Scam Methods

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View

Someone in another group who received one of these emails posted it and
mentioned the page below for a discussion on how it's done.  Thought
some of you might be interested.  And a couple people on the blog
admittted that they'd clicked the phishing link, albeit I don't think
they gave out any data to the phishers.  The twist: it claims to be the
billing agent for various *nonprofits*. was registered about a week ago.

Blinky                                                   RLU 297263
Killing all posts from Google Groups
The Usenet Improvement Project:

Re: Scam Methods

Quoted text here. Click to load it

They are getting smarter, gotta hand that to em'.

Someone cracked my old yahoo account and then used IT to attempt to phish,
by taking a look at all the contacts I have, posing as me, basically trying
to scam my friends in my name. (really ticked me off actually)

The "geocities" enter your yahoo blah blah blah to gain access to this
content is an easy one to fall for, as I understand it, geocities is owned
by yahoo and therefore, seems quite legit.

-- Custom web programming
guhzo_42@lnubb.pbz (rot13)                User Management Solutions

Re: Scam Methods

Suddenly, without warning, Jamie exclaimed (09-Sep-06 9:54 PM):
Quoted text here. Click to load it

Yea.  It's getting scary.  I was reading this on ./ just yesterday:

(link: )

---begin quote---

  JohnGrahamCumming writes "According to a story in the San Francisco
Chronicle the AT&T store crack was the prelude to a very sophisticated
phishing operation. The phishers were aiming to use the information from
the store to fool existing customers into divulging SSNs and other
personal information."

 From the article:
"'The information that was provided by customers who ordered DSL-related
equipment included name, address, e-mail address, phone number, credit
card number and credit card expiration,' the memo says, adding that the
hacked data didn't include Social Security numbers or birth dates. But
the hackers had a scheme to get this extra info. After accessing the
customer data, they incorporated it into phishing messages that were
promptly sent to AT&T's DSL customers ... Each message included a
legitimate order number culled from the AT&T vendor's database to create
an illusion of authenticity. Messages also included the recipient's home
address and the last four digits of his or her credit card number. "

---end quote---

Of course, the "just don't do it" rule protects against event this
sophisticated attack...


Site Timeline