![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. It involves the receiving of an email message with a link to a website where the victim would enter personal information. In this particular scam, you get an email from "Personal Banking: personalbanking@wellsfargo.com" stating that there may have been some unauthorized access to your account and that you should click the link and enter your account and verify some information. When you click the link you are taken to a site which looks identical to the Wells Fargo site. If you look at the HTML code of the site, you'll notice that they are almost identical. One thing about this scam which was somewhat surprising is that the message made it past my G-mail spam filter. This is slightly different to scams I have seen before in that they don't ask you to reply to this email with your account number like most others, and they don't ask for passwords or anything like that. They simply request that you log in, as you normally do, which would not raise the eyebrow of normal users. On a closer inspection of the site you will notice that the forms submit the data entered (user name and password) to some foreign script and not to Well Fargo. Most probably, the scammer is having all the usernames and passwords emailed to him. After submission of your information the site responds that your password is incorrect. Here an unsuspecting victim would assume that this was because of the supposed unauthorized access mentioned in the email. If you try to submit information a few more times, it takes you to another Wells Fargo look-alike page called "Online Banking Verification". Here they ask for SSN number, your ATM card number, the expiration date, the pin number and the CVV2# (4 digit verification). With the ATM information the scammer could max out your debit card. With all the rest of the information he has gathered it would not be at all difficult to call up Wells Fargo and basically take over your account. He could change billing addresses, get checks for you account, and simply wipe it out. How to spot scams like this Scams like these are usually easy to spot, but this one in particular was a bit tricky, however there are some basic methods you can use to spot these types of scams. First of all, check the link. Although it looks like the link is going to Wells Fargo's website, if you let the mouse hover over the link for a while and look in the status bar, you will get the real address of the link. In this case the scammer used just an IP address of his domain or machine. This, however, can be overridden on the internet (if the scammer changes the status bar) and sometimes even in your email, depending on what your security settings are. Check the address bar. In this case, the address bar reported that the website was also from the scammer's IP address. Simply put, it did not say www.wellsfargo.com. Very seldom would a scammer be able to fake this. They may, however, employ other tricks like buying a domain name with a slight spelling difference that the user might not notice or by simply loading the link in a new window and hiding the address bar altogether. Lastly, the only full proof method to avoid becoming a victim to a scam like this is to simply call in and verify the information over the phone. Please note; do not use a phone number in the email if one is given. Open up your phone book and locate the number for your firm and ask them about it. Just remember, if it looks funny and feels funny, it's probably a scam. Do not ever reply to such email messages for personal information as sensitive as account information and SSN. Below is a copy of the email message for your review and amusement. The link is active, however DO NOT ENTER ANY PERSONAL INFORMATION INTO THESE FORMS. THIS IS NOT WELLSFARO'S SITE. Kevin. A. Lloyd. From: Personal Banking < personalbanking@wellsfargo.com > Dear Member, 1. Login to your Wells Fargo Internet Banking account. In case you are not enrolled for Internet Banking, you will have to use your Social Security Number as both your Personal ID and Password and fill in all the required information, including your name and account number. 2. Review your recent account history for any unauthorized withdrawls or deposits, and check your account profile to make sure not changes have been made. If any unauthorized activity has taken p! la ce on your account, report this to Wells Fargo staff immediately. To get started, please click on the link below: https://online.wellsfargo.com/signon?LOB=CONS We apologize for any inconvenience this may cause, and appreciate your assistance in helping us maintain the integrity of the entire Wells Fargo system. Thank you for your prompt attention to this matter. Sincerly, Kevin A. Lloyd: Just launched a website, http://www.DeleteMySpam.com/, dedicated to helping to eliminate the spam crisis.
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Get to know new security leaders at OSU-CHS Oklahoma State University Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Inside the Fiasco at the National Security Council The Atlantic Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips ATA Transportation Security Council Recognizes Fleets American Trucking Associations Mobile Applications: A Cesspool of Security Issues Dark Reading Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine King County Security Tips – “Google” yourself kcemployees.com Fiesta goers can expect increased security at main events Texas Public Radio Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Rome Health to install new security systems Rome Sentinel Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Pete Hegseth’s bad calls: Unfit defense secretary is a major security risk New York Daily News Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Temple University stepping up security after several students assaulted near campus last week CBS News Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Windows "inetpub" security fix can be abused to block future updates BleepingComputer Verkada launches executive protection offering Security Systems News New Syrian foreign minister attends UN Security Council in first US appearance since Assad's fall AJC.com Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer Increased Security at City Courthouses? Unanswered Questions Baltimore Witness The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration Hegseth’s Personal Phone Use Created Vulnerabilities The New York Times |
![]() |
![]() |
![]() |
RELATED ARTICLES
What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Web and Computer Security Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. ![]() |
home | site map |
© 2006 |