Post by akabborakabbor on Feb 13, 2024 3:04:54 GMT -6
First of all, users will receive emails with content that appeals to readers' psychology such as: “Your account is about to be locked” “Many of your messages cannot be sent yet” Notification emails from the Admin address require login/account authentication to continue using the service. “Sign in to free up account space that is almost full” Etc This content will take you to Email login links of reputable sites to increase reliability. In the example below, the hacker has staged an Email with the content "Your Office365 password has expired." An example email sent from a fake Email When the user clicks on the icon containing the hidden link. The victim will be taken to a login page with an email address already filled in. And they will ask you to enter your password. Please pay attention to the website link when providing information When the user is gullible and enters the password, the hacker has successfully obtained your email information.
Proceed to use information from fake email scams Once there is information about the email provided by the user on the fake link, hackers will start using that email for profiteering activities. Although the forms are different, they still aim at the ultimate goal: currency. Request a currency transfer When a user's account information is stolen but has not yet realized it. Hackers will monitor how users use Email. From Ghana Telemarketing Data transaction information with partners and customers. For currency transaction emails, they will proceed with automatic forwarding configuration. From there, track user email activity over a certain period of time. Please check your Email forwarding configuration when you suspect your Email account has been stolen Until they have the necessary information, hackers will now begin to act. First, hackers will fake money transaction emails between users and partners. With bank account information that has been changed.
Hackers will send this fake email with a domain name that is the same or has a few characters wrong. Or even any account, but still displays the name of the person who regularly transacts so that users cannot recognize it. When not carefully checking, users may mistakenly transfer money to these fake information. So the hacker's scam was successful. Taking advantage of sending spam in large quantities Additionally, after obtaining the password, hackers can use the email account to send spam. It could be Bulk Mails or spreading Viruses to other email users. Leading to the user's email domain name being blacklisted by international anti-spam organizations. Not to mention directly affecting the Email server IP address of the Email service provider. In addition, it also causes users to lose credibility with customers.
Proceed to use information from fake email scams Once there is information about the email provided by the user on the fake link, hackers will start using that email for profiteering activities. Although the forms are different, they still aim at the ultimate goal: currency. Request a currency transfer When a user's account information is stolen but has not yet realized it. Hackers will monitor how users use Email. From Ghana Telemarketing Data transaction information with partners and customers. For currency transaction emails, they will proceed with automatic forwarding configuration. From there, track user email activity over a certain period of time. Please check your Email forwarding configuration when you suspect your Email account has been stolen Until they have the necessary information, hackers will now begin to act. First, hackers will fake money transaction emails between users and partners. With bank account information that has been changed.
Hackers will send this fake email with a domain name that is the same or has a few characters wrong. Or even any account, but still displays the name of the person who regularly transacts so that users cannot recognize it. When not carefully checking, users may mistakenly transfer money to these fake information. So the hacker's scam was successful. Taking advantage of sending spam in large quantities Additionally, after obtaining the password, hackers can use the email account to send spam. It could be Bulk Mails or spreading Viruses to other email users. Leading to the user's email domain name being blacklisted by international anti-spam organizations. Not to mention directly affecting the Email server IP address of the Email service provider. In addition, it also causes users to lose credibility with customers.