Ultimate Frauds & Scams: Combining telephone and email!

by | Jun 1, 2011 | Email, Phishing, Scams and Spoofs

Just as “follow-up” is a key ingredient in business success – it is showing to be a key ingredient in successful phishing and other fraudulent activities as well.

This short story came from a friend in the corporate setting. With the ease and prevalence of fraud perpetrated over the Internet these days, I felt it worth putting in our newsletter. Knowledge about the tactics used is the best deterrent I can think of!

As told to me, several weeks ago at a local town hall meeting here in New Hampshire, there was discussion about social engineering. Part of this discussion focused on how the “bad guys” use our kindness and willingness to help others against us. Recently, an employee in a large company fell victim to one of these exploits. Luckily, she took quick action so that the company could prevent any serious issues.

Here are the details:

The main goal of this particular social engineering attack was to get the company’s employee to download a file from a website by posing as a Dell employee – of course the perpetrator could pose as being connected to ANY reputable company.

This employee has never done business with Dell, and had never contacted or signed up for any information from them. However, several days ago she received a call from someone indicating he was “a Dell employee”. He asked her to check her inbox for an email he had just sent her. She saw the email and he asked her to click on a link within it to open a PDF file and verify that all the pages were there. She complied with the “Dell rep’s” request and clicked on a link in the email. That brought her to a website. At the website, a PDF file was downloaded. She then opened the PDF to verify how many pages were present and stated to the Dell rep that everything looked to be there. The “Dell employee” thanked her and stated that a follow up call would be placed later in the week. After hanging up, she started to think about the situation and immediately went to the company’s IT helpdesk to report the incident.

The IT staff had to rebuild her machine from scratch to ensure that the download was not a virus, but because of her quick action after the fact, had avoided more significant problems.

Hopefully, this email will help to remind everyone of the potential for social engineering and phishing.

Please remember these important details:

  • DO NOT under any circumstances share passwords. NO ONE should know or will need to know your passwords.
  • If you receive an email – or a phone call from any individual you do not recognize – DO NOT follow their directions if they instruct you to install or open anything on your system.
  • Do not open attachments or click any links in your email that you do not recognize as legitimate.
  • Always make sure to hover over the link to check the actual destination (for example, an email from Dell should only have links to www.dell.com).
  • In the corporate or company setting be sure to report ALL incidents that involve possible virus infection, social engineering, or any other computer security issues to your IT department or whomever is in charge of your computer systems so that they may investigate these instances accordingly and determine appropriate action.

About Robin Snow

Robin is General Manager of CharlesWorks in its Peterborough, NH office. She is a Keene, NH area native with previous experience in the banking and finance fields.

She has been with CharlesWorks in various capacities since 2004.Her experience at CharlesWorks ranges from finances through web design and technical writing.

Robin is enthusiastic about helping people get onto the web and adept at explaining in non technical jargon about our ability to provide reliable and affordable hosting solutions. If you don’t know where to get started with a web presence, call Robin!

 

 

CLICK HERE to find your domain name!   CLICK HERE to transfer your domain name!

