<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>scam - SAJE</title>
	<atom:link href="https://saje.nz/tag/scam/feed/" rel="self" type="application/rss+xml" />
	<link>https://saje.nz</link>
	<description>Web Gardners</description>
	<lastBuildDate>Wed, 15 May 2013 02:35:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://saje.nz/wp-content/uploads/2023/05/cropped-logov1-32x32.png</url>
	<title>scam - SAJE</title>
	<link>https://saje.nz</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Trustwave Vulnerability Scan Scam</title>
		<link>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/</link>
					<comments>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 15 May 2013 02:35:26 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2013/05/15/trustwave-vulnerability-scan-scam/</guid>

					<description><![CDATA[<p>This one is potentially a better attempt at a phishing scam than most. Supposedly from TrustWave, it tells of a failed vulnerability scan on my network and to view the results online. Visiting this site potentially loads Malware, or tries phishing techniques to get access to your systems. One interesting aspect of this is it [&#8230;]</p>
<p>The post <a href="https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/">Trustwave Vulnerability Scan Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This one is potentially a better attempt at a phishing scam than most.</p>
<p>Supposedly from TrustWave, it tells of a failed vulnerability scan on my network and to view the results online.</p>
<p>Visiting this site potentially loads Malware, or tries phishing techniques to get access to your systems.</p>
<p>One interesting aspect of this is it predicts IP ranges that will attempt to access your network, which makes me lean toward a malware attack.</p>
<blockquote><p>This is an automated email message to prevent you that the scheduled TrustKeeper vulnerability scan of YOUR NETWORK SYSTEMS has completed and is not compliant.</p>
<p>IMPORTANT: During the scan, TrustKeeper Discovered several Unsecure systems. Trustwave strongly recommends you review these findings as your overall PCI DSS compliance status may be affected.</p>
<p>TrustKeeper generated a vulnerability scan report. You may view these results by accessing TrustKeeper at:</p>
<p>https://login.trustwave.com<br />
User Name:webmaster@deepweb.co.nz</p>
<p>You will receive an e-mail confirmation when the scan completes and your results are available. Please note that this can take up to three days.</p>
<p>Note: If you monitor your network for activity, note that the TrustKeeper scan may originate from IP addresses in these ranges:</p>
<p>200.16.208.0/24<br />
61.37.230.0/24</p>
<p>TrustKeeper is a certified remote assessment and compliance solution created by Trustwave and designed to help merchants meet the PCI DSS and achieve compliance with the associated programs of VisaŽ, MasterCardŽ, American ExpressŽ, DiscoverŽ, and other credit card associations. The TrustKeeper solution is an integrated easy-to-use tool that removes the challenge of navigating the complex PCI DSS requirements and provides a \&#8221;one stop shop\&#8221; for merchants to certify compliance.</p>
<p>DO NOT REPLY TO THIS MESSAGE VIA EMAIL.</p>
<p>This mail is sent by an automated message system and the reply will not be received. Thank you for using TrustKeeper.<br />
This email was sent to: webmaster@deepweb.co.nz<br />
This email was sent by: Trustwave<br />
80 West Madison Street, Suite 1080, Chicago, IL, 60408, USA</p>
<p>We respect your right to privacy &#8211; view our policy</p></blockquote>
<p>So a new attack method, using fear to cause people to click the link and open themselves up for the real attack.</p><p>The post <a href="https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/">Trustwave Vulnerability Scan Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Scam &#8211; Better Business Bureau</title>
		<link>https://saje.nz/2011/12/21/new-scam-better-business-bureau/</link>
					<comments>https://saje.nz/2011/12/21/new-scam-better-business-bureau/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 20 Dec 2011 21:53:33 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[better business bureau]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/12/21/new-scam-better-business-bureau/</guid>

