hijacking infected computers.

The scam was circulated as a false news report claiming the Australian prime minister had suffered a heart attack. It installs a Trojan and backdoor code to capture all user input as well as compromising a Web server to allow the hacker to hijack the victims' computer.

The hacker is then provided with details on the number of infected machines in each country, while the Google Maps server is used to translate IP information to pinpoint the machines' physical location.

Websense Australia and New Zealand country manager Joel Camissar believes hackers could potentially use Google Maps to assist in identity theft.

"The hackers could correlate user information acquired from the key-logger with knowledge of where a user is located from Google Maps to masquerade as them," Camissar said. "With this they could access bank accounts and social security numbers." Camissar said there are around 750 infected desktops in Australia.

Westpac and the Commonwealth Bank were among those specifically targeted in Australia, while Bank of America and Germany's Deutsche Bank were also attacked. Westpac and the Commonwealth Bank were unavailable to comment at the time of publication.

Sophos senior technology consultant Graham Cluley said users are directed to a 404 error page which downloads the code.

"Recipients of the e-mail are encouraged to click on a link to obtain the latest information on Howard's health; however, this link takes users to a Web page which downloads malicious code to their PC, and then displays the real '404 page not found' error page," Cluley said.

"The scammers have registered several domain names that appear to be associated with a newspaper, and have gone to great effort to make people think that they really are visiting the genuine site by pointing to a real error page." "Everyone should be on their guard against this kind of e-mail con-trick, or risk having their PC infected."

Camissar was unsure whether Websense acquired the information through sample code provided by AusCERT or by accessing the hackers' servers.