|
08-31-2010, 09:55 AM
|
#1
|
Montana Master
Join Date: Jan 2006
Location: Grove City
Posts: 1,357
M.O.C. #5192
|
RED ALERT! Virus email circulating!!
I just received an VERY official-looking email from FedEx (supposedly) with an attached "invoice" I was supposed to download.
I contacted FedEx and they say they have been getting numerous reports of this fraudulent email for 3 days now.
DO NOT DOWNLOAD anything if you get a similar email.
Larry
|
|
|
08-31-2010, 01:01 PM
|
#2
|
Montana Master
Join Date: Jun 2010
Location: Colorado Springs
Posts: 3,335
M.O.C. #10496
|
Thanks for the tip! Go to: http://www.snopes.com/computer/virus/ups.asp for the background on this.
__________________
2010 3150RL
LevelUp, Dual 6 volt batteries, Progressive Industries EMS HW50C, Honda EU2000i Generator, Bridgestone Duravis R250 tires, Torklift Glowstep Revolution Stairs, LED Tail lights
2015 RAM 3500 Laramie SRW LB CC Cummins 6.7L Aisin Trans B&W RVK3600
|
|
|
08-31-2010, 01:59 PM
|
#3
|
Montana Master
Join Date: Sep 2006
Location: Casa Grande
Posts: 5,369
M.O.C. #6333
|
Larry, I got one from E-Cards from "A Friend". My Antivirus program said it had a virus that could not be cleaned. I deleted without opening. This was supposedly from Hallmark.
|
|
|
09-04-2010, 07:12 AM
|
#4
|
Montana Master
Join Date: Feb 2005
Location: Pagosa Springs
Posts: 3,711
M.O.C. #3120
|
Phil,
Unfortunately, there are lots of greeting card viruses out there.
Who are these sick people who create them?
|
|
|
09-04-2010, 09:43 AM
|
#5
|
Montana Master
Join Date: Nov 2003
Location: Santa Fe Springs
Posts: 4,189
M.O.C. #639
|
Some people will do anything to make your life miserable, as there must be.
__________________
Pulling a 2004, 2980 RL an oldie but goodie.
Tow vehicle is a 2009 RED RAM 3500 DRW.
|
|
|
09-07-2010, 03:54 AM
|
#6
|
Montana Master
Join Date: Apr 2005
Location: Concord
Posts: 575
M.O.C. #3543
|
We had the pleasant (Not) experience of having one of email accounts hijacked on Friday. While traveling to Maine for the weekend I started getting phone calls from friends who were telling me they got a distressing email from me. Evidently the email stated that I was traveling in Wales, got mugged and needed money. Fortunately, my friends are smarter than me and realized that it was a scam. It took me all evening, after setting up Monty, to get it all squared away. Today I am fixing all my passwords to make them more difficult to hack.
|
|
|
09-07-2010, 12:56 PM
|
#7
|
Montana Master
Join Date: Sep 2007
Location: Texas City
Posts: 5,736
M.O.C. #7673
|
Pete,
They didn't hijack anything. What they did was harvest your email from one of many, many sources. Most likely someone forwarded an email with your email address still attached. I hate it when I get an email that has been forwarded 10 times and each time all the previous recipients email addresses are listed. Some one in the great circle of friends may have been compromised and the email was harvested from their system. Most good anti-virus programs will protect against that type of harvesting, but it doesn't stop there. Google search your name, like "pete hanson email" without the quotes. If you want to pay for it, your email is available.
It's a sucky system to say the least. Once you have sent anything over the ether, or have posted anything that you even think is in a secure location. It is there forever.
By all means, change passwords frequently. That is a good practice.
What you experiences is a "Spoofed" email that utilizes your email name and address that is visible, but the header information will actually reply to the perpetrator of the email. Header is not the To, CC, or BCC, but the information contained inside the email that directs it where to go. Most email programs will allow you to "view header." That is the true header information. It is what is required to be sent back to the "ABUSE@YOUREMAIL dot COM." Example would be abuse@yahoo.com for yahoo accounts. They act pretty darn fast when they recognize a scam. When I reported exactly what you described to my abuse server, they responded immediately and blocked that return address. Unfortunately they just resubscribe with a new account until their entire domain is blocked.
Good luck to all.
|
|
|
09-07-2010, 01:49 PM
|
#8
|
Montana Master
Join Date: Apr 2005
Location: Concord
Posts: 575
M.O.C. #3543
|
Wayne, I think my problem went further than your thinking. When support finally got me back into my email account the perpetrator had changed the password, and all the other profile information contained in there, including the so-called secret questions used for identity purposes. They also changed the alteranate email address to their own (or a fake) so I would not get notified that the password had been changed. Interestingly, the address they used in their profile was Nigeria. I had also made the mistake of using the same password for Facebook so they got into that account as well and tried to contact some of my "friends". Support told me that hacking email passwords has become an art form and their purpose is to try and solicit money from your contacts. The lesson learned for me was to use more complex passwords and not use the same one on many different accounts. Luckily, the email account they got into was not my primary one. It is the account I use to do all my online shopping so all the advertising goes there instead of my primary email account.
|
|
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
|
» Recent Threads |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|