<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spam Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/spam/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/spam/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Wed, 30 Aug 2017 10:15:17 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Spam Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/spam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Disaster Relief Charity Scam &#8211; watch out!</title>
		<link>https://www.l2cybersecurity.com/disaster-relief-charity-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 10:15:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=888</guid>

					<description><![CDATA[<p>Disasters happen many times a year and huge disasters impacting the US that get massive coverage in the international media happen less frequently (Katrina 2005, Sandy 2012 and now Harvey 2017). What has also happened at all of these disasters is a vile crime. The Disaster Relief Charity Scam. At times of crisis, such as&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/disaster-relief-charity-scam/">Disaster Relief Charity Scam &#8211; watch out!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft size-full wp-image-891" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1.png" alt="Disaster Relief Charity Scam" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" />Disasters happen many times a year and huge disasters impacting the US that get massive coverage in the international media happen less frequently (<a href="https://en.wikipedia.org/wiki/Hurricane_Katrina">Katrina</a> 2005, <a href="https://en.wikipedia.org/wiki/Hurricane_Sandy">Sandy</a> 2012 and now <a href="https://en.wikipedia.org/wiki/Hurricane_Harvey">Harvey</a> 2017). What has also happened at all of these disasters is a vile crime. The Disaster Relief Charity Scam.</p>
<p><span id="more-888"></span></p>
<p>At times of crisis, such as right now in <a href="http://www.independent.co.uk/news/world/asia/india-floods-bangladesh-nepal-deaths-millions-homeless-latest-news-updates-a7919006.html">Bangladesh and Nepal</a>, where some 1,200 people have died and millions have lost their homes, charity organisations call out for financial and material support to help them in their disaster relief efforts. These organisations have a lot of experience (unfortunately) in helping the less fortunate following these disasters and their collection of money and material is (usually) efficient and effective.</p>
<p>What also happens are well meaning people who want to help with fund raising for a disaster, they set up a page on a fundraising website or on social media and ask for donations, which they intend to go to the victims. This is very laudable, but how can you be certain of these people&#8217;s bona fides.</p>
<p>This has also given the bad guys a way of making easy money, by similarly setting up bogus fund raising pages and pocketing all the cash that comes their way. You can be absolutely certain that none of the monies go where they are most needed.</p>
<p>So treat any e-mail or Facebook message from a &#8220;charity&#8221; with the same contempt that you reserve for any unsolicited message (according to <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>) and simply delete/ignore it.</p>
<p>If you want to give funds towards a specific disaster, the proper charities usually have a way of enabling you to specify where you want the donation to go. So go directly to their websites and donate there. Don&#8217;t click links from social media, text messages or e-mail.</p>
<p>So look up the big guys such as <a href="https://www.redcross.ie/">The Red Cross</a>, <a href="https://www.unicef.org/">UNICEF</a> and <a href="https://www.oxfam.org/">Oxfam</a>, donate to them and don&#8217;t fall for the Disaster Relief Charity Scam.</p>
<p>If you want to give to a lesser known/unknown charity then you can check them out with the likes of the <a href="http://www.charitiesregulatoryauthority.ie/">Irish Charities Regulator</a>, <a href="http://give.org/">Wise Giving Alliance</a>, <a href="https://www.charitynavigator.org/">Charity Navigator</a> or <a href="https://www.charitywatch.org/home">Charity Watch</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/disaster-relief-charity-scam/">Disaster Relief Charity Scam &#8211; watch out!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GMail had a bad case of the phishers.</title>
		<link>https://www.l2cybersecurity.com/gmail-users-phished/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 08 May 2017 22:46:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=639</guid>

