Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Blinky the Shark
September 6, 2006, 2:43 am
rate this thread
Someone in another group who received one of these emails posted it and
mentioned the page below for a discussion on how it's done. Thought
some of you might be interested. And a couple people on the blog
admittted that they'd clicked the phishing link, albeit I don't think
they gave out any data to the phishers. The twist: it claims to be the
billing agent for various *nonprofits*.
krbill.com was registered about a week ago.
Blinky RLU 297263
Killing all posts from Google Groups
The Usenet Improvement Project: http://blinkynet.net/comp/uip5.html
Re: Scam Methods
They are getting smarter, gotta hand that to em'.
Someone cracked my old yahoo account and then used IT to attempt to phish,
by taking a look at all the contacts I have, posing as me, basically trying
to scam my friends in my name. (really ticked me off actually)
The "geocities" enter your yahoo blah blah blah to gain access to this
content is an easy one to fall for, as I understand it, geocities is owned
by yahoo and therefore, seems quite legit.
http://www.geniegate.com Custom web programming
firstname.lastname@example.org (rot13) User Management Solutions
Re: Scam Methods
Yea. It's getting scary. I was reading this on ./ just yesterday:
(link: http://tinyurl.com/gcvjd )
JohnGrahamCumming writes "According to a story in the San Francisco
Chronicle the AT&T store crack was the prelude to a very sophisticated
phishing operation. The phishers were aiming to use the information from
the store to fool existing customers into divulging SSNs and other
From the article:
"'The information that was provided by customers who ordered DSL-related
equipment included name, address, e-mail address, phone number, credit
card number and credit card expiration,' the memo says, adding that the
hacked data didn't include Social Security numbers or birth dates. But
the hackers had a scheme to get this extra info. After accessing the
customer data, they incorporated it into phishing messages that were
promptly sent to AT&T's DSL customers ... Each message included a
legitimate order number culled from the AT&T vendor's database to create
an illusion of authenticity. Messages also included the recipient's home
address and the last four digits of his or her credit card number. "
Of course, the "just don't do it" rule protects against event this
- » Cyberdyne Systems - Reliable and Affordable Web Hosting & Design
- — Previous thread in » Webmaster Forum