<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fake Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/fake/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/fake/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 26 Feb 2018 00:05:36 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Fake Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/fake/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Sneaky Tax Refund e-mails</title>
		<link>https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 09:55:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1139</guid>

					<description><![CDATA[<p>Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before. It is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1141" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg" alt="Tax refund scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.<span id="more-1139"></span></p>
<p>It is tax season in the US at the moment and there are a lot of scams going on, which the <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">IRS do warn people about</a>. This one caught my attention because it was a simple attempt to steal e-mail account credentials. Apparently there have been some changes made to the US tax code, which people are aware of but may not fully understand them, which may be enough to cause somebody to fall for this scam.</p>
<p>What happens is the victim receives an e-mail with the subject of &#8220;Federal Tax Refund Information&#8221;.</p>
<p>This e-mail then says &#8220;Good afternoon, I have a very important information for you concerning the Federal Tax Refund which I know that it will help you. Kindly check the attached file to view the details.&#8221; For those of you unfamiliar with <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, you might be tempted to open the attachment.</p>
<p>The PDF that is attached, when opened, simply contains what looks like a link to a Google Drive document.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1142 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png" alt="Tax refund scam google drive link" width="639" height="564" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png 639w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40-300x265.png 300w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p>Which of course you want to look at because, money! There is also a sense of urgency introduced by saying the tax refund document is only stored for 14 days. While this is a fairly lengthy period by phishing standards, it still sows a sense of haste.</p>
<p>Clicking on the link, brings you to a website that looks an awful lot like a Google Docs sign-in page which, if you are not paying attention, might cause you to give away your Gmail account name and password. I refer, of course, to not paying attention in regards to the address of the sign-in page, which is circled in <span style="color: #ff0000;">red</span>:</p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-1143 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png" alt="Tax refund scam google drive sign-in" width="616" height="536" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png 616w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54-300x261.png 300w" sizes="(max-width: 616px) 100vw, 616px" /></p>
<p>That is not &#8220;https://accounts.google.com&#8221; which would be what you are would normally expect. Of course if a genuine account and password is provided, then the evil doers will now take full control over the e-mail account and use it for nefarious purposes, UNLESS of course you had followed <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Commandment 7</a> and used two-factor authentication. If you had, you could then laugh at the bad guys attempting to login as you and failing because of this brilliant protection mechanism.</p>
<p>Then you calmly go ahead and change that password in ALL accounts that you used it in, because it&#8217;s now compromised.</p>
<p>While this has been relating to the US tax season, expect similar carry-on during October in Ireland.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dodgy e-mail that looks legit.</title>
		<link>https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 10:45:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=984</guid>

					<description><![CDATA[<p>I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like last weeks story, this message looked kinda plausible.It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-985" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg" alt="Dodgy e-mail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like <a href="https://www.l2cybersecurity.com/double-check-security/">last weeks story</a>, this message looked kinda plausible.<span id="more-984"></span>It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one person to be waiting on a delivery to fall for it.</p>
<p>Here is the offending dodgy e-mail:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-986" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg" alt="" width="516" height="352" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg 516w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1-300x205.jpg 300w" sizes="auto, (max-width: 516px) 100vw, 516px" /></p>
<p>To me, there are a number of obvious indicators that this is a dodgy e-mail:</p>
<ol>
<li>The sending address (the bit after &#8220;UPS View&#8221;) was not a UPS address.</li>
<li>The two links in the e-mail did not go to a UPS website.</li>
<li>Most obviously &#8230; I wasn&#8217;t expecting a delivery!</li>
</ol>
<p>So lets take them one at a time:</p>
<ul>
<li>Some e-mail clients don&#8217;t actually show you the whole e-mail address of the sender. They just show the <em><strong>Display Name</strong></em>, which in this case is &#8220;UPS View&#8221;. So if you were using such a client, then it would appear to be a legitimate UPS e-mail address. However in my case, there was this @aol.com e-mail address, which is not associated with UPS.</li>