					<description><![CDATA[<p>About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-thumbnail wp-image-640 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg" alt="GMail base case of the spammers" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow through with it, all of your e-mail contacts will receive the same phishing e-mail, but coming from you.</p>
<p><span id="more-639"></span>Fortunately there was nothing destructive in this phishing campaign, but it did cause quite a lot of consternation because it could have been very nasty. It was quite clever in how it fooled it&#8217;s victims.</p>
<p>What the evil doers did was to create an app called &#8220;Google Docs&#8221; &#8230; not to be confused with the official one from Google called &#8230; errrrr &#8230; &#8220;Google Docs&#8221; ?.</p>
<p>They then sent out their phishing e-mail, which looked like this:</p>
<p><img decoding="async" class="wp-image-644 size-full aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg" alt="" width="700" height="208" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg 700w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1-300x89.jpg 300w" sizes="(max-width: 700px) 100vw, 700px" /></p>
<p>In later occurrences of the phishing campaign, the blurred out name in the image above, was probably somebody you know or at least you were on their contact list. If you click on the &#8220;Open in Docs&#8221; button above, you launch the app called &#8220;Google Docs&#8221;, which sounds like the right kind of thing to happen &#8211; right? Then you get the following pop-up, which looks fairly legitimate, because it is:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-643 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg" alt="" width="300" height="340" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2-265x300.jpg 265w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>The reason it&#8217;s legitimate is because this is the standard screen from Google in regards to this &#8220;new&#8221; app that you want to execute. The app developers (the bad guys) had to specify what permissions their app needed to carry out it&#8217;s nefarious deeds on your e-mail, and so Google helpfully popped up this window to ask you to give permission to the app for the parts of your GMail profile that it needed. Don&#8217;t freak out, there could be genuine reasons an app needs these particular permissions, so this would not have been a red-flag to Google &#8230; the app name on the other hand &#8230; ?.</p>
<p>Anyway, if you click &#8220;allow&#8221;, the app goes ahead and uses your contacts to e-mail a new copy of the phishing e-mail to all your contacts.</p>
<p>Fortunately Google resolved the issue reasonably quickly. If you think you might have been a victim of this attack, you can check very quickly by going to this link <a href="https://myaccount.google.com/permissions">https://myaccount.google.com/permissions</a> and if there is something in the list called &#8220;Google Docs&#8221;, then left-click on it and hit the &#8220;Remove&#8221; button. You&#8217;ll then be safe again, for now.</p>
<p>This was really clever because the evil doers were able to create a sneaky app, with a ridiculously trusty name, which then fooled people into granting seemingly required permissions in the platform (Google in this instance) to enable the app to do something bad. There are other platforms that use a similar set-up &#8211; Facebook and LinkedIn, so be on the lookout for any messages which try to execute apparently genuine &#8220;apps&#8221; that may try to give you a very bad day. Treat all messages that want you to do something that is out-of-the-ordinary with great suspicion. Or you could go all biblical on them and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>BTW &#8211; Google didn&#8217;t reveal the number of affected users, they just said less than 0.1% of the GMail accounts were affected &#8211; a tiny fraction, right? Well given they had over a billion users this time last year, means the not insubstantial figure of 1 million is how many were affected. ?</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>There is a lot of variations in scam e-mail the last couple of days.</title>
		<link>https://www.l2cybersecurity.com/variations-of-scam-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 16:29:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=576</guid>

					<description><![CDATA[<p>I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ? In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people. I&#8217;ll run through three sneaky methods&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s1600/emailscam.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s320/emailscam.jpg" width="320" height="240" border="0" /></span></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I&#8217;ll run through three sneaky methods that have been attempted on others over the last 48 hours.</span><span id="more-576"></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(1) Non-Delivery Receipt.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You know these e-mails. You get them when you send an e-mail, but you make a mistake and send it to an address which doesn&#8217;t exist or the mailbox has a size limit and your e-mail breaches that limit. This is the text of the Non-Delivery Receipt (NDR) in this instance:</span></p>
<blockquote class="tr_bq">
<pre data-blogger-escaped-style="background: rgb(238, 238, 238); border: 1px solid rgb(204, 204, 204); color: #222222; padding: 5px 10px;"><span style="font-family: 'courier new', courier, monospace; font-size: small;" data-blogger-escaped-style="font-family: &quot;courier new&quot; , &quot;courier&quot; , monospace; font-size: x-small;">Your message was not delivered due to the following reason(s):

Your message could not be delivered because the destination server was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.

