![]() |
![]() |
Internet Security Information |
|
![]() |
![]() |
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. It involves the receiving of an email message with a link to a website where the victim would enter personal information. In this particular scam, you get an email from "Personal Banking: personalbanking@wellsfargo.com" stating that there may have been some unauthorized access to your account and that you should click the link and enter your account and verify some information. When you click the link you are taken to a site which looks identical to the Wells Fargo site. If you look at the HTML code of the site, you'll notice that they are almost identical. One thing about this scam which was somewhat surprising is that the message made it past my G-mail spam filter. This is slightly different to scams I have seen before in that they don't ask you to reply to this email with your account number like most others, and they don't ask for passwords or anything like that. They simply request that you log in, as you normally do, which would not raise the eyebrow of normal users. On a closer inspection of the site you will notice that the forms submit the data entered (user name and password) to some foreign script and not to Well Fargo. Most probably, the scammer is having all the usernames and passwords emailed to him. After submission of your information the site responds that your password is incorrect. Here an unsuspecting victim would assume that this was because of the supposed unauthorized access mentioned in the email. If you try to submit information a few more times, it takes you to another Wells Fargo look-alike page called "Online Banking Verification". Here they ask for SSN number, your ATM card number, the expiration date, the pin number and the CVV2# (4 digit verification). With the ATM information the scammer could max out your debit card. With all the rest of the information he has gathered it would not be at all difficult to call up Wells Fargo and basically take over your account. He could change billing addresses, get checks for you account, and simply wipe it out. How to spot scams like this Scams like these are usually easy to spot, but this one in particular was a bit tricky, however there are some basic methods you can use to spot these types of scams. First of all, check the link. Although it looks like the link is going to Wells Fargo's website, if you let the mouse hover over the link for a while and look in the status bar, you will get the real address of the link. In this case the scammer used just an IP address of his domain or machine. This, however, can be overridden on the internet (if the scammer changes the status bar) and sometimes even in your email, depending on what your security settings are. Check the address bar. In this case, the address bar reported that the website was also from the scammer's IP address. Simply put, it did not say www.wellsfargo.com. Very seldom would a scammer be able to fake this. They may, however, employ other tricks like buying a domain name with a slight spelling difference that the user might not notice or by simply loading the link in a new window and hiding the address bar altogether. Lastly, the only full proof method to avoid becoming a victim to a scam like this is to simply call in and verify the information over the phone. Please note; do not use a phone number in the email if one is given. Open up your phone book and locate the number for your firm and ask them about it. Just remember, if it looks funny and feels funny, it's probably a scam. Do not ever reply to such email messages for personal information as sensitive as account information and SSN. Below is a copy of the email message for your review and amusement. The link is active, however DO NOT ENTER ANY PERSONAL INFORMATION INTO THESE FORMS. THIS IS NOT WELLSFARO'S SITE. Kevin. A. Lloyd. From: Personal Banking < personalbanking@wellsfargo.com > Dear Member, 1. Login to your Wells Fargo Internet Banking account. In case you are not enrolled for Internet Banking, you will have to use your Social Security Number as both your Personal ID and Password and fill in all the required information, including your name and account number. 2. Review your recent account history for any unauthorized withdrawls or deposits, and check your account profile to make sure not changes have been made. If any unauthorized activity has taken p! la ce on your account, report this to Wells Fargo staff immediately. To get started, please click on the link below: https://online.wellsfargo.com/signon?LOB=CONS We apologize for any inconvenience this may cause, and appreciate your assistance in helping us maintain the integrity of the entire Wells Fargo system. Thank you for your prompt attention to this matter. Sincerly, Kevin A. Lloyd: Just launched a website, http://www.DeleteMySpam.com/, dedicated to helping to eliminate the spam crisis.
|
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our spam filter that insists on sending me, the administrator, a notification when it blocks an email. It's also set to delete some other mail automatically, those would be that come from addresses that have sent me spam. So I have 4000 of these in my trash. Yippee. How To Give Away Your Personal Information Identity Theft and Your Personal Information -------------------------------------------- Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. I could almost guess what it was he found. Have I been hacked? How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm ) have been hacked maliciously for the purpose of getting all my online sales and transferring it to his/her account. I've learned a valuable lesson that I would like to share with you so as to avoid becoming the next victim for this hacker. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on the Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be devastating. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. You finally find it at presents4aunties.com. The site looks a little rough on the edges, weird colors and such. But they have that gift you know will make Aunt Bess add you to her will. You purchase the gift, log off and head to bed. Tired but happy. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. The money those victims lost totaled nearly $5 billion. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap! Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. You can read about it here! And there are many other scams like Lottery, Letter of Credit, money transfer, black money conversion, real estate, fraudulent order and the list goes on and on. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. But how many people do that in their excitement to take their new computer out of the box and hook it and see what it will do? Sans Internet Storm Center says those people will have their computer infected with adware or worse in less than 20 minutes! Virgin computers online are an easy target, open to attack. When that person soon realizes their brand new computer is sick, first comes the shock, then the anger, then the question; how do I fix it? If the new computer owner is lucky they can fix it fairly cheaply. It might involve a lot of time listening to elevator music while you're in the hold queue?. either way it's no fun. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet? Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.....who? Strangers basically, Geez! The majority of identity thefts occur thru contractors employing people in entry-level jobs that have not been properly screened. Not even Hackers,Phishers or Dumpster Divers account for as many! The ideal location for a Identity stealer would be in a out sourced agency that fails to use adequate screening processes. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. By tightening up your own personal security measures, you'll be far safer when you go online, and much less likely to become just another victim in the world of cyber-theft. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. If you don't like the idea, find out what software can help you cover them. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc.) are very often aimed at stealing valuable -- in a direct sense of this word -- private and financial information. When written, these programs are spread all over the Web. ![]() |
home | site map |
Copyright © 2005 web.adsense.business.free.fr |