<li>When you see a link in an e-mail or website, you can hover the mouse over it. Somewhere towards the bottom of your browser window, you should be able to see where the link is going to take you. In this e-mail&#8217;s case it was going here, which is not a UPS site:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-991" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-2.jpg" alt="" width="252" height="19" /></p>
<ul>
<li>In my case I wasn&#8217;t expecting any delivery. But what if I was? What if I was an under pressure procurement clerk in a large organisation? I&#8217;d be getting deliveries on a regular basis. I&#8217;d be very inclined to click on those links.</li>
</ul>
<p><span style="text-decoration: underline; color: #ff0000;"><strong>Please note</strong></span> I carried out the following action on a sacrificial machine, so please do not be tempted to ever click on links to see what happens next. It could end very badly for you.</p>
<p>So what would have happened if I did click on the link? A word document, with a name that started &#8220;Tracking-3154631&#8230;&#8221; was downloaded. This document, if opened, would persuade me to click on &#8220;Enable Editing&#8221; and then click on &#8220;Enable Content&#8221;. Once I had taken those actions, macros (a set of instructions for a computer) in the word document would have downloaded a really nasty piece of software. Then all of my files would have been scrambled and I would be presented with a ransom demand to get my data back.</p>
<p>If I was that under pressure procurement clerk, it would not have stopped at just the files on my computer, but any files that I could access on the company&#8217;s network. That could be very, very disruptive to the organisation.</p>
<p>Out of curiosity, I checked the website (the bit before the &#8220;/UPS/16-Nov&#8230;.&#8221;) that hosted that document. It appears to be a legitimate business website. However, they&#8217;ve probably been hacked by the bad guys, who are now using their site to host their malicious downloads.</p>
<p>UPS offer advice on <a href="https://www.ups.com/us/en/about/news/fraud-alert.page">fraudulent e-mails</a>.</p>
<p>As usual, we&#8217;ve even got a <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">commandment</a> that covers dodgy e-mails too. So have a read to see what you can do to protect yourself.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Double check your security.</title>
		<link>https://www.l2cybersecurity.com/double-check-security/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 09 Nov 2017 11:00:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=980</guid>

					<description><![CDATA[<p>There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification). I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-981" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/double-150x150.gif" alt="Double Check Security" width="150" height="150" />There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).<span id="more-980"></span></p>
<p>I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked me about a strange WhatsApp message that she received.</p>
<p>She showed me the message, which reportedly came from Apple, about a transaction on her account, that occurred in Mexico, which they blocked. There was a link for her to check her account. She told me that she had clicked on the link, and after signing into her iTunes account nothing else happened. Before I could say anything, she clicked on the link again and there was the sign-in page.</p>
<p>I have to say, that the WhatsApp message and sign-in page looked very plausible and legitimate. There were no spelling mistakes or lousy formatting. I had to break the news to her that she had given her iTunes ID and password to the bad guys and she needed to change her password as quickly as possible. So I took her through the process on her iPhone. When we got as far as here, I breathed a sigh of relief.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-982 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg" alt="" width="300" height="177" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password.jpg 550w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>With this <a href="https://support.apple.com/en-ie/HT204915">Two-Factor Authentication</a> turned on, the evil doers would not be able to access her iTunes, without access to her phone. That&#8217;s because Two-Factor Authentication is like a double check. When you sign in to an account with an ID and password, the service does a double check and sends a code to your phone as a text message, which you then type in to complete the sign in.</p>
<p>While we were reassured that her iTunes account was reasonably safe from being immediately hacked, I still got her to change her password to something new. I also advised her to change any other account that used that password as well.</p>
<p>This Two Factor Authentication malarkey is such a good idea, I&#8217;d even created it&#8217;s own <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phone scams &#8211; some current examples</title>
		<link>https://www.l2cybersecurity.com/phone-scams-current-examples/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 15:54:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=758</guid>

					<description><![CDATA[<p>In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite. The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-759" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg" alt="Phone scams" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite.</p>
<p><span id="more-758"></span></p>
<p>The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It was a UK number +44-141-846-1617. I didn&#8217;t answer and let it go to voicemail, which a minute or so later showed that I had a message. When I finished speaking with my client I dialed 171 and listened to it.</p>
