Author | Thread |
|
03/24/2014 09:01:59 AM · #1 |
seriously?!? i simply marvel at the level of ignorance that keeps this stuff alive...
Originally posted by PhisherKing: Dear [email address removed]
We have been sent a sample of your blood analysis for further research.
During the complete blood count (CBC) we have revealed that white blood cells is very low, and unfortunately we have a suspicion of a cancer.
Wite Blood cells 1200 Low
Hemoglobin 12 Normal
Platelets 19000 Low
We suggest you to print out your CBC test results and interpretations in attachment below and visit your family doctor as soon as possible
Sincerely,
Dr. Avery Ernie
National Institute for Health and Care Excellence |
and the [email address removed] was actually in the email!
i'm really concerned about my wite count; well, almost as much as my wite balance.
if anybody is interested in the zip file that was attached, pm me and i'll send it along to you ;-) |
|
|
03/24/2014 09:10:03 AM · #2 |
Originally posted by Skip:
if anybody is interested in the zip file that was attached, pm me and i'll send it along to you ;-) |
What? You didn't open it? |
|
|
03/24/2014 09:12:44 AM · #3 |
Originally posted by LN13: Originally posted by Skip:
if anybody is interested in the zip file that was attached, pm me and i'll send it along to you ;-) |
What? You didn't open it? |
saving it for either dessert, or someone more deserving :D |
|
|
03/24/2014 09:39:29 AM · #4 |
skip you been playin in your spam bucket again? go wash yer hands! |
|
|
03/24/2014 11:30:32 AM · #5 |
i opened my zip file and am now a billionaire |
|
|
03/24/2014 11:48:35 AM · #6 |
Originally posted by Tiny: i opened my zip file and am now a billionaire |
yeah, but a billionaire with CANCER. What fun is that?
Message edited by author 2014-03-24 14:08:03. |
|
|
03/24/2014 01:15:36 PM · #7 |
Who really falls for this crap anyway...I guess someone that cant spell huh
|
|
|
03/24/2014 02:06:59 PM · #8 |
What some people will sink to. Even sadder is how many people will not know that "wite" is not spelled like that :) |
|
|
03/24/2014 02:10:16 PM · #9 |
They actually mistyped it. It's not wite count -- it's wife count. Count your wives and see if you have any issues. |
|
|
03/24/2014 02:14:15 PM · #10 |
Originally posted by vawendy: They actually mistyped it. It's not wite count -- it's wife count. Count your wives and see if you have any issues. |
And make sure you have enough cells for all of them ... ;-)
Message edited by author 2014-03-24 14:15:09. |
|
|
03/24/2014 02:43:23 PM · #11 |
I'm doing a conference talk on data breaches in a couple of weeks, and one of the stats I found was that the odds of a phishing attack being successful approach 100% after 20 attempts.
In other words, people will click on any damn thing.
For this particular email, however, they might need to send 30 or 40. |
|
|
03/24/2014 02:54:25 PM · #12 |
We have found at work that our users read (and reply to) the phishing mails more than they read our emails warning them not to. |
|
|
03/24/2014 03:09:29 PM · #13 |
Originally posted by LN13: We have found at work that our users read (and reply to) the phishing mails more than they read our emails warning them not to. |
When I was in IT way back when, we sent out fake phishing emails designed to scare the sh*t out of those idiots that opened the attachments...
* DELETING C:\*.*...
* SECURITY BREACH! Notifying CEO...
stuff like that. ...man, I miss the power I used to wield in IT. |
|
|
03/24/2014 10:04:31 PM · #14 |
Originally posted by Ann: I'm doing a conference talk on data breaches in a couple of weeks, and one of the stats I found was that the odds of a phishing attack being successful approach 100% after 20 attempts... |
OMG, Ann. that is just... depressing. I thought by now people had gotten at least a *little* more skeptical... guess not! |
|
|
03/24/2014 10:47:36 PM · #15 |
Originally posted by kirbic: Originally posted by Ann: I'm doing a conference talk on data breaches in a couple of weeks, and one of the stats I found was that the odds of a phishing attack being successful approach 100% after 20 attempts... |
OMG, Ann. that is just... depressing. I thought by now people had gotten at least a *little* more skeptical... guess not! |
I was listening to a computer security podcast a couple of years ago, where the host was interviewing one of the principals of a security consulting group. An attacker sent phishing emails to 16 people within the company, all of whom were security professionals. 4 of them clicked the link. Being security professionals, they realized what they did immediately, but it still took them 4 days to contain the problem. I'm sure the attack was a bit better conceived than this one, but still... |
|
|
03/24/2014 11:06:14 PM · #16 |
Originally posted by kirbic: Originally posted by Ann: I'm doing a conference talk on data breaches in a couple of weeks, and one of the stats I found was that the odds of a phishing attack being successful approach 100% after 20 attempts... |
OMG, Ann. that is just... depressing. I thought by now people had gotten at least a *little* more skeptical... guess not! |
Send the e-mail and then put me on the phone. It'll approach 100% after 2 tries. Yes, people are indeed that 'dumb' - just gotta give them a compelling reason to 'help' and no obvious reason to suspect that anything is up. Really it's just human behavior - we're curious, and we generally want to help people, so unless we really suspect something is up, we usually are willing to go a bit out of our way to help. And of course, once you've fallen for it, the damage can be pretty impressive.
