SlideShare una empresa de Scribd logo
1 de 14
Anatomy of a Phishing Email
Spamming for money
2


    phish·ing/ˈfi shiŋ/
                -
    noun:
    The fraudulent practice of
    sending emails purporting to
    be from legitimate companies
    in order to induce individuals
    to reveal personal information




                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
3   An inbox hand grenade
    This is what a phishing email can look like if your email client is
    set to display text only.

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
4   Looks can be deceiving
    And here it is loaded in rich-text or HTML. Odds are your email is set
    up so that a phishing email could look a lot like this. Seems official?

                                    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
5   A closer look
    Notice the To: and Cc: boxes aren’t filled in. And while it claims to be
    from Wells Fargo, the email address appears to be from “activation.”

                                     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
6   Not my number
    See how they’ve tried to make the VISA number look like something
    you’d recognize? Well, on most credit cards it’s the last eight
    numbers that are unique.
                                  © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
7   Obvious no-no
    No bank or legitimate business will ask for personal information in an
    email. It’s a clear sign the message is a scam.

                                   © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
A deeper look
8


       The scammers get sophisticated. The Wells Fargo logo has an
        official SSL certificate, a widely accepted method for ensuring
        a secure connection. That means the bad guys mined the
        Internet for official company graphics to include in the con.




                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Verified, but not
9


       The SSL certificate is
        verified, meaning it
        has been officially
        recognized as Wells
        Fargo.
       But that only applies
        to the logo. So if you
        dissect your messages
        for authenticity, be
        careful. It’s easy to
        be misled.


                                 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
10   The evil code
     Looking at the email code, you can see information wouldn’t be sent to
     Wells Fargo, but to PayPal. It’s designed to automatically pull money from
     your account, through PayPal, presumably to the hackers’ account.
                                        © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
The reroute game
11



           The scammers are also trying to mask their steps
           by pumping your information through a masked
           web address: http://0x185AED0A/T/w.php




                              © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Use your judgment
12




                The best defense against these
                phishing attacks is sound judgment.

                If it doesn’t feel right, it probably isn’t.
                Simply pick up the phone, call your
                bank or business, and ask them to
                work with you over the phone.




                          © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Take action
13




                   If you’ve fallen for a phishing
                   scam, you’re not alone. Call your
                   bank, credit union, insurer, financial
                   planner or attorney to see if they provide
                   identity theft protection.




                               © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012
Help is out there
14




     Call Identity Theft 911
     at 1-888-682-5911.



                         © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential   July 13, 2012

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information security
Information securityInformation security
Information security
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 

Destacado

Presentación1
Presentación1Presentación1
Presentación1danash14
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!Makala (D)
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieriajesuannyg
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tangoPaul Yang
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesDeynna Morales
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalanceBBAU LUCKNOW GOVIND
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsAmol Kokare
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSAJodi Okun
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. WaterhouseMakala (D)
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Tatsuo Shigematsu
 

Destacado (16)

Presentación1
Presentación1Presentación1
Presentación1
 
Magic Feeling - Merry Christmas!
Magic Feeling -  Merry Christmas!Magic Feeling -  Merry Christmas!
Magic Feeling - Merry Christmas!
 
5 aplicatii
5 aplicatii5 aplicatii
5 aplicatii
 
aplicacion de la reingenieria
aplicacion de la reingenieriaaplicacion de la reingenieria
aplicacion de la reingenieria
 
The lessons of tango
The lessons of tangoThe lessons of tango
The lessons of tango
 
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientalesTrabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
 
Facebook Deep face
Facebook Deep faceFacebook Deep face
Facebook Deep face
 
bioavalability and bioequivalance
bioavalability and bioequivalancebioavalability and bioequivalance
bioavalability and bioequivalance
 
Sách Luyện Đọc Nhanh
Sách Luyện Đọc NhanhSách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
 
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuitsIfp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
 
RESPIRATORIO
RESPIRATORIORESPIRATORIO
RESPIRATORIO
 
Ict environment
Ict environmentIct environment
Ict environment
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSA
 
The Rose Bower - by J. W. Waterhouse
The Rose Bower   -    by J. W. WaterhouseThe Rose Bower   -    by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
 
Islam
IslamIslam
Islam
 
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
 

Similar a Anatomy of a Phishing Email

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugarCRM
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInDropbox
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018Deepanshu Gahlaut
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 

Similar a Anatomy of a Phishing Email (16)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Scams
ScamsScams
Scams
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solutionSugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedInSeven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
travel Safely
travel Safelytravel Safely
travel Safely
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Anatomy of a Phishing Email

  • 1. Anatomy of a Phishing Email
  • 2. Spamming for money 2 phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 3. 3 An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 4. 4 Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 5. 5 A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 6. 6 Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 7. 7 Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 8. A deeper look 8  The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 9. Verified, but not 9  The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo.  But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 10. 10 The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 11. The reroute game 11 The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 12. Use your judgment 12 The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 13. Take action 13 If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
  • 14. Help is out there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012