					<description><![CDATA[<p>The Better Business Bureau have been targeted as the latest providers of a \&#8221;trusted source\&#8221; for email phishing attempts. Not that the BBB are actually doing something wrong, but have been targeted by the spammers as a face for their campaign due to their trustworthiness, and in this case, the concern that happens when you [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/12/21/new-scam-better-business-bureau/">New Scam – Better Business Bureau</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Better Business Bureau have been targeted as the latest providers of a \&#8221;trusted source\&#8221; for email phishing attempts. Not that the BBB are actually doing something wrong, but have been targeted by the spammers as a face for their campaign due to their trustworthiness, and in this case, the concern that happens when you get an email from them saying something is wrong.</p>
<p>With this latest email (I received 2 today, even though I am not in the US) they use the threat of a complaint against your company to get you to click on a link in the email.</p>
<p>Here is a copy of the email</p>
<blockquote><p>RE: Case # 18558568<br />
2011/12/20</p>
<p>Hello,</p>
<p>The Better Business Bureau has been filed the above-referenced complaint from one of your clients on the subject of their dealings with you.<br />
The detailed information about the consumer\&#8217;s concern is presented in enclosed document.<br />
Please give attention to this matter and let us know about your opinion.<br />
We encourage you to open the <strong>ATTACHED REPORT</strong> to reply this complaint.</p>
<p>We look forward to your prompt response.</p>
<p>Sincerely yours,</p>
<p>Louis Gerald</p>
<p>Dispute Counselor<br />
Better Business Bureau</p></blockquote>
<p>So again, it is a case of being careful when something like this appears in your mailbox. Don\&#8217;t panic and click the link to see what the issue is, if in doubt hover over the link and it will tell you in the status bar of your email program the real link that it will take you to.</p>
<p>If it looks in any way suspicious, leave it alone.</p><p>The post <a href="https://saje.nz/2011/12/21/new-scam-better-business-bureau/">New Scam – Better Business Bureau</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/12/21/new-scam-better-business-bureau/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ANZ Bank Phishing Target Again</title>
		<link>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/</link>
					<comments>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 05 Dec 2011 04:06:13 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[NZ Industry News]]></category>
		<category><![CDATA[anz]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/12/05/anz-bank-phishing-target-again/</guid>

					<description><![CDATA[<p>These phishing attempts are usually found by my virus scanner, but this one got through. Anz Bank We\&#8217;d like to inform you that your Secure Messages Center has 1 new message. Please login to your Online Banking and visit the Secure Message Center section in order to read the message. Log On to Online Banking. [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/12/05/anz-bank-phishing-target-again/">ANZ Bank Phishing Target Again</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>These phishing attempts are usually found by my virus scanner, but this one got through.</p>
<blockquote><p>Anz Bank</p>
<p>We\&#8217;d like to inform you that your Secure Messages Center has <strong>1 new message</strong>.</p>
<p>Please login to your Online Banking and visit the Secure Message Center section in order to<br />
read the message.</p>
<p><strong>Log On</strong> to Online Banking.</p>
<p>(The Message Center contains only important information about your account and online banking.)</p>
<p>Copyright Australia and New Zealand Banking Group Limited ABN 11 005 357 522, 1996-2011.<br />
ANZ\&#8217;s colour blue is a trade mark of ANZ.</p></blockquote>
<p>&nbsp;</p>
<p>The log on link goes to http:// nogueirametalurgica . com . br/www . anz . com/index . php</p>
<p>This is a typical ploy where they hide the link to a hacked website. Here they have placed a site that looks the same as the target (This time ANZ) and hope that you do not look at the link that appears in the URL section of your browser.</p>
<p>Whenever you get a dodgy email, you can often just hover over the link in the email, and the email program will show you the link that you will be taken to.</p>
<p>If it is anything like this, then stay away</p><p>The post <a href="https://saje.nz/2011/12/05/anz-bank-phishing-target-again/">ANZ Bank Phishing Target Again</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Chinese Domain Name Scam Update</title>
		<link>https://saje.nz/2011/10/19/chinese-domain-name-scam-update/</link>
					<comments>https://saje.nz/2011/10/19/chinese-domain-name-scam-update/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 19 Oct 2011 08:15:05 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[chinese]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[name]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/10/19/chinese-domain-name-scam-update/</guid>

					<description><![CDATA[<p>I have had a number of enquiries from clients, checking to see if these emails are legitimate or not. However, I have just received one directly and have noticed that although the scam is the same, the wording and formatting are a bit better, more convincing. Here is the transcript: Dear Manager, (If you are [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/10/19/chinese-domain-name-scam-update/">Chinese Domain Name Scam Update</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><img class=\"alignright size-thumbnail wp-image-632\" title=\"domain-name-scams\" src=\"http://deepweb.co.nz/wp-content/uploads/2011/10/domain-name-scams-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" />I have had a number of enquiries from clients, checking to see if these emails are legitimate or not.</p>
<p>However, I have just received one directly and have noticed that although the scam is the same, the wording and formatting are a bit better, more convincing.</p>
<p>Here is the transcript:</p>
<blockquote><p><span style=\"color: darkblue; font-family: Arial; font-size: x-small;\"><span style=\"color: darkblue; font-family: Arial; font-size: x-small;\">Dear Manager,</span></span></p>
<p><span style=\"color: darkblue; font-family: Arial; font-size: x-small;\">(If you are not the person who is in charge of this, please forward this to your CEO,Thanks)</span></p>
<p><span style=\"color: darkblue; font-family: Arial; font-size: x-small;\">This email is from China domain name registration center, which mainly deal with the domain name registration and dispute internationally in China and Asia.<br />
On October 17th 2011, We received Tianhua Ltd\&#8217;s application that they are registering the name \&#8221; yourdomain \&#8221; as their Internet Keyword and \&#8221; yourdomain .cn \&#8221;?\&#8221; yourdomain .com.cn \&#8221; ?\&#8221;yourdomain .asia \&#8221;domain names etc.., they are China and ASIA domain names. But after auditing we found the brand name been used by your company. As the domain name registrar in China, it is our duty to notice you, so we are sending you this email to check. According to the principle in China, your company is the owner of the trademark, In our auditing time we can keep the domain names safe for you firstly, but our audit period is limited, if you object the third party application these domain names and need to protect the brand in china and Asia by yourself, please let the responsible officer contact us as soon as possible. Thank you!</span></p>
<p><span style=\"color: darkblue; font-family: Arial; font-size: x-small;\">Best Regards,</span></p>
<p><span style=\"color: blue;\"><span style=\"font-family: Arial; font-size: x-small;\"><span style=\"color: black;\"><strong>John<br />
</strong></span><span style=\"color: #000000;\">General Manager<br />
Shanghai Office (Head Office)<br />
3002, Nanhai Building, No. 854 Nandan Road,<br />
Xuhui District, Shanghai 200070, China<br />
Tel: +86 216191 8696<br />
Mobile: +86 136615 29704<br />
Fax: +86 216191 8697<br />
Web: </span><span style=\"font-family: Arial; font-size: x-small;\"><a href=\"http://www.ygnetworkltd.com/\"><span style=\"color: #000000;\">www.ygnetworkltd.com</span></a></span></span></span></p></blockquote>
<p>So you can see that the construction of the email is much more professional, but still is  not quite perfect.</p>
<p>Again the point of these emails is to scare people into thinking that their domain name is going to be registered by a Chinese company. All they are wanting is to get you to register the domain name through them (often at an inflated price)</p>
<p>Don\&#8217;t worry, I have not seen one of these be real yet.</p><p>The post <a href="https://saje.nz/2011/10/19/chinese-domain-name-scam-update/">Chinese Domain Name Scam Update</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/10/19/chinese-domain-name-scam-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Business Listing Scam &#8211; EU Business Register</title>
		<link>https://saje.nz/2011/03/26/business-listing-scam-eu-business-register/</link>
					<comments>https://saje.nz/2011/03/26/business-listing-scam-eu-business-register/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Mar 2011 03:50:14 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[business directory]]></category>
		<category><![CDATA[eu]]></category>
		<category><![CDATA[hidden charges]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/03/26/business-listing-scam-eu-business-register/</guid>

					<description><![CDATA[<p>Beware of a directory listing scam that is being emailed out to people offering a business listing with Free Updates! What is hidden though is that by signing and sending back the form, you lock yourself in for a three year listing at EU995 per year. But they do let you update your details for [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/03/26/business-listing-scam-eu-business-register/">Business Listing Scam – EU Business Register</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Beware of a directory listing scam that is being emailed out to people offering a business listing with Free Updates!</p>
<p>What is hidden though is that by signing and sending back the form, you lock yourself in for a three year listing at EU995 per year.</p>
<p>But they do let you update your details for free.</p>
<p>Transcript is here:</p>
<blockquote>
<div>From: contact@business-listing.info</div>
<div>Subject: EU Business Register 2011/2012</div>
<div></div>
<div>Dear Madam/Sir,</div>
<p>In order to have your company inserted in the EU Business Register for  2011/2012, please print, complete and submit the enclosed form to the  following address:</p>
<p>EU BUSINESS REGISTER<br />
BOX 252 &#8211; 28020 Madrid<br />
SPAIN</p>
<p>Fax: +34 91 791 9167</p>
<p>Updating is free of charge!</p></blockquote>
<p>&nbsp;</p>
<p>These kind of scams are pretty common, I get ones faxed to me a few times a year. Similar ones for overpriced domain names are common as well.</p>
<p>You know your business and will know the kinds of places that are worthwhile advertising. If anything comes across your desk or into your inbox that offers advertising, check it thoroughly before committing, this one had the price in the fine print in the attached PDF, not in the email itself. IT\&#8217;s terms and conditions were even further hidden on a website not linked to in the PDF.</p><p>The post <a href="https://saje.nz/2011/03/26/business-listing-scam-eu-business-register/">Business Listing Scam – EU Business Register</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/03/26/business-listing-scam-eu-business-register/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Xerox Scan Email Virus</title>
		<link>https://saje.nz/2010/07/17/xerox-scan-email-virus/</link>
					<comments>https://saje.nz/2010/07/17/xerox-scan-email-virus/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 17 Jul 2010 01:52:56 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[xerox]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2010/07/17/xerox-scan-email-virus/</guid>

					<description><![CDATA[<p>The tricks these guys try&#8230; So I get an email, apparently a scan of an image from a Xerox copier sent to my inbox. I am going to open the zip file that is attached? Um No! This is what I see wrong with this one&#8230; Images don\&#8217;t need to be zipped, it doesn\&#8217;t compress [&#8230;]</p>
<p>The post <a href="https://saje.nz/2010/07/17/xerox-scan-email-virus/">Xerox Scan Email Virus</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The tricks these guys try&#8230;</p>
<p>So I get an email, apparently a scan of an image from a Xerox copier sent to my inbox.</p>
<p>I am going to open the zip file that is attached? Um No!</p>
<p>This is what I see wrong with this one&#8230;</p>
<ol>
<li>Images don\&#8217;t need to be zipped, it doesn\&#8217;t compress them enough</li>
<li>It was sent from someone I don\&#8217;t know at admantech@nederland.8bit.be</li>
<li>It\&#8217;s incredibly vague.</li>
</ol>
<p>Obviously targeting large organisations that have these centralised scanning machines that deliver documents in this way, but for the other masses, a real scatter gun approach.</p>
<p>Heres the text:</p>
<blockquote><p>Subject : Scan from a Xerox WorkCentre Pro N 2918425</p>
<p>Please open the attached document.  It was scanned and sent to you using a Xerox<br />
<br />WorkCentre Pro.</p>
<p>
Sent by: Guest<br />
<br />Number of Images: 1<br />
<br />Attachment File Type: ZIP [DOC]
</p>
<p>
WorkCentre Pro Location: machine location not set<br />
<br />Device Name: XRX9679AA7ACDB40111008
</p>
</p>
<p>
For more information on Xerox products and solutions, please visit<br />
<br />http://www.xerox.com
</p>
</blockquote>
<p></p><p>The post <a href="https://saje.nz/2010/07/17/xerox-scan-email-virus/">Xerox Scan Email Virus</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2010/07/17/xerox-scan-email-virus/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Phishers / Virus Makers have Hooked Amazon now</title>
		<link>https://saje.nz/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/</link>
					<comments>https://saje.nz/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 23 Feb 2010 01:58:21 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/</guid>

					<description><![CDATA[<p>Phishing is all about getting people hooked, line a sinker, this time Amazon is the recipient of the Phishers focus. It seems to be the usual DHL / UPS style scam, where a zip archive is attached to an email that carries the nasty payload. Asking you to print the attached postal label to get [&#8230;]</p>
<p>The post <a href="https://saje.nz/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/">The Phishers / Virus Makers have Hooked Amazon now</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Phishing is all about getting people hooked, line a sinker, this time Amazon is the recipient of the Phishers focus.</p>
<p>It seems to be the usual DHL / UPS style scam, where a zip archive is attached to an email that carries the nasty payload.</p>
<p>Asking you to print the attached postal label to get your package.</p>
<p>As usual, delete these emails as they are nothing but a cover for a dangerous virus or scam.</p>
<p>Here is the transcript of the email</p>
<blockquote><p>Goodafternoon!</p>
<p>Thank you for shopping at Amazon.com<br />
We have successfully received your payment.</p>
<p>Your order has been shipped to your billing address.</p>
<p>You have ordered \&#8221; Asus Eee PC T91Go \&#8221;</p>
<p>You can find your tracking number in attached to the e-mail  document.</p>
<p>Print the postal label to get your package.</p>
<p>We hope you enjoy your order!<br />
Amazon.com<br />
Attachment is called Postal_label_Nr234.zip</p></blockquote>
<p>It is interesting to see these people targeting suppliers / vendors that have wide audiences. Removing any refernce to DHL or UPS as this is starting to get a little old.</p>
<p>I wonder how long it will take for the Anti virus brigade to recognise this new variant.</p><p>The post <a href="https://saje.nz/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/">The Phishers / Virus Makers have Hooked Amazon now</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2010/02/23/the-phishers-virus-makers-have-hooked-amazon-now/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Email Scam targetting mail users at specific domain</title>
		<link>https://saje.nz/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/</link>
					<comments>https://saje.nz/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 19 Feb 2010 01:13:36 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[phihing]]></category>
		<category><![CDATA[profile locked]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/</guid>

					<description><![CDATA[<p>Well they keep rolling off the spam/scam production line. This one pretends to be an email from mail support of a specific domain. As with all of these mass email scams, they don\&#8217;t realise that the person they sent the email to manages all of the mail for that domain (Including the \&#8221;support\&#8221; that is [&#8230;]</p>
<p>The post <a href="https://saje.nz/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/">Email Scam targetting mail users at specific domain</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Well they keep rolling off the spam/scam production line.</p>
<p>This one pretends to be an email from mail support of a specific domain. As with all of these mass email scams, they don\&#8217;t realise that the person they sent the email to manages all of the mail for that domain (Including the \&#8221;support\&#8221; that is mentioned in the email)</p>
<p>This is a phishing scam hoping to gain logins and passwords to try to gain access to mail (or if you are sharing login details) or other online services.</p>
<p>Here is a transcript</p>
<blockquote><p>Subject: Your profile will be locked in response to a complaint received by the Administration<br />from: support-62@deepweb.co.nz</p>
<pre wrap=\"\">***This message was created automatically by mail-delivery software. Do not reply to this message.*** 

Hello!
Your profile will be locked in response to a complaint received by the Administration 29.01.2010 ?.
According to \"paragraph 8 of the user agreement, deepweb.co.nz reserves the right to suspend or terminate the provision of services deepweb.co.nz, promptly notifying the user. 

Refute the statement may be, following this link:
&lt;a class=\"moz-txt-link-freetext\" href=\"http://schwaber.net/472e3bb6\"&gt;http://schwaber.net/472e3bb6&lt;/a&gt;


If the application is not rejected within 7 days, your e-mail an account will be blocked.
It has a number 237242679231777. 

In the near future we will contact you.
It takes up to 3 days to process your request.
Thank you!
--------------------------------
Sincerely,
mail support service
deepweb.co.nz </pre>
</blockquote>
<p>As you can see they are using shortened style urls to hide things, but it is unsophisticated as they use a completely unrelated domain as the link.</p>
<p>Most likely this will be handled by the antispam handlers, but shows these scams are still out there and are unlikely to go away.</p>
<p>Other variants of this try to dupe gmail users into giving their logins to the phishers</p>
<div class=\"zemanta-pixie\"><img class=\"zemanta-pixie-img\" alt=\"\" src=\"http://img.zemanta.com/pixy.gif?x-id=1cae78f7-7a17-8871-b1f5-3911cb541cef\" /></div><p>The post <a href="https://saje.nz/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/">Email Scam targetting mail users at specific domain</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2010/02/19/email-scam-targetting-mail-users-at-specific-domain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DHL, UPS Virus Email, What Next NZPost?</title>
		<link>https://saje.nz/2010/02/05/dhl-ups-virus-email-what-next-nzpost/</link>
					<comments>https://saje.nz/2010/02/05/dhl-ups-virus-email-what-next-nzpost/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 05 Feb 2010 06:45:30 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[dhl]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[ups]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2010/02/05/dhl-ups-virus-email-what-next-nzpost/</guid>