Message edited by author 2014-03-24 23:21:22. |
|
|
03/24/2014 11:15:50 PM · #17 |
Originally posted by Ann: Originally posted by kirbic: Originally posted by Ann: I'm doing a conference talk on data breaches in a couple of weeks, and one of the stats I found was that the odds of a phishing attack being successful approach 100% after 20 attempts... |
OMG, Ann. that is just... depressing. I thought by now people had gotten at least a *little* more skeptical... guess not! |
I was listening to a computer security podcast a couple of years ago, where the host was interviewing one of the principals of a security consulting group. An attacker sent phishing emails to 16 people within the company, all of whom were security professionals. 4 of them clicked the link. Being security professionals, they realized what they did immediately, but it still took them 4 days to contain the problem. I'm sure the attack was a bit better conceived than this one, but still... |
Ok, yeah, that's egregious.. I expect it from the regular users, but security folks? SMH. |
|
|
03/24/2014 11:25:26 PM · #18 |
I used to get phone calls "from Microsoft" all the time.
They want me to go to my computer and download a program to solve a Microsoft problem.
I tell them to go away.
But they don't.
:( |
|
|
03/25/2014 12:25:47 AM · #19 |
I got this just this morning.... I don't even have a Commonwealth Bank account, but there is no way in hell I would've clicked on anything like this anyway.... yikes! To think of what could happen..... :/
Dear Customer,
We have detected there is a pending payment in your CommonWealth NetBank account due to some
limitations in your account We need your help to remove this limitation.
You are required to follow the link below to resolve the limitations on your CommonWealth NetBank account.
Click the link below, to remove limitation on your account:
Remove Limitation (click here)
Once we have received your information we will review it.
If the review is successful, the limitation will be removed from CommonWealth NetBank account
Copyright ©2014 CommonWealth Bank. All rights reserved
|
|
|
03/25/2014 01:15:25 PM · #20 |
Oh that sounds authentic....these scams get tiresome huh
|
|
|
03/25/2014 01:23:25 PM · #21 |
This is just one part, I got a call from so called "IRS" and the person over the phone start saying we have received a lawsuit against you and you or your attorney has to come and attend, first I said, let me put this conversation on recording for security reasons then I said send me a mail, he said he did three times and I said where did you send, he gave some address that was 15 years back where I used to live and finally he said...oh you dont live that address anymore, I will close the case and you dont have to worry :)
I did lookup of the phone number and it was a magic jack number :) |
|
|
03/25/2014 01:38:31 PM · #22 |
My dentist office sent me a link this morning where the link sounded legit, but there was some text on the page that was in Norwegian. I'm fairly confident in my security, so I clicked it, cuz I'm crazy like that. Sure enough...
"This web page at thinkgreenwhenyouclean.org has been reported as an attack page and has been blocked based on your security preferences."
I emailed them and let them know. *shakes fist at dentist staff*
|
|
|
03/25/2014 01:44:07 PM · #23 |
That might have been someone else spoofing or highjacking the dentist's email account. |
|
|
03/25/2014 02:16:54 PM · #24 |
Originally posted by GeneralE: That might have been someone else spoofing or highjacking the dentist's email account. |
There was a long list of other people in the recipient list, including my husband directly after mine. Our email addresses are nothing alike. If they're spoofing, I think they also have a list of patients. Highjacking was my assumption. I really don't think the dentist staff would actually send me somewhere that was unsafe.
...actually, wait a second. This is from their old email address. Gotta send another email... sheesh.
Message edited by author 2014-03-25 14:26:40. |
|
|
03/25/2014 03:41:04 PM · #25 |
All it takes is one eee-jit in an organization to get their 'pooter compromised, and their entire contact list can get sucked into the netherworld. I had, until recently, been getting an outlandish amount of SPAM and a few phishing messages addressed to a number of people in our organization. I'm *sure* the list of folks was obtained from someone's compromised system. Our IT folks are so capable that I finally had to install a client-side bayesian filter to block the dreck.
|
|
Home -
Challenges -
Community -
League -
Photos -
Cameras -
Lenses -
Learn -
Help -
Terms of Use -
Privacy -
Top ^
DPChallenge, and website content and design, Copyright © 2001-2025 Challenging Technologies, LLC.
All digital photo copyrights belong to the photographers and may not be used without permission.
Current Server Time: 08/09/2025 09:40:53 AM EDT.