Most likely there is a network problem that prevented delivery, but
it is also possible that the computer is turned off, or does not
have a mail system running right now.</span></pre>
</blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a ZIP file attached to the NDR, which of course has some nasty software that does not have your best interest at heart. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(2) A Microsoft Sharepoint Notification.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is a particularly sneaky one, as lots of larger organisations depend on Sharepoint&#8217;s sharing abilities.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The e-mail looks something like this:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s1600/sharepoint-spam.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s400/sharepoint-spam.png" width="400" height="295" border="0" /></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The Link in the body text would take you to a not particularly nice website. No doubt it might attempt to infect your computer. </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(3) Somewhat abusive attempt to get you to open the attachment.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Please be warned, there is a profanity ahead. I wanted to leave it in as it does generate something of a visceral reaction when you read it.</span></p>
<blockquote class="tr_bq"><p><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Subject: credit card charge from &lt;<i>your company&#8217;s domain name</i>&gt; </span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">What is this fucking charge on my card?</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I never visited or bought anything from &lt;</span></span><i data-blogger-escaped-style="color: blue; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;">your company&#8217;s domain name</i><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">&gt;.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached a screenshot of my statement.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I want my money back!!!</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached my card statement, please get back to me ASAP.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Thank you</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">company name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">person name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">phone</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">fax</span></span></p></blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a Word document attached to the e-mail, which of course has &#8230; nasty ransomware, which will scramble all of your files and leave you with a very bad day ahead. </span>?<span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><b></b></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>Conclusion</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I hope you noticed that I was pretty consistent in my recommended action &#8230; this is because it is from <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment #5</a> in our <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments of Cyber Security</a>.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you wish to train your staff on how they can spot these type of e-mails, then have a read of <a href="http://www.l2cybersecurity.com/security-awareness-training/">this course outline</a> and contact us on the number or e-mail address at the end of that. We&#8217;ll be happy to discuss your training requirements and provide a quotation to cover same.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And lets be careful out there.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">H/T to the SANS Institute&#8217;s Internet Storm Centre @ <a href="https://isc.sans.edu/">https://isc.sans.edu/</a></span></p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A slew of fake LinkedIn connection requests.</title>
		<link>https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 04 Jun 2016 11:46:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=520</guid>

					<description><![CDATA[<p>For somebody who normally receives a LinkedIn connection request about once a week, yesterday I suddenly received 6! Wow, am I popular or what??? Well in this case I am popular &#8230; for the scammers. Each one was a fake profile. Firstly none of them had a connection in common with any of my contacts.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/">A slew of fake LinkedIn connection requests.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">For somebody who normally receives a <a href="https://www.linkedin.com/in/lynchliam">LinkedIn</a> connection request about once a week, yesterday I suddenly received 6! Wow, am I popular or what???</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">Well in this case I am popular &#8230; for the scammers. Each one was a fake profile.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Firstly none of them had a connection in common with any of my contacts. This always makes me question why are they trying to connect with me.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I then Googled the names and companies.</span></p>
</div>
<p><span id="more-520"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The first was &#8220;Adline matter&#8221;, apparently a doctor from the photo. Google reckoned I wanted Adelaide Matter. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The next was &#8220;James Freeman, of Sailer Benefit&#8221;. Google reckoned this was a Texan who had been executed for murder earlier this year. Deeper searching on the Sailer Benefit side showed no connection with a James Freeman. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The third was a &#8220;William Parker, of Barclays&#8221;. Lots of hits here, all indicating it was a scammer. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The next one was a real person! It was &#8220;Ayesha Gadaffi, of AYG Group&#8221;, the daughter of a certain Libyan Dictator. When the company name was included in the Google search, this highlighted it as a scam account. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The fifth was again a real person. Goes by the name &#8220;Asare Akuffo, of Bank Atlantec&#8221;. It shows that he is a banker, but there was no association with Bank Atlantec. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Finally, &#8220;Hesham Abdulla Al Qassim, Vice Chariman of the Board&#8221; is also a real person, but his Real LinkedIn (which was the first search result) shows him as CEO. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So folks, you should be wary of any connection request for people you do not know. It&#8217;s the same rule we should apply to receiving e-mails from strangers. Don&#8217;t accept connection requests from strangers, even if they have a common connection. If you are tempted, just spend a few extra seconds and Google them and their company or position and see what shows up.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Lets be careful out there.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/">A slew of fake LinkedIn connection requests.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
