Examples of clever phish that made it past my anti-spam nets and into my inbox. Some are contributed by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at email@example.com.
My intention is to provide a warning and show current examples of phishing scams, related articles, and education about how these scams and exploits work, and how to detect them in your inbox. If the pictures are too small or extend off the page, double clicking the image will display them in a photo viewer app.
I received this on Tuesday 2023-11-07, but failed to investigate this before the site was taken down. The link resolved to https://fotocuadros.com/New_Newsletters_Offers/ which most certainly is not DHL. Watch out for emails like this one. It looks like this was an attempt to get victims to pay “import duties” to the attackers.
Occasionally I get emails from the United Nations. These are always scams, as is this one. Like anyone at the UN is using AOL email addresses!
Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to Sean McNee at DomainTools. McNee points to an advance-fee scam from 1924, in which a crook sent a letter pretending to be trapped in a Spanish debtors’ prison.
The sender requested that the recipient send a check for $36,000 to pay off his debt. After the sender is freed, he promises to pay the recipient back, with an extra $12,000 for the trouble. Criminals still use this scam today, often posing as Nigerian princes.
Here are some best practice DomainTools offers to help users avoid falling for social engineering attacks:
- “Look out for unsolicited emails, messages, or phone calls, especially if they request sensitive information or immediate action. Phishing messages can create a sense of urgency or fear to pressure recipients into quick responses.”
- “If an offer seems too good to be true, it most likely is. Scammers use enticing offers to lure victims.”
- “Ask someone else for their opinions on a specific email or interaction. Sometimes a second review on a suspicious interaction can help you see the scam for what it is.”
- “Use multifactor authentication (MFA) for your accounts online, especially accounts with sensitive personal information such as your finances or email. Never give your MFA code to anyone who asks for it, only to the service webpage you are actively logging into.”
- “If you’re part of a critical business process, such as approving wire transfers, establish a secondary out-of-band process to validate these transactions. If you are in the same physical office, for example, agree to talk to the other approver face-to-face. If you’re remote, create a second communications channel, like text messaging, phone calls, or Slack, for approvals.”
Blog post with links:
And then there is the article at CNBC about how a 77-year-old widow lost $661,000 in a common tech scam: ‘I realized I had been defrauded of everything’. Share this: