SlideShare una empresa de Scribd logo
1 de 14
Anatomy of a Phishing Email
Spamming for money
2


    phish·ing/ˈfi shiŋ/
                -
    noun:
    The fraudulent practice of
    sending emails purporting to
    be from legitimate companies
    in order to induce individuals
    to reveal personal information




                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
3   An inbox hand grenade
    This is what a phishing email can look like if your email client is
    set to display text only.

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
4   Looks can be deceiving
    And here it is loaded in rich-text or HTML. Odds are your email is set
    up so that a phishing email could look a lot like this. Seems official?

                                    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
5   A closer look
    Notice the To: and Cc: boxes aren’t filled in. And while it claims to be
    from Wells Fargo, the email address appears to be from “activation.”

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
6   Not my number
    See how they’ve tried to make the VISA number look like something
    you’d recognize? Well, on most credit cards it’s the last eight
    numbers that are unique.
                                  © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
7   Obvious no-no
    No bank or legitimate business will ask for personal information in an
    email. It’s a clear sign the message is a scam.

                                   © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
A deeper look
8


       The scammers get sophisticated. The Wells Fargo logo has an
        official SSL certificate, a widely accepted method for ensuring
        a secure connection. That means the bad guys mined the
        Internet for official company graphics to include in the con.




                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Verified, but not
9


       The SSL certificate is
        verified, meaning it
        has been officially
        recognized as Wells
        Fargo.
       But that only applies
        to the logo. So if you
        dissect your messages
        for authenticity, be
        careful. It’s easy to
        be misled.


                                 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
10   The evil code
     Looking at the email code, you can see information wouldn’t be sent to
     Wells Fargo, but to PayPal. It’s designed to automatically pull money from
     your account, through PayPal, presumably to the hackers’ account.
                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
The reroute game
11



           The scammers are also trying to mask their steps
           by pumping your information through a masked
           web address: http://0x185AED0A/T/w.php




                              © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Use your judgment
12




                The best defense against these
                phishing attacks is sound judgment.

                If it doesn’t feel right, it probably isn’t.
                Simply pick up the phone, call your
                bank or business, and ask them to
                work with you over the phone.




                          © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Take action
13




                   If you’ve fallen for a phishing
                   scam, you’re not alone. Call your
                   bank, credit union, insurer, financial
                   planner or attorney to see if they provide
                   identity theft protection.




                               © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Help is out there
14




     Call Identity Theft 911
     at 1-888-682-5911.



                         © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information security
Information securityInformation security
Information security
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 

Destacado

Presentación1
Presentación1Presentación1
Presentación1danash14
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!Makala (D)
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieriajesuannyg
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tangoPaul Yang
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesDeynna Morales
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalanceBBAU LUCKNOW GOVIND
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsAmol Kokare
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSAJodi Okun
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. WaterhouseMakala (D)
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Tatsuo Shigematsu
 

Destacado (16)

Presentación1
Presentación1Presentación1
Presentación1
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!
 
5 aplicatii
5 aplicatii5 aplicatii
5 aplicatii
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieria
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tango
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
 
Facebook Deep face
Facebook Deep faceFacebook Deep face
Facebook Deep face
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalance
 
Sách Luyện Đọc Nhanh
Sách Luyện Đọc NhanhSách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
 
RESPIRATORIO
RESPIRATORIORESPIRATORIO
RESPIRATORIO
 
Ict environment
Ict environmentIct environment
Ict environment
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSA
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
 
Islam
IslamIslam
Islam
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
 

Similar a Anatomy of a Phishing Email

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugarCRM
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInDropbox
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018Deepanshu Gahlaut
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 

Similar a Anatomy of a Phishing Email (16)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Scams
ScamsScams
Scams
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
travel Safely
travel Safelytravel Safely
travel Safely
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Anatomy of a Phishing Email

  • 1. Anatomy of a Phishing Email
  • 2. Spamming for money 2 phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 3. 3 An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 4. 4 Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 5. 5 A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 6. 6 Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 7. 7 Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 8. A deeper look 8  The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 9. Verified, but not 9  The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo.  But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 10. 10 The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 11. The reroute game 11 The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 12. Use your judgment 12 The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 13. Take action 13 If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 14. Help is out there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012