<p>There was silence for a long time and then &#8220;Hi. A free Euromillions Lottery ticket is waiting for you at the upcoming 45 million Euro jackpot draw. To redeem, press 1.&#8221;. This was repeated until the voicemail cut out. Here is a recording:</p>
<audio class="wp-audio-shortcode" id="audio-758-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3">https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3</a></audio>
<p>There was probably some sort of auto-dialler that was cycling through a set of numbers and playing the message at them. Presumably if somebody pressed 1, they would be connected to an &#8220;agent&#8221; who would kick off the <em>sales-pitch</em>, with &#8220;Oh good news, you have won a thousand Euro in a special draw, just give me all of your bank account details and PIN number and we can transfer that money for you.&#8221; and then proceed to empty your account. <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>There were some reports in <a href="http://www.independent.ie/irish-news/news/garda-warning-over-lotto-scam-offering-free-play-in-the-euromillions-draw-35725526.html">May</a> about these calls coming from an Irish number, but this week it was a UK number.</p>
<p>The second of the phone scams came yesterday and was the old SMS text message with a link to a photo (apparently), and here is said offender:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-761 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png" alt="scam text" width="300" height="190" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-768x486.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-1024x648.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39.png 1079w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>It would be so easy to click on that link, but as I am a firm believer in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, I resisted the temptation to click and instead fired up a sacrificial machine and typed the link into that instead <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="15" height="15" />.  After a moment of the web address changing in the browser (also known as a redirect) I was presented with, what appears to be, the start of a movie trailer and then this message:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-762 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png" alt="" width="504" height="276" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png 504w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax-300x164.png 300w" sizes="auto, (max-width: 504px) 100vw, 504px" /></p>
<p>So like a good sucker, I clicked on OK and was presented with:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-763 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png" alt="" width="708" height="397" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png 708w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2-300x168.png 300w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<p>Anybody who read last week&#8217;s <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">post</a>, will know that these kind of sign-ups, will usually mean entering a credit card number somewhere, which will then be milked dry by the evil doers. I traced the original link to a company based in the Seychelles, so at least the money would be going somewhere nice <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f92/1/28/1f911.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f37/1/28/1f47a.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>So, please don&#8217;t fall for these phone scams. There are many others, so if in doubt, just remember &#8220;If it sounds too good to be true, then it probably is.&#8221; and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> for unsolicited e-mails, texts or social media messages with links.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3" length="107847" type="audio/mpeg" />

			</item>
		<item>
		<title>How a typo can cause you problems.</title>
		<link>https://www.l2cybersecurity.com/typo-can-cause-problems/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Jun 2017 14:55:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Adobe Flash Player]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Flash Player]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Typo]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=747</guid>

					<description><![CDATA[<p>Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;Typosquatting&#8220;. Essentially this is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-748" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg" alt="Typo squatting" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;<a href="https://en.wikipedia.org/wiki/Typosquatting">Typosquatting</a>&#8220;.</p>
<p><span id="more-747"></span></p>
<p>Essentially this is where the bad guys have a web page at an address that is very very very close to the spelling of a popular or well known webpage and they count on you having a typo and either missing a letter (e.g. instgram.com) or hitting an adjoining letter (e.g. facebooo.com) in error.</p>
<p><span style="text-decoration: underline;"><strong>Don&#8217;t try this on your desktop/laptop/tablet/phone</strong></span>. I have a separate, sacrificial machine which I can use for such things.</p>
<p>I tried to access www.instgram.com (missing the &#8220;a&#8221; in the middle) and received the following page:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-750" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg" alt="instgram.com 1" width="572" height="201" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg 572w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1-300x105.jpg 300w" sizes="auto, (max-width: 572px) 100vw, 572px" /></p>
<p>Notice the address where it is going to (circled in yellow) &#8211; that is not an Instagram address, but some sort of ad/advertising address.</p>
