Journey with Confidence RV GPS App RV Trip Planner RV LIFE Campground Reviews RV Maintenance Take a Speed Test Free 7 Day Trial ×
 

Go Back   Montana Owners Club - Keystone Montana 5th Wheel Forum > GENERAL DISCUSSIONS > Sitting around the Campfire
Click Here to Login

Reply
 
Thread Tools Search this Thread Display Modes
 
Old 03-24-2011, 11:07 AM   #1
Ozz
Montana Master
 
Join Date: Jul 2006
Location: K.C.
Posts: 11,731
M.O.C. #5980
Possible fraud, don't click on the link.

And, don't give them your account.
I got this email from B.O.A. I think it is a fraud, it wants me to click on the link and log in. I forwarded it to B.O.A. Fraud division until I am shure...
We don't have an account there except a small loan.
I think a real one would have all rights
Instead of all right reserved

-----------------------------



Account Status Notification

We are contacting you to remind you that our Account Review Team identified some unusual activity in your account. In accordance with Bank of America Online Banking User Agreement and to ensure that your account has not been accessed from fraudulent locations, access to your account is been limited. Your account access will remain limited until this issue is resolved please log in your account to restore your account activity by clicking on the link below:


My Account Activity

Sincerely,


Director of Customer Advocacy
Bank Of America - eCommerce Division

Contact Us
Online Services
24 hours a day
seven days a week.
Bank Of America service.

(c)2011 Bank Of America.

All Right Reserved.
 
Ozz is offline   Reply With Quote
Old 03-24-2011, 11:42 AM   #2
7.3Ford
Montana Master
 
7.3Ford's Avatar
 
Join Date: Oct 2009
Location: Indian Land
Posts: 1,142
M.O.C. #9808
Jim,

Your are correct, never click a link to login. You should enter the URL manually or from your book mark for your online banking. If it is valid, you will have a secure message waiting for you after you login.

Banks never ask for information via email. They will send you alerts, if you signed up for them, but that's it. Someone is definitely fishing here.
__________________
2015 Montana 3611RL - 2020 RAM 3500 SRW 4X4
John Walker, Indian Land, SC
Blog https://RoVIngWalkers.blogspot.com/
7.3Ford is offline   Reply With Quote
Old 03-24-2011, 11:57 AM   #3
BB_TX
Montana Master
 
Join Date: Oct 2006
Location: McKinney
Posts: 7,160
M.O.C. #6433
If you right click on those links, and then click properties, you will often find that the link has nothing to do with the supposed site.
They might also try to fool you by putting in something like bankofamerica.services.com or some such variation. That would probably not be the same as the legitimate bankofamerica.com web site.
Best to do as you did. Or go directly to the legitimate web site and pursue it from there.
__________________
Bill & Patricia
Riley, our Golden
2007 3075RL (recently sold, currently without)
BB_TX is offline   Reply With Quote
Old 03-24-2011, 12:04 PM   #4
Waynem
Montana Master
 
Join Date: Sep 2007
Location: Texas City
Posts: 5,736
M.O.C. #7673
Thanks Jim.

and:

In the email program, look at "headers." Headers are not the from: to: CC: Bcc: line, but the hidden information in the email that traces the email and tells it where to go. You start from the bottom and read up to the top. You will ind addresses in there that are not your bank.

Also, one of the drop down menus will have a "view page source" and you can look at the email in a different view. Look for the link that was in the email, and you should see an added piece of information that is not viewable in the actual email format, only in page source view.

Whenever you forward an email to the abuse people you should send it in the full header format. It does them no good to just received an email that has been forwarded in the typical email format.

This is what a "LONG HEADEER" format looks like: (very technical. I changed some email addresses for safe reasons, but the IP's are still good. this is what the abuse people need. see my other comments below this.)

