#1
|
|||
|
|||
Yet another paypal scam
Dear me@mydomain.com
In response for your PayPal account security we have to report that your password may be is compromised. Your account is marked for too many successful logins last week (January, 17-24, 2005). It is more interesting that the hostnames are from different countries: United States (c-67-160-224-80.client.comcast.net) Canada (HSE-Toronto-ppp304429.sympatico.ca) Russia (32.122-140-213.telenet.ru) Sweden (c213-100-93-27.swipnet.se) Your account is limited for security reasons. Follow the link to make sure you are on a secure PayPal page and login with currently password. Please reauthorize your account information on or before January 31, 2005. https://www.paypal.com/cgi-bin/webscr?cmd=login-run Thank you for using PayPal! The PayPal Team Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your PayPal account and choose the "Help" link in the header of any page. PayPal Email ID PP23897 ---------------------------- And here's where the link actually sends you... <A HREF="http://neo-ump.com/SecureSSL-PayPal/main.html?JbQqzzFgGCFTgAgAAeJbQqzzFgGCFTgAgAAeHlz9 FnXeMWZllWXADAAMuMCwCFBQlz9FnXeMWZllWXS3AlBX+VShqA hQRfhgTDrferHCURst/pAisNRFgmQ=https://www.paypal.com/us/cgi-bin/webscr?cmd=_login_error&amp;login_access=10974 01855/&amp;AAJbaQqzeHAAeMWZlHhlWXS2AlBX+VShqAhQRfhgT DrferHCURst/pAisNRFgD">https://www.paypal.com/cgi-bin/websc...-run</A> I think the page may have even been shut down already, but just in case its still up AND you guys are stupider than I think.... Freakin |
#2
|
|||
|
|||
Re: Yet another paypal scam
Forward it to spoof@paypal.com
|
#3
|
|||
|
|||
Re: Yet another paypal scam
I have gotten similar emails and I don't have a paypal account. I have also gotten them allegedly from credit card companies that I don't have credit cards with. Usually the web sites that they link to get taken down pretty quickly. If you know some javascript and html, it's fun to flood them with responses. If you use IE, you can put a target attribute in the form tag, so that the response goes to another window, then put a javascript loop that keeps submitting the form. I did this once, filled the form in with obscenities and threats, giving no real information except my email address. I have gotten only one or two phishing emails since, which leads me to believe that it's a pretty small group of people that are doing this.
|
|
|