<p>When I clicked to continue, I got:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-749" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg" alt="instgram 2" width="765" height="472" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2-300x185.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>I didn&#8217;t continue any further, as I googled gr8musik.com and the results indicated it was a scam site, which if you registered with it, would take money from your credit card, even though you were supposed to be in some kind of a free trial period.</p>
<p>Similarly, I tried www.facebooo.com (an &#8220;o&#8221; instead of the &#8220;k&#8221;) and got the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-751" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg" alt="facebooo 1" width="798" height="409" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg 798w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-300x154.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-768x394.jpg 768w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p>This was just some kind of survey. But you never know what you will get. A subsequent attempt to go to www.instgram.com brought me to the survey, followed by the survey (again), followed by a sign-up form for mcplayz.com (identical to the above gr8musik.com). So these crooks are randomly sending you to different pages trying to compromise you in someway.</p>
<p>According to this <a href="https://isc.sans.edu/diary/Deceptive+Advertisements%3A+What+they+do+and+where+they+come+from/22494">post</a>, the victim&#8217;s typo sent him to a &#8220;Technical Support&#8221; page, where he was advised that his PC was locked and he needed to telephone for support. If he did this, the scammers at the other end of the line would have talked him through giving them remote access to the PC and then they would have totally locked him out and looked for his credit card details to &#8220;fix&#8221; the problem.</p>
<p>Some pages reached by a typo try to apparently show you a video, but then indicates there is a problem and that you need to download a specific video player to watch it. For example, the following headline is tempting you to watch the video to get your hands on software worth $7,000.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-753" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg" alt="video player not" width="765" height="462" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer-300x181.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>These will typically download what is referred to as adware, and if you read our last week&#8217;s <a href="http://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">post</a> about the Fireball adware, you can see  how insidious that adware can be. Adware will take control of your browser and fire ads at you while you are trying to use the internet. It might also re-direct your searches to odd search engines, which will likely attempt to track you and violate your personal privacy on the internet.</p>
<p>So just be careful when typing addresses. Better still use bookmarks.</p>
<p>If you do inadvertently get taken to some page that you never intended to go to, just close the browser immediately by way of the <strong>X</strong> in the top right-hand corner of the window. You might get warnings about losing data, just ignore them and close that browser. It would do no harm to run a spyware check on your PC at this point, in case any adware did manage to sneak in without your knowledge or permission. There are free tools from <a href="https://www.malwarebytes.com/">Malwarebytes</a> or <a href="https://www.safer-networking.org/">Safer Networking</a> that can do this for you, but you might want to also talk to some real life technical support (a techy friend or the IT team in your place of employment) about it and have them give your PC a once over.</p>
<p>Whatever you do, don&#8217;t continue to engage with a website that you weren&#8217;t intending to visit and stay safe.</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Evil e-mail has your name and address!</title>
		<link>https://www.l2cybersecurity.com/evil-e-mail-knows-you/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 15:52:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=602</guid>

					<description><![CDATA[<p>Reports today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://nakedsecurity.sophos.com/2017/03/30/the-scam-that-knows-your-name-and-home-address-heres-what-to-do/">Reports</a> today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll bet if you got this e-mail, it would get your attention pretty fast.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-604 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png" alt="" width="400" height="209" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21.png 640w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-605 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png" alt="" width="401" height="243" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p><span id="more-602"></span></p>
<p>Even though it is written in the scam-iest possible language with the bad spelling and poor English, because it is addressed direct to you, you are going to sit up and take notice. So much so, that you might be very tempted to open the attachment to see what other information this person has on you. You should know me by now &#8211; Just DON&#8217;T open the attachment on an e-mail from a stranger &#8211; delete the damned thing, as set out in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>If you did open it, it will ask for the password, which is specified in the evil e-mail:</p>
<p><img loading="lazy" decoding="async" class="wp-image-606 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png" alt="evil e-mail asks for password" width="401" height="238" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password.png 637w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>And after you enter that, it will want you to disable all of the security protections in Microsoft Word, so it can attempt to do it&#8217;s nasty work on your desktop/laptop:</p>
