OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     21.02.20 09:10l 82 Lines 3585 Bytes #999 (0) @ WW
BID : 2157HB1PMS
Read: GAST
Subj: WHO Warns of Phishing Scams Related to Coronavirus
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200219/2005Z 8458@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

WHO Warns of Phishing Scams Related to Coronavirus Alert
February 18, 2020 | Identity Theft, Fraud, Scams 
art, background, blue, business, coronavirus, damage, design, disease, 
element, emblem, fabric, flag, flat, global, graphic, health, icon, 
illustration, modern, organization, outbreak, render, sick, sign, symbol, 
virus, who, wind
The phishing messages ask the targets to share sensitive info like usernames 
and passwords.
Any email address other than ‘person@who.int’ format is not from the WHO.
The World Health Organization (WHO) has released a warning about 
Coronavirus-themed phishing attacks that impersonate the organization with 
the goal of delivering malware and stealing information.

What happened?

The WHO has confirmed that phishing emails, camouflaged to appear as sent by 
WHO officials regarding Coronavirus alert, were being distributed by the 
cybercriminals.

The phishing messages ask the targets to share sensitive info like usernames 
and passwords.
It also redirected users to a phishing landing page via malicious links 
embedded in the emails.
In some cases, it requested victims to open malicious attachments.
"WHO is aware of suspicious email messages attempting to take advantage of 
the 2019 novel coronavirus emergency," the agency said in the Coronavirus 
scam alert.

How does the phishing campaign work?

In the email, users are generally asked to go through the attached document 
regarding safety or preventive measures for Coronavirus.

Users are then directed to download the attachment on their system simply by 
clicking on a "Safety Measures" button.
Once clicked, it redirects them to a compromised site (a phishing page) 
controlled by the attackers.
The page loads the WHO website in a frame in the background with a pop-up 
asking the users to verify their e-mail.
Clicking on the "Verify" button exfiltrates their credentials to the 
attackers’ server. At the same time, the user will see that they are being 
redirected to the WHO's official website.
Recommendations

"If you are contacted by a person or organization that appears to be from 
WHO, verify their authenticity before responding," read the WHO advisory.

Any email address other than ‘person@who.int’ format is not from the WHO.
Make sure the link starts with ‘https://www.who.int’
Stay alert, giving in username & password to access public information is 
unusual.
Cybercriminals use emergencies such as 2019-nCov to get people to make 
decisions quickly, but do not panic.
Change your credentials if you somehow surrendered your current credentials.
Lastly, the WHO provided helpful links for contacting or reporting a scam to 
WHO to help anyone in need.

73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed woensdag 19 februari 2020  21:02 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU





Lese vorherige Mail | Lese naechste Mail


 23.11.2024 13:04:38lZurueck Nach oben