|
HB1PMS > TECH 08.02.20 18:32l 71 Lines 3088 Bytes #999 (0) @ WW
BID : 1678HB1PMS
Read: GAST
Subj: Don’t Fall For The PayPal SMS Scam That Steals You
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200208/0940Z 7731@HB1BBS.ZL.NLD.EU BPQ6.0.19
Van: HB1PMS@HB1BBS.ZL.NLD.EU
Don’t Fall For The PayPal SMS Scam That Steals Your Personal Details
February 7, 2020 | Identity Theft, Fraud, Scams
app,background,bank,banking,brand,buy,commerce,commercial,company,consumer,c
onsumerism,cyber,digital,e-banking,e-
business,ecommerce,editorial,finance,funds,icon,illustrative,international,i
nternet,logo,logotype,marketing,media,money,multimedia,online,pay
pal,payment,paypal,photo,photography,purchase,retail,selling,service,shop,si
gn,symbol,technology,web
Scammers were found to have registered two websites that look similar to the
original PayPal website.
The targeted users are sent a message that contains links to one of these
websites.
Crooks are tricking users into sharing their personal details and login
credentials in a new PayPal SMS scam.
How does it happen?
As reported by Naked Security, scammers have registered two websites that
look similar to the original PayPal website. The targeted users are sent a
message that contains links to one of these websites. These messages are
designed in such a way that it creates a sense of urgency among the
recipients.
The messages read as ‘Due to a recent failed payment request your account
has been restricted’ or ‘We have detected unusual activity on your account’.
The message further prompts the recipient to fill in their personal details
in order to prevent their accounts from being locked.
What next?
Once the unsuspecting user clicks on the website, they are presented with a
bogus PayPal site that prompts them to provide their username and password.
After the login credential is entered, the victim is shown another phishing
page that asks for more personal details such as full name, date of birth,
address, and phone number.
As part of the verification process, the victim is also asked to share their
payment card details.
What to do to stay safe?
Don’t rely on links sent you over the message because they can be used to
phish your personal details. Always type the address on the address bar to
visit the website.
Hover over the links sent through a message or an email to know the origin
of the URL. Crooks usually disguise the links in order to deceive users.
73 Henk.
======================================================================
_ _ ____ __ ____ ____ _____
| | | | _ \/_ | _ \| _ \ / ____| SYS: Henk (hb1nos@hb1bbs.com)
| |__| | |_) || | |_) | |_) | (___ QTH: Ouwerkerk - JO11XO
| __ | _ < | | _ <| _ < \___ \ BBS: HB1BBS.ZLD.NLD.EU
| | | | |_) || | |_) | |_) |____) | QRV: 27.235 MHz (FM 1200bps)
|_| |_|____/ |_|____/|____/|_____/ WEB: www.hb1bbs.com
======================================================================
** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93
======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed zaterdag 08 februari 2020 10:35 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU
Lese vorherige Mail | Lese naechste Mail
| |