<p><img loading="lazy" decoding="async" class="wp-image-607 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png" alt="evil e-mail asks to disable security" width="400" height="346" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected.png 636w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>If you follow through and do what it asks you to do, you wont see any further information about you, you will see an &#8220;alternative fact&#8221; &#8211; It will tell you the file is corrupted and can&#8217;t be opened:</p>
<p><img loading="lazy" decoding="async" class="wp-image-608 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png" alt="evil e-mail shows corrupted message" width="401" height="234" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>In fact this is a sign that the evil e-mail has done it&#8217;s worst and may be scrambling your files and locking you out of them. The payload can vary, depending on what the evil doers decide they want to achieve. Trust me on this, it will not be anything in your best interests.</p>
<p>So please, JUST DON&#8217;T do anything with the e-mail! Delete the damned thing and go on with your life.</p>
<p>The fact that they have your name and address, while concerning is maybe not terribly surprising. After all in 2016, there was <em><strong>at least</strong></em> <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2016-1-6-billion-records-leaked/">3.1 billion records reported</a> as being leaked in various data breaches. So it is possible that your name, address and e-mail have made it into the hands of the criminals who are now trying to exploit the data in this nasty phishing scam.</p>
<p>Delete the e-mail and move on.</p>
<p>And let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scary new way to have your GMail password and account stolen.</title>
		<link>https://www.l2cybersecurity.com/gmail-password-stolen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jan 2017 11:43:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=467</guid>

					<description><![CDATA[<p>This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ? So what happens is you receive an e-mail from somebody you know, who also had a GMail (note the emphasis on had).  This e-mail will have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" title="GMail password" src="https://1.bp.blogspot.com/-7Vym9Gnn-zQ/WH9LZ13c8oI/AAAAAAAABFg/zZCh8CPJptAEG0tnmvSbwKCYH18Fu5n0QCLcB/s320/download.png" alt="Scary new way to have your GMail password and account stolen" width="316" height="159" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what happens is you receive an e-mail from somebody you know, who also <b><i>had</i></b> a GMail (note the emphasis on had). </span></p>
</div>
<p><span id="more-467"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This e-mail will have a subject line of a previous e-mail conversation that you have had with that person and also, what appears to be an, attachment that had been attached in an earlier e-mail in that conversation. So far this e-mail is looking <u data-blogger-escaped-style="font-weight: bold;">EXTREMELY</u> legitimate.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That attachment, is actually an image in the e-mail with a link embedded in it and if you click on it, it will take you to, what appears to be, the GMail log-in screen, as follows:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s1600/gmail-data-URI-sign-in-page.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s320/gmail-data-URI-sign-in-page.png" width="275" height="320" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Being asked to log-in like this would certainly trigger an alert in my mind that something was up. I would immediately check to see where this password page has come from, so I would look up at the address bar of the browser. This is what you would see:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" width="526" height="49" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;"> So that looks OK doesn&#8217;t it? <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> (nice and secure site) <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">accounts.google.com</span> (legitimate address) and the e-mail came from somebody I know, from an e-mail conversation I have had with them, that had an attachment, which was here again in this new e-mail. <b>All very believable! </b>So let me enter my GMail ID and password and &#8230; you&#8217;ve now given the hackers your credentials.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Within minutes, they will have taken over your GMail account and will be sending this nasty surprise e-mail to your friends, family and colleagues.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So how do I know it&#8217;s not a legitimate GMail login screen? Let&#8217;s take another look at that address bar:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" width="528" height="52" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That first part of the address (highlighted) looks <i data-blogger-escaped-style="font-weight: bold;">a bit odd</i>, don&#8217;t you think? It is very odd. It actually has a verrrrrrrrry long string of text, which stretches off beyond the end of what you can see in the address bar that executes a script, which brings up that log-in page.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Also, if you know your secure websites, you know that where there is proper <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> there is also a green padlock symbol like this:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><a href="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s1600/Capture.PNG" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s320/Capture.PNG" width="320" height="35" border="0" /></a></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That gives a high degree of confidence that the site is legitimate and properly secure.