Archives

Tags

24 hour (1) Accessibility (2) Accounting (1) Advertising (15) AdWare (1) Alex Johnson (2) Alignment (1) Android (2) Anti-Virus (1) Antivirus (1) Antrim Computer Repair and Service (3) APC Back-UPS (1) Appearance (2) Apple Mail (4) Apple Mobile Mail (2) Attachments (1) Audit (1) Authorized (1) Autoresponder (5) Availability (1) Backups (1) Badges (3) Bank Account (1) Bank Statement (1) Battery Backup (2) Better Business Bureau (3) Bob Hill (1) Bookkeeper (1) Branding (8) Budget (2) Business (26) Business Management (1) Catalog (1) Categories (1) Charles Oropallo (1) CharlesWorks (42) Cherryl Jensen (1) Chrome (1) Cloud (1) Code (2) Communicating (1) Competition (1) Computer (2) Computer Cache (1) Computer Hardware (1) Computer Security (2) Constant Contact (1) Consultation (1) Contact Information (2) Content (1) Content Management (33) Content Management System (1) Copiers (1) Copy Machine (1) Coronavirus (2) Courteous (1) COVID-19 (3) Credibility (9) Credit Card (1) Credit Card Processing (1) CSS (9) Customer Service (2) Database (1) Debian (1) Design (45) Design Expertise (1) Desktop (1) Dialup (1) DirectAdmin (3) Directions (1) DIVI (7) DNS (2) Do-it-Yourself (1) Documentation (1) Domains (18) Domain Transfers (5) E-Commerce (1) ecommerce (1) Elementor (1) Email (63) Email Lists (4) Email Management (2) Email marketing (3) Etiquette (3) Eudora 6 (1) Exchange (1) Expanding (1) Facebook (1) Financial (1) Finish (1) Firefox (1) Fonts (1) Forms (2) Forms Protection (1) Fraud (2) Galaxy S4 (1) General Info (1) Gmail (1) GoDaddy (1) Google (1) Google Adwords Certified Partner (1) Google Chrome (2) Groups (1) Happy Holidays (1) Hardware Help (1) Hill Specialty Networks (1) Hosting (1) Images (1) IMAP (1) include (1) Infected (1) Information (32) insert pages (1) install (1) Internet Browsing Errors (1) Internet Consultant (1) Internet Explorer (1) Joomla! (1) Keywords (2) Laptop (1) Legibility (1) Linux (8) Logging on (1) Macintosh (1) Mail 6.0 (1) Mail 2011 (2) Make-Over (1) Malicious (1) Malware (1) Marketing (8) Matt Burke (3) MDaemon (3) MelbourneIT (2) menu (1) Merchant (1) meta (1) Microsoft (1) Microsoft Edge (1) Microsoft Hosted Exchange (5) Microsoft Live (2) Mobile Email Setup (1) Monadnock Region (1) Mozilla Firefox (2) MySQL (1) Nathan Wesley (1) Netscape (1) Netscape Messenger (1) Office Copiers (1) OfficeLive (1) Online (1) Outlook (9) Outlook 2010 (2) Outlook Express (1) PayPal (1) Pay Per Click (2) PC (1) Personal (1) Peter Harris (1) Peter Harris Creative (1) Phishing (2) PHP (3) pixel (1) plugins (1) Pop Email (1) Popularity (1) Portfolio (1) Power Grid Failure (1) PPC (1) Prevent Fraud (1) Privacy (1) Private (1) Product (6) products (1) Professional (5) Projects (2) Protect (1) Protection (1) QR codes (1) Quality (2) QuickBooks (1) Reconciliation (1) Reduce Risk (1) Register (1) Reliability (2) Renew (1) Reseller (2) Resolution (1) Restrict User Access (1) Results (1) Review (2) Risk (1) Robin Snow (1) Roundcube (1) Safe (1) Samsung (2) Scam (16) Scammer (16) Search (1) Search and Replace (1) Search Engine Optimization (SEO) (20) Security (23) Security Risk (1) Selling (1) Servers (2) Service (11) Shopping Cart (1) Site (1) SmarterMail (9) Social Engineering (1) Social Networking (1) Software (1) Solutions for Today (1) Spam (1) Spam Filtering (15) Spammer (1) Spyware (2) SquirrelMail (1) SSL (8) Statistics (2) Stats (2) Stone Pond Technology (1) Storage (1) Support (1) Tablet (1) Target Market (1) Technical Help (1) Testimonials (9) The CW Corner (1) Thom Little (1) Thom Little Associates (1) Thunderbird (3) Thunderbird 10 (2) TLD (1) Topic (1) Top Level Domains (3) Transaction (2) Transfer Data (1) Transfer Funds (1) Typography (1) Update (2) Uploading (1) UPS System (2) Up to Date (1) Virus (2) Viruses (1) Vista (1) Web (1) Web-Over (1) Web Development (99) Web Hoster (1) Web Hosting (2) Web Hosting Company (1) Webmail (8) Web Mail (1) Webmaster (10) Web Presence (26) Website (110) Website Development (1) websites (2) Web Stats (1) Web terms (1) Web Writing (1) Windows 7 (2) Windows Mail (6) Windows XP (1) WooCommerce (5) WordPress (88) WordPress Updates (1) Working Remote (2) Writing (1) YouTube (1)

Protected by Security by CleanTalk and CleanTalk Anti-Spam