OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     08.02.20 19:32l 71 Lines 3088 Bytes #999 (0) @ WW
BID : 1678HB1PMS
Read: GAST
Subj: Don’t Fall For The PayPal SMS Scam That Steals You
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200208/0940Z 7731@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

Don’t Fall For The PayPal SMS Scam That Steals Your Personal Details
February 7, 2020 | Identity Theft, Fraud, Scams 
app,background,bank,banking,brand,buy,commerce,commercial,company,consumer,c
onsumerism,cyber,digital,e-banking,e-
business,ecommerce,editorial,finance,funds,icon,illustrative,international,i
nternet,logo,logotype,marketing,media,money,multimedia,online,pay 
pal,payment,paypal,photo,photography,purchase,retail,selling,service,shop,si
gn,symbol,technology,web
Scammers were found to have registered two websites that look similar to the 
original PayPal website.
The targeted users are sent a message that contains links to one of these 
websites.
Crooks are tricking users into sharing their personal details and login 
credentials in a new PayPal SMS scam.

How does it happen?

As reported by Naked Security, scammers have registered two websites that 
look similar to the original PayPal website. The targeted users are sent a 
message that contains links to one of these websites. These messages are 
designed in such a way that it creates a sense of urgency among the 
recipients.

The messages read as ‘Due to a recent failed payment request your account 
has been restricted’ or ‘We have detected unusual activity on your account’.

The message further prompts the recipient to fill in their personal details 
in order to prevent their accounts from being locked.

What next?

Once the unsuspecting user clicks on the website, they are presented with a 
bogus PayPal site that prompts them to provide their username and password. 
After the login credential is entered, the victim is shown another phishing 
page that asks for more personal details such as full name, date of birth, 
address, and phone number.

As part of the verification process, the victim is also asked to share their 
payment card details.

What to do to stay safe?

Don’t rely on links sent you over the message because they can be used to 
phish your personal details. Always type the address on the address bar to 
visit the website.
Hover over the links sent through a message or an email to know the origin 
of the URL. Crooks usually disguise the links in order to deceive users.

73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed zaterdag 08 februari 2020  10:35 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU



Lese vorherige Mail | Lese naechste Mail


 05.05.2024 20:11:40lZurueck Nach oben