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Here&#8217;s the best possible protection for your GMail password</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve said this numerous times. I tell everyone I know, that they must set this up to protect their accounts. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">It is known by many names &#8211; Two factor authentication or Two step verification or Login approvals.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve a whole <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, so please have a read and please implement it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This protection, won&#8217;t prevent you falling for the scam outlined above. What it will do is prevent the bad guys from accessing your account, even though they have your GMail ID and GMail Password, they won&#8217;t have your smart phone and as such won&#8217;t be able to sign in as you.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Please implement Two factor authentication on all your on-line accounts. It really gives you the best possible protection.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">h/t to the folks over on <a href="https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/">WordFence</a> for the details on this.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</title>
		<link>https://www.l2cybersecurity.com/facebook-messenger-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 18:44:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=474</guid>

					<description><![CDATA[<p>I&#8217;ve seen evidence of this scam occurring amongst my Facebook friends this Christmas. It&#8217;s a straightforward phishing scam, where one of your friends sends you a Facebook Message with an apparent link to a video of you. Sometimes they might ask &#8220;Is this you?&#8221; or tell you to go a specific point in the video&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-messenger-scam/">Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-qxQazzFfSC4/WGVRrdjSMvI/AAAAAAAAA80/CXvMAh9RaEgIe1RKJjnONqMD_ccMET7DQCLcB/s320/facebook-scam.gif" alt="Facebook messenger scam" width="320" height="100" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I&#8217;ve seen evidence of this scam occurring amongst my Facebook friends this Christmas. It&#8217;s a straightforward phishing scam, where one of your friends sends you a Facebook Message with an apparent link to a video of you. Sometimes they might ask &#8220;Is this you?&#8221; or tell you to go a specific point in the video to see yourself. Of course what has happened is your friend&#8217;s account has been hacked and the scammers are using your friend&#8217;s contact list to spread their evil wares.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">This is an example of a message that a friend of mine received from one of their Facebook friends. I&#8217;ve blurred the pics and redacted the name to protect the parties involved:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: left;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><a href="https://3.bp.blogspot.com/-qODdxoc8V20/WGVS-xdU8ZI/AAAAAAAAA9A/JW2eSV4FhqQ0ot3t8CuwfUsCY77SGH-cgCLcB/s1600/fb%2Bhack2.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-qODdxoc8V20/WGVS-xdU8ZI/AAAAAAAAA9A/JW2eSV4FhqQ0ot3t8CuwfUsCY77SGH-cgCLcB/s400/fb%2Bhack2.jpg" width="400" height="234" border="0" /></a></span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: left;">This is pretty compelling. It looks like there is a video of you on YouTube with nearly 384K views. You&#8217;ve got to go see what everybody is looking at &#8230; right?</p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">WRONG!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you click on this, it will either take you to a web page that asks you to sign-in to Facebook with your ID and password or it tries to install a facebook app and looks for various permissions to your Facebook profile.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you proceed with either signing in or installing the app, then your Facebook profile now belongs to the bad guys. They will mercilessly spam and phish your Facebook friends. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you have fallen for this, then first thing to do is remove the app from your Facebook account (if it has access). Go to <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; Apps</span> and locate the offending app and remove it&#8217;s access. You could also go into <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; Blocking</span> and block the app there too.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Next thing you must do is change your Facebook password. You will find this under <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; General</span>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">And finally, if you had used the same password for Facebook and for your e-mail, for the love of dogs, change your e-mail password right now and change it to something else completely different to your Facebook password. If the evil doers compromise your e-mail account, your online life will become a lot more troublesome for you than a few spammy Facebook messages.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Finally, finally &#8211; if you have not already done so, turn on <i>Two Step Verification</i><span style="color: #ff0000;" data-blogger-escaped-style="color: red;">/</span><i>Login Approvals</i><span style="color: #ff0000;" data-blogger-escaped-style="color: red;">/</span><i>Two Factor Authentication</i>, whatever they call it, on your all of the on-line accounts that you have, which have this feature. What this means is that not only do you have to have your user ID and password to access your account, but also a code generated by an App on your phone or a text message sent to your phone which adds another layer of protection. If the bad guys get your ID and password, they won&#8217;t be able to compromise your account without access to your phone.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">There&#8217;s more detail about this subject <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">here</a>.</span></p>
