![]() |
|
|
#12 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
140648 Posts |
Quote:
And that embedded JS doing its dirty deeds in the background ... yuck.
Last fiddled with by retina on 2020-03-20 at 22:49 |
|
|
|
|
|
|
#13 | |
|
∂2ω=0
Sep 2002
República de California
1163910 Posts |
Quote:
Anyhoo, my e-mail provider's and own spam filters catch the vast majority of these upstream - one reaches my Inbox perhaps once per week on average. Here's the ones I've had to explicitly mark "junk" so far this year: |
|
|
|
|
|
|
#14 |
|
"Kieren"
Jul 2011
In My Own Galaxy!
2·3·1,693 Posts |
I get several a day. Lots of "Make her swoon with enhanced manliness," hair restoration, secret youth formulas, secret arthritis cures, alleged dating services with really short URLs, and so on.
I guess my online profile is as a Grade A, #1 sucker. |
|
|
|
|
|
#15 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
140648 Posts |
Quote:
http://legit.looking.domain.com/fluffy_bunnies.html_random_characters_blahblahblahFKJAIJIFJwejiEDJjkefjEJIEFjO@hackers.evil.domain.cc/virus.cgi And when you use your mouse over trick the software chops it short "for your convenience" to show this: http://legit.looking.domain.com/fluffy_bunnies.html_random_characters_blahblahbla... And you never see the @ in there or the real URL that is hidden behind the @ Last fiddled with by retina on 2020-03-21 at 06:41 |
|
|
|
|
|
|
#16 | |
|
"Ed Hall"
Dec 2009
Adirondack Mtns
381710 Posts |
Quote:
|
|
|
|
|
|
|
#17 | |
|
Feb 2017
Nowhere
4,643 Posts |
Quote:
If you can set your Email program to show you just the From: and Subject: fields before you decide what to do (skip, download, delete) you can sometimes prevent bad Emails from even reaching your machine. If the From: and Subject: say your account is suspended, I would go ahead and delete, then call or go to the account in question on line through normal channels just to check. Some Email programs don't have a blanket setting that lets you do this, but do have a setting that gives you these options if the Email is bigger than a certain size. Make that size as small as possible (hopefully 1K), and you have a fairly effective screen. |
|
|
|
|
|
|
#18 | ||
|
∂2ω=0
Sep 2002
República de California
103·113 Posts |
Quote:
Quote:
Oh, p.s. to retina's "your hovertext 'helpfully' shortens URLs like so" note above - so I just tried this with a legitimate e-mail of the kind the phishers like to mimic, this one an Order Update for my Comcast Xfinity cable service. That has a clickable link with a suspiciously long URL in it, the parsing of which however points to it as being legit - attachment below. I don't see any 'helpful' shortening of the URL in the hovertext, do you? |
||
|
|
|
|
|
#19 |
|
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
10,753 Posts |
|
|
|
|
|
|
#20 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
22·1,549 Posts |
Quote:
But your screenshot shows another technique. Using a legitimate address to redirect to a hacker address. The "ClickedUrl" page is just a redirect page with the target shown later. So this can be used to make the base URL a genuine legit one, and then direct to any other target. There is also at least another way. Using the Unicode extension for URLs to get to what looks like a legit site, but is really a clone site using Cyrillic characters with similar glyphs instead. So it could be google.com but the 'e' is a Cyrillic 'e', and it is actually a different address. Maybe google registered those spoof addresses, I don't know, but many companies haven't done that. |
|
|
|
|
|
|
#21 |
|
"Ed Hall"
Dec 2009
Adirondack Mtns
EE916 Posts |
My hovers are definitely cut off with my system, hence my copy/paste examination, which I didn't pay attention this time. . .
|
|
|
|
|
|
#22 |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
22×1,549 Posts |
I tried this example. Try emailing it to yourself and see what behaviour you get.
https://account_google_com%canonical...unt.google.com It seems that / and . can't be used for the username or password fields so it needs to be a bit more creative. But I think the above could easily fool many people. Palemoon will check the destination server to see if it will accept the authentication and I get a warning that the URL might be trying to trick me. But I only used example.com, it would be easy for someone to set up a server that accepts the auth and the browser shows no warning. You could also combine all of the techniques mentioned above to make an URL using redirection via a legit site, with an obscuring authentication prefix, and a spoofed target domain, with a faked "from" field to make it really hard to know where it is really going. That is why the standard advice is to NEVER CLICK ON LINKS IN AN EMAIL. |
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Water security | Nick | Soap Box | 78 | 2021-06-12 16:55 |
| Local network addresses | JHansen | Lounge | 2 | 2007-11-28 12:00 |
| Key fob security. | Xyzzy | Science & Technology | 13 | 2007-03-09 02:39 |
| Don't post other people's full email addresses | Unregistered | Forum Feedback | 2 | 2004-10-05 14:02 |
| Free throw away instant email addresses ( receive only ) | dsouza123 | Lounge | 3 | 2003-08-25 20:36 |