Clever new attacks simulate emails with moderate level of important information but no alarming key phrases
People started getting phony emails this week that attempt to establish contact through benign messages. The older scams promise millions of dollars in lost money, sex, dates, or jobs.
This new round of phishing is different: the messages are low key and don’t contain anything that would raise alarm bells. Replying to get more detail can open up your system to phishing or trojan attacks.
Here are a few received in in the past 4 hours. None of them are from people I know but they do raise one’s curiosity which is the point: to hook you innocently into replying.
Email Change
Steve Rich has changed his email address due to excessive spam after having the same address for 15 years. Please, go to the website and contact the office via the contact directory on the top header, , (you will get general email address where you can request Steve’s new email) or, call the office at 973-458-1188 or Steve’s cell phone to get his new email address.
Outlook removed the links. The request is trying to verify your email and ip address.
Span arrest request from an unknown person
Nils Hansen here, I’m protecting myself from receiving junk mail. Please click the link below to complete the verification process. You have to do this only once.
or this one
Hello! Due to the horrible amount of junk email I get, I’m using a nifty web based app to make sure you’re a real human that I want to be in touch with, and not a spammer JERK. So, will you please click on the link provided to prove that you’re the real deal? Thanks! -Justin
Bounced mail
Sorry. Your message could not be delivered to:
julie hawkins,Fulton (The name was not found at the remote site. Check that the name has been entered correctly.)
It’s generally best to delete these messages or mark them as junk. One of the ones I got was so cleverly disguised Outlook refused to mark the send as spam.
Phishing attacks
In a phishing attack the spammer is trying to get at the least a verified email address through a return email. After that they may be looking for your computer ip, name, and other information sent in the email header. They would also like your name, address, and other information for identity theft or perhaps a window to attack your computer and insert a trojan. For more information see Wikipedia.
Leave a Reply