From: ING DIRECT
Subject: Hi, hey and hello from We, the Savers.
Date: March 17, 2011 8:25:31 PM CDT
To: someone@SBCGLOBAL.NET
Reply-To: saver@ingdirect.com
X-Apparently-To: someoneelse@sbcglobal.net via 68.142.199.167; Thu, 17 Mar 2011 18:50:30 -0700
X-Yahoofilteredbulk: 98.139.91.83
Received-Spf: softfail (mta1029.sbc.mail.sp1.yahoo.com: domain of transitioning saver@ingdirect.com does not designate 98.139.91.83 as permitted sender)
Received-Spf: pass (mta1048.sbc.mail.sp1.yahoo.com: domain of saver@ingdirect.com designates 63.113.210.126 as permitted sender)
X-Ymailisg: M5SbEhMcZApOHhPPHKcskguwtEOGDDMRT0GxaJvB19J0weQS 7idck0SglTLhFzZo2MKUqC8RislZAlv1Ie7cxCgh83ZSfZJqMc 2zW.L6kp6d EJmOIG3qS55UjVdvix0hLI1DYXW7FB6AWO1MYjLKxOPchTl4o. o6griflwlw Yy2j.yuGEu5_qHkCiiEh6g2xAaN0q3naBXjFLdP1OUhXq.lIfR n3JVQ3Qlhp C4.TfO.aQqlw.fYCiWo3MwkvWmulCnNOZB_R3IJ4U3jRufLd_a h3p_XKdGA4 GNaa7qPHtT9lQk5UjrBgLh5y8ZUhEQUXabL2erqGR42Wh07xUc kiwMyAkceF ARSJ8g9aNvsWQeRN2Z1o17_wFAVp8PaKBkYNbWgdXZGJYsFVDF nkqGM0NUPr n9DFg3Ls2gjtSkOzxXJ_pbkuBR.ErXKEDFb3HZ7Mm2CMI16J8J ExWDlREijW C.qYtFiApNE3aTvG0mBnLB8roJxFldOH8e278Gd1IA8Ugq5a7L SxKkRER0Qh hDeV.CfZ5f3d6VmGDmwk1Cv4jABBt4DdU3ISSWKTvI5X_S9MD. C16Ms-
X-Ymailisg: n5ibotIcZAoyPMBcXJxHTyzWdLr6U8uGHD2u23E.UwipKTRL RkUIGdTc7a1369o7GNL5OYne7KVc4kLW2OVy65GZO5vy73oXZG 7xq_PfL_1S 51YqlRgpz2_EpN6mmDHEAKY6H8kgkYXyacB4ksNRt.s0huIIGR VOt1iW7GhA xWOWU4p8qUFdkOP7iUFndtFLWaM1_dtoa3CxA54KPIkAvy4ynI wSIjxHQV65 IVGcw6QRldQY7vZPCBWxQkoe8SnqBn8OGnc2oC769TvMZ38jbN _EHrrsNAE6 4zAIR3FisObaDdFzE9I.sF.jv0kQKU2YRKcAKM58WvsluyXDCK RKHuM3XlOP CTltL3zPJUCoFhtHYF7RouiC81VmFmcJv6E8y3nM3GH4O2Cy4R P4RHCwS6at reUCO7y38.lkDnM6JfaZ9noZpspACPqpb3Om6P2glUJuDRmU.4 4K4.CNVZRj UNeb3e6_hP3QdmBWd_kurDrTr05s2Yjmnc6GmYtGtSi4JJHwu2 xOAZm4c0wy J_zw7_7pzYYXJH7OowXkkA--
X-Originating-Ip: [98.139.91.83]
X-Originating-Ip: [98.139.91.83]
X-Originating-Ip: [63.113.210.126]
X-Originating-Ip: [63.113.210.126]
Authentication-Results: mta1029.sbc.mail.sp1.yahoo.com from=ingdirect.com; domainkeys=neutral (no sig); from=yahoo.com; dkim=permerror (bad sig)
Authentication-Results: mta1048.sbc.mail.sp1.yahoo.com from=ingdirect.com; domainkeys=neutral (no sig); from=ingdirect.com; dkim=neutral (no sig)
Received: from 207.115.36.55 (EHLO nlpi183.prodigy.net) (207.115.36.55) by mta1029.sbc.mail.sp1.yahoo.com with SMTP; Thu, 17 Mar 2011 18:50:30 -0700
Received: from nm13.bullet.mail.sp2.yahoo.com (nm13.bullet.mail.sp2.yahoo.com [98.139.91.83]) by nlpi183.prodigy.net (8.14.4 IN/8.14.4) with SMTP id p2I1oSpK001345 for ; Thu, 17 Mar 2011 20:50:29 -0500
Received: from [98.139.91.64] by nm13.bullet.mail.sp2.yahoo.com with NNFMP; 18 Mar 2011 01:50:28 -0000
Received: from [98.139.91.58] by tm4.bullet.mail.sp2.yahoo.com with NNFMP; 18 Mar 2011 01:50:28 -0000
Received: from [127.0.0.1] by omp1058.mail.sp2.yahoo.com with NNFMP; 18 Mar 2011 01:50:28 -0000
Received: (qmail 37505 invoked by uid 6007); 18 Mar 2011 01:50:28 -0000
Received: from 63.113.210.126 (EHLO nlpi166.prodigy.net) (207.115.36.38) by mta1048.sbc.mail.sp1.yahoo.com with SMTP; Thu, 17 Mar 2011 18:50:28 -0700
Received: from BULK6.ingdirect.com (bulk6.ingdirect.com [63.113.210.126]) by nlpi166.prodigy.net (8.14.4 IN/8.14.4) with ESMTP id p2I1m9HV002575 for ; Thu, 17 Mar 2011 20:50:27 -0500
X-Yahoo-Newman-Id: 235228.61382.bm@omp1058.mail.sp2.yahoo.com
Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1300413028; bh=cuU7YJOjqoyhmTpLbQr4PxYaeiTSG2uXitAggc2xtOQ=; h=X-Yahoo-Forwarded:Return-Path:Received-SPF:X-YMailISG:X-Originating-IP:Authentication-Results:Received:X-Originating-IP:Received:Message-ID:Subject:Sender:Fromate:To:Reply-To:X-Priority:MIME-Version:X-Mailer:X-##MessageLogID:Content-Type; b=HO6Cs2olgJTQwWHV3T5akzMuWBmisFauSDprEVQ701OPRERu 9mN2k23S9sJ4OAa9/tKg3tZRWk1ZW6MinMzE4II0WThlZ04SFbKAUq5K+AXZRDgu/UEqzNNKlfB4915uXW0i+W4f5R09SVZGpcUNpmBahBpXwskb0CP p0ZGfdWA=
X-Yahoo-Forwarded: from someone@sbcglobal.net to someoneelse@sbcglobal.net
Message-Id:
Sender: "ING DIRECT"
X-Priority: 0
Mime-Version: 1.0
X-Mailer: JMail 4.3.1 by Dimac
X-##Messagelogid: 675276513
Content-Type: multipart/alternative; boundary="--NEXT_BM_5E74AE05718C40D487299A0DAC68B3A3"