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Let&#8217;s be careful out there.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-messenger-scam/">Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>There is a lot of variations in scam e-mail the last couple of days.</title>
		<link>https://www.l2cybersecurity.com/variations-of-scam-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 16:29:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=576</guid>

					<description><![CDATA[<p>I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ? In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people. I&#8217;ll run through three sneaky methods&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s1600/emailscam.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s320/emailscam.jpg" width="320" height="240" border="0" /></span></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I&#8217;ll run through three sneaky methods that have been attempted on others over the last 48 hours.</span><span id="more-576"></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(1) Non-Delivery Receipt.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You know these e-mails. You get them when you send an e-mail, but you make a mistake and send it to an address which doesn&#8217;t exist or the mailbox has a size limit and your e-mail breaches that limit. This is the text of the Non-Delivery Receipt (NDR) in this instance:</span></p>
<blockquote class="tr_bq">
<pre data-blogger-escaped-style="background: rgb(238, 238, 238); border: 1px solid rgb(204, 204, 204); color: #222222; padding: 5px 10px;"><span style="font-family: 'courier new', courier, monospace; font-size: small;" data-blogger-escaped-style="font-family: &quot;courier new&quot; , &quot;courier&quot; , monospace; font-size: x-small;">Your message was not delivered due to the following reason(s):

Your message could not be delivered because the destination server was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.

Most likely there is a network problem that prevented delivery, but
it is also possible that the computer is turned off, or does not
have a mail system running right now.</span></pre>
</blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a ZIP file attached to the NDR, which of course has some nasty software that does not have your best interest at heart. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(2) A Microsoft Sharepoint Notification.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is a particularly sneaky one, as lots of larger organisations depend on Sharepoint&#8217;s sharing abilities.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The e-mail looks something like this:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s1600/sharepoint-spam.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s400/sharepoint-spam.png" width="400" height="295" border="0" /></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The Link in the body text would take you to a not particularly nice website. No doubt it might attempt to infect your computer. </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(3) Somewhat abusive attempt to get you to open the attachment.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Please be warned, there is a profanity ahead. I wanted to leave it in as it does generate something of a visceral reaction when you read it.</span></p>
<blockquote class="tr_bq"><p><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Subject: credit card charge from &lt;<i>your company&#8217;s domain name</i>&gt; </span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">What is this fucking charge on my card?</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I never visited or bought anything from &lt;</span></span><i data-blogger-escaped-style="color: blue; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;">your company&#8217;s domain name</i><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">&gt;.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached a screenshot of my statement.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I want my money back!!!</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached my card statement, please get back to me ASAP.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Thank you</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">company name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">person name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">phone</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">fax</span></span></p></blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a Word document attached to the e-mail, which of course has &#8230; nasty ransomware, which will scramble all of your files and leave you with a very bad day ahead. </span>?<span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><b></b></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>Conclusion</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I hope you noticed that I was pretty consistent in my recommended action &#8230; this is because it is from <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment #5</a> in our <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments of Cyber Security</a>.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you wish to train your staff on how they can spot these type of e-mails, then have a read of <a href="http://www.l2cybersecurity.com/security-awareness-training/">this course outline</a> and contact us on the number or e-mail address at the end of that. We&#8217;ll be happy to discuss your training requirements and provide a quotation to cover same.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And lets be careful out there.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">H/T to the SANS Institute&#8217;s Internet Storm Centre @ <a href="https://isc.sans.edu/">https://isc.sans.edu/</a></span></p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Snail mail delivers USB keys &#8230; WTF?</title>
