Spam Scams and Hacking You
Spam Scams and Hacking You
Spam Scams and Hacking You
From the
Trenches
A real story from one of our colleagues
#dislike
WANT TO KNOW MORE
ABOUT FACEBOOK SCAMS?
Check out this article: facecrooks.
com/Scam-Watch/Top-TenFacebook-Scams-to-Avoid.html
SCAMS
According to Wikipedia, LinkedIn is a businessoriented social networking service mainly used for
professional networking. Unfortunately, the model by
which users are connectedaccepting requests from
total strangersperpetually breeds spam.
Bogus recruiting accounts attempt to build a network
map by sending requests to business professionals,
which in turn makes the bogus account look legit.
Victims are conned into giving up personal details,
such as email addresses, which the criminals use to
launch phishing campaigns and steer the users to
websites built around malware.
We need to be cautious when accepting invitations
from strangers. And especially cautious when clicking
the LinkedIn invite button in your email. When you
get a notification that Claire, the alleged Director
of Operations for Walmart, wants to add you to
her network, dont just automatically click accept.
Investigate Claire. Why would an executive of a major
corporation want to add YOU to her network? How
many connections does she have? The lower the
number, the more likely the account is fake. Do a
reverse image search. Who is Claire? If the account
is fake, the profile image will be used for multiple
accounts. A simple Google search of the persons name
is always a good starting point before adding someone
you dont know to your network.
And always, always, always add users via the
website. Never click the request directly from your
email. Sending bogus LinkedIn requests is standard
operating procedure for phishing emails.
1.
2.
3.
4.
5.
6.
7.
8.
9.
online presence.
email spoofers
blog.thesecurityawarenesscompany.
com/scam-alert-help-i-had-aneaster-disaster-in-the-philippines/
blog.thesecurityawarenesscompany.
com/conversation-starters-for-kidsreceiving-tech-gifts/
10.
PHISHING IN ACTION
An information security professional shared this example of a real phishing
email that came through her inbox. It made her pause because it looked so
legitimate. Read through her notes about the thought process she used to
figure out if it was real or not.
Inconsistencies in the links! [email protected] was just the
display name. [email protected] was the actual email URL.
Link inconsistencies!
When I hovered over Click here to login, this
very long URL appeared. Clearly, this is not a real
PayPal address. (And it had my email address
in the url, so it probably contained a script to
capture the associated login information!)
I opened a browser and logged in the way I usually do WITHOUT clicking on any of the links in the email and upon entering
my account, lo and behold, there were NO account notifications, nothing indicating that my account was limited. That confirmed
my suspicions that this was a phishing email. As you can see, they can be very convincing!
HEADLINE NEWS
Massive Government Data Breach
Exposes Every Filipino Voters PII
Y!
GSO
E
IBT
WP
IBM