=====================
That is what a long header looks like, so when someone tells you to send the headers, that is what they are expecting, not just the email header you see in you email program.

About 99.99% of all companies have an abuse program. Their typical email address is:

abuse@(domain name). In my case it would be abuse@sbcglobal.net. If you are AOL it would be abuse@aol.com. You should receive a canned email back from them, and possibly a follow up later on.

Please, do report scams this way. It will help cut down on abuse.

That is the one thing that I like about the MAC Mail program. There is a little button I can click on that says, "Bounce." It sends the email back to the sender as if I do not exist. It has cut down on my email clutter considerably.

Good luck.

Edited: p.s., never click on a link you have not identified as one you want to go to. One of the firefox benefits is the add-on Web Of Trust (WOT) that warns when a web site is not trustworthy. I you are using Firefox I highly recommend it, along with Norton's Internet Security.
Waynem is offline   Reply With Quote
Old 03-24-2011, 12:35 PM   #5
Ozz
Montana Master
 
Join Date: Jul 2006
Location: K.C.
Posts: 11,731
M.O.C. #5980
You are scary smart.... remind me to keep on your good side. Pal...
Ozz is offline   Reply With Quote
Old 03-24-2011, 01:45 PM   #6
pbahlin
Montana Master
 
Join Date: Jun 2009
Location: Sioux Falls
Posts: 617
M.O.C. #9380
All the really secure banking online uses secure communications on their own site. They never send mail with actual content. They send something that says go to our site, login, and read your documents. The document on their site will have the actual communication they want to make.
pbahlin is offline   Reply With Quote
Old 03-26-2011, 05:35 AM   #7
richfaa
Montana Master
 
Join Date: Jan 2005
Location: North Ridgeville
Posts: 20,229
M.O.C. #2839
here is a way to see if it is a fraud if you are not sure....Instead of your normal login use any log in like////user name mickey ... password mouse. Or user name donald..password ..duck

The fradulant site will accept any login. Think about it.....
richfaa is offline   Reply With Quote
Old 03-26-2011, 05:46 AM   #8
CORattler
Montana Master
 
CORattler's Avatar
 
Join Date: Jun 2010
Location: Colorado Springs
Posts: 3,335
M.O.C. #10496
Ozz,
This is definitely a phishing attempt. Delete the email. Good idea to report it to BOA. The banks can't keep up with the scammers. One shuts down, 10 new ones open for business. Bad people.
Excellent info Wayne!
__________________
2010 3150RL
LevelUp, Dual 6 volt batteries, Progressive Industries EMS HW50C, Honda EU2000i Generator, Bridgestone Duravis R250 tires, Torklift Glowstep Revolution Stairs, LED Tail lights
2015 RAM 3500 Laramie SRW LB CC Cummins 6.7L Aisin Trans B&W RVK3600
CORattler is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Click Purse Workshop @ Jackson Yamaha_Mama North America MOC / Western Region 12 04-04-2013 11:12 AM
It was.... Their fraud department reply: Ozz Sitting around the Campfire 0 03-24-2011 11:10 AM
credit card fraud Dustytuu Sitting around the Campfire 14 02-25-2008 03:12 PM
Beware of Credit Card Fraud ols1932 Sitting around the Campfire 9 11-24-2007 08:17 AM

» Featured Campgrounds

Reviews provided by

Powered by vBadvanced CMPS v3.2.3
Disclaimer:

This website is not affiliated with or endorsed by Montana RV, Keystone RV Company or any of its affiliates. This is an independent, unofficial site.


All times are GMT -6. The time now is 06:18 PM.


Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2024, vBulletin Solutions, Inc.