The Weekly Top 3 – ED #46.2015

The Weekly Top 3 are the three most relevant news stories for the week that are related to phishing scams and activities reported in the media, security blogs and security magazines on the Internet. This week, we look at phishing activities related to Apple, Ocado and a Nigerian scam on their government’s website.

 

Apple ID Targeted In Global Phishing Scam

A new phishing scam targeting Apple users surfaced earlier this week. A report from Comodo Antispam Labs highlighted that the scam attempted to steal Apple IDs, passwords and credit card information. The phishing e-mail contained a notification that informed users that their Apple account was having issues and offered a link to resolve the issue. However, the link in the e-mail directed the user to a fake Apple page and requested the user to confirm their Apple ID, password and credit card details. The phishing e-mail was difficult to detect because it perfectly mimicked a official Apple notification e-mail. Click the link below to read more.

http://www.pymnts.com/in-depth/2015/apple-ids-caught-up-in-global-phishing-email-scam/

 

Phishing E-mails Involving Ocado Used In New Scam

The popular online supermarket, Ocado was being impersonated in a recently devised phishing scam that was targeting their customers. The phishing e-mail appeared to come from the Customer Services division of the company and contained details surrounding a purchase made on their website. The e-mail contained an attachment named ‘receipt.doc’ and encouraged users to open the attachment to view their purchase. However, this attachment contained a malicious VBA macro program that downloaded a Trojan malware, once the document was opened. Click the link below to read more.

http://www.spamfighter.com/News-19934-Phishing-E-mails-Using-Ocados-Name-Spreading.htm

 

Nigerian Government Website Serves Up Phishing Scam

Hackers were able to embed a phishing scam inside the website of the Financial Reporting Council of Nigeria. The phishing scam was embedded by planting the web page in the website’s images directory. The scam involved tricking users into giving their e-mail address, a password and the phone number used for GMail e-mail address recovery. This would allow the hackers to perform further phishing attacks on their victims for the purpose of stealing their GMail login credentials. Another possibility would be an attempt by the hackers to steal the credentials of those persons who use the same password for multiple sites. Click the link below to read more.

http://www.theregister.co.uk/2015/11/06/nigerian_government_site_popped_used_for_phishing_scam/

Leave a comment

Your email address will not be published. Required fields are marked *