					<description><![CDATA[<p>Many times there are things that show the US Centricness (Is that a word?) of the internet: .com readily meaning US site US date formats in online forms USD as the default currency Well another example is the idea that every country must use UPS and DHL for their parcels. Why else would all of [&#8230;]</p>
<p>The post <a href="https://saje.nz/2010/02/05/dhl-ups-virus-email-what-next-nzpost/">DHL, UPS Virus Email, What Next NZPost?</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Many times there are things that show the US Centricness (Is that a word?) of the internet:</p>
<ul>
<li>.com readily meaning US site</li>
<li>US date formats in online forms</li>
<li>USD as the default currency</li>
</ul>
<p>Well another example is the idea that every country must use UPS and DHL for their parcels.</p>
<p>Why else would all of the post / courier etc virus emails sent all around the world have these two as the only options to use.</p>
<p>The phishers seem to have a better idea&#8230;use a local provider to have a better chance of success. (Even these guys get it wrong: Note to Spammers &#8211; I dont have any Commonwealth Bank of Australia accounts)</p>
<p>What is wrong with NZPost? I suspect that in any case like this, an email from a local bank / services company / postal service etc would be more troublesome to the local population.</p>
<p>So, look out for suspicious emails from local suppliers, and as should be usual practice, here are a few standard tips to protect you from email nasties:</p>
<ul>
<li>Any email asking for any form of login / password should be treated suspiciously</li>
<li>Any email warning of a security breach should be treated suspiciously</li>
<li>Don\&#8217;t click on any links in emails that you are unsure of, instead go to the website manually</li>
<li>Don\&#8217;t open any attachment that is unexpected, this especially includes zip files</li>
<li>Keep your virus software up to date and make sure email scanning is turned on!</li>
</ul>
<p>Let me know of any other tips or other virus laden emails you have had to send to your trash bin.</p><p>The post <a href="https://saje.nz/2010/02/05/dhl-ups-virus-email-what-next-nzpost/">DHL, UPS Virus Email, What Next NZPost?</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2010/02/05/dhl-ups-virus-email-what-next-nzpost/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Igrin Email Scam</title>
		<link>https://saje.nz/2009/12/05/igrin-email-scam/</link>
					<comments>https://saje.nz/2009/12/05/igrin-email-scam/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 05 Dec 2009 08:05:21 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[igrin]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2009/12/05/igrin-email-scam/</guid>

					<description><![CDATA[<p>Local NZ ISP Igrin is the latest to be targetted for a phishing scam. This one is quite crude as even the links look nothing like Igrin links This message is from the webmail IT service, you are to provide to us the below information to re-validate your account due to spam. What was the [&#8230;]</p>
<p>The post <a href="https://saje.nz/2009/12/05/igrin-email-scam/">Igrin Email Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Local NZ ISP Igrin is the latest to be targetted for a phishing scam.</p>
<p>This one is quite crude as even the links look nothing like Igrin links</p>
<blockquote><p>This message is from the webmail IT service, you are to provide to us the below information to re-validate your account due to spam.</p>
<p>What was the problem?</p>
<p>On November 27th, our servers were subjected to a malicious attack, which affected certain components of the operating system on some of our servers. Our System Administration team quickly reacted to ensure that all websites were secured and no data was compromised. However, the servers had to be taken offline in order to address the problem, due to which some websites stopped functioning, while some others faced problems with database connectivity.</p>
<p>&#8230;</p>
<p>In order to continue using our services you are require updating<br />
and re-confirmation of your email account details as requested.<br />
To validate your account, you are require to update your account information using the secure url provided below</p>
<p>http://www.pacnet-servers.co.cc/igrin/login [dot] php [dot] htm</p>
<p>Failure to do this will immediately render your account deactivated<br />
from our database and service will not be interrupted as important<br />
messages may as well be lost due to your declining to re-confirmed<br />
to us your account details.</p>
<p>We apologize for the inconvenience this may cause you during<br />
this period, but trusting that we are here to serve you better and<br />
providing more technology which revolves around Secured Email.</p>
<p>It is also pertinent, you understand that our primary concern is security for our customers, and for the security of their files and data.<br />
CONFIRMATION COaDE: /93-1A388-480</p>
<p>IT Support Team</p></blockquote>
<p>Don\&#8217;t fall for this one. Igrin has a generic \&#8221;We don\&#8217;t ask for your login and password\&#8221; message on it\&#8217;s home page, I wonder if they have sent anythign out? I wonder what their policy on protecting their clients is?</p>
<p>If there is anyone from Igrin out there, can you let us know?</p><p>The post <a href="https://saje.nz/2009/12/05/igrin-email-scam/">Igrin Email Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2009/12/05/igrin-email-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