		<link>https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 00:09:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=561</guid>

					<description><![CDATA[<p>I find I&#8217;m writing a second article about Evil USBs within a week. At least these ones don&#8217;t destroy your equipment, but they might infect you with nasty software that does things that you really wouldn&#8217;t want it doing. In this case, in Victoria, Australia, Evil Doers were dropping USB drives into people&#8217;s mailboxes. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/">Snail mail delivers USB keys &#8230; WTF?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="http://assets.amuniversal.com/0601c830b0bd012e2f8800163e41dd5b" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fassets.amuniversal.com%2F0601c830b0bd012e2f8800163e41dd5b&amp;container=blogger&amp;gadget=a&amp;rewriteMime=image%2F*" alt="Dilbert dirty USB key" width="587" height="185" border="0" data-orig-src="http://assets.amuniversal.com/0601c830b0bd012e2f8800163e41dd5b" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">I find I&#8217;m writing a second article about Evil USBs within a week. At least these ones don&#8217;t <a href="http://www.l2cybersecurity.com/usb-machine-killer/" data-blogger-escaped-target="_blank">destroy your equipment</a>, but they might infect you with nasty software that does things that you really wouldn&#8217;t want it doing.</span></p>
</div>
<div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">In this case, in Victoria, Australia, Evil Doers were dropping USB drives into people&#8217;s mailboxes. The <a href="https://www.vicpolicenews.com.au/news/harmful-usb-drives-found-in-letterboxes" data-blogger-escaped-target="_blank">report from Victoria Police</a> stated:</span></p>
</div>
<blockquote class="tr_bq">
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Upon inserting the USB drives into their computers victims have experienced fraudulent media streaming service offers, as well as other <b>serious issues</b>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">The USB drives are believed to be extremely harmful and members of the public are urged to avoid plugging them into their computers or other devices.</span></p>
</div>
</blockquote>
<div data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">That reference to other serious issues, is quite likely a Ransomware incident, where all of the files and folders on the victim&#8217;s machine gets scrambled and they have to pay the bad guys good money to get their data back.</span></div>
</div>
<p><span id="more-561"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">A <a href="https://cdn.elie.net/publications/users-really-do-plug-in-USB-drives-they-find.pdf" data-blogger-escaped-target="_blank">2015 study</a> conducted by a group of researchers from the University of Illinois, the University of Michigan and Google revealed that nearly half of people would not only plug a USB drive they&#8217;ve found on the ground into their PCs, but would also open files and click on unfamiliar links.</span></p>
</div>
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Now in this study&#8217;s case, the USB sticks were dropped on the ground and people&#8217;s reasoning behind accessing the memory sticks was generally for the altruistic purpose of identifying it&#8217;s owner in order to return the device to them.</span></p>
</div>
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">In this new case in Australia, the devices come wrapped in plastic, so would appear to be brand new devices, just left in by some generous benefactor. </span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://www.vicpolicenews.com.au/sites/default/files/usbs.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://www.vicpolicenews.com.au/sites/default/files/usbs.jpg" width="320" height="238" border="0" /></a> <span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Look folks, it really is simple. As I stated in my <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" data-blogger-escaped-target="_blank">9th Commandment</a> &#8211; <span data-blogger-escaped-style="line-height: 107%;">Thou shalt never insert nor allow to be inserted, a USB memory stick that thy hath never had complete control of since it was removed from its packaging.</span></span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><span data-blogger-escaped-style="line-height: 107%;"><br />
</span></span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Now in this case you could be forgiven for thinking they are still in their packaging. The packaging I refer to was coming from a retail or on-line store.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">But really, somebody is just going to drop a USB memory stick in your mailbox because &#8230; what &#8230;</span></p>
<ul>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You&#8217;re a good customer? (of whom?)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You deserve it? (why?)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">It was a mistake (it wasn&#8217;t!)</span></li>
</ul>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You don&#8217;t get stuff for free without a good reason. Just fu&#8230; fire this stuff in the bin and get on with your life.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">And let&#8217;s be careful out there.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/">Snail mail delivers USB keys &#8230; WTF?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
