thewayne: (Default)
[personal profile] thewayne
Dear Valued Customer,


During our usual security enhancement protocol, we observed multiple login attempt errors while login in to
your online banking account.

We have believe that someone other than you is trying to access your account for security reasons, we have temporarily suspend your account and your access to online banking and will be restricted if you fail to
update.


* * * * *


I didn't discard the email out of hand. While we don't do any checking/savings/credit card with Chase, Russet's Subaru from the elk crash last year is financed through them, so I had to open it.

Yep, spam.

Love the spacing! Unfortunately you can't see the multiple internal spaces between words, like you can't see that the Dear Valued Customer is not lined up with the rest of the verbiage. I particularly loved the "during our usual security enhancement protocol" and "errors while login in to" and "We have believe". And 'we believe someone is trying to access my account for security reasons'? They're going to improve your security, or my security, or what? The second paragraph is a complete mess.

Of course, the email address of (at)Frontier.com was a complete giveaway. They don't even make a decent attempt at hiding their domains anymore!

I don't think they completed their Financial Spam Email 201 course.

Date: 2020-12-02 12:20 am (UTC)
rain_gryphon: (Default)
From: [personal profile] rain_gryphon
Nobody puts any effort into these anymore. I have to conclude that they're getting satisfactory results at such an incredibly low level of English competence that there's no need to do any better. It's sad.

Date: 2020-12-02 12:30 pm (UTC)
moxie_man: (Default)
From: [personal profile] moxie_man
Why invest in better craftsmanship when the basic American idiot knows all customer service has been outsourced overseas, so the English in "genuine" warning emails won't be any better.

Date: 2020-12-02 06:13 am (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
I mean, the way I understand it, they're really just looking to find someone too naïve and or too distracted to notice what's happening, at least for most spam. It is entertaining to see how bad it can get, though.

Date: 2020-12-02 10:29 am (UTC)
moonhare: (Default)
From: [personal profile] moonhare
‘Tis the Season!

Date: 2020-12-02 05:34 pm (UTC)
draconis: Default icon (Default)
From: [personal profile] draconis
And what's really sad is that crafting hard-to-detect phishing emails is relatively simple.

I did one a few years ago as part of an official exercise for Cyber Security Month at my company. Using nothing but publicly-available information and images, in about an hour I crafted one that even the CyberSec team had to look closely at to spot the flaws.

With such easy techniques, you'd think they'd take that extra little bit of time on the front end, since it should pay out significantly higher results. I'm glad they don't, though.

Date: 2020-12-04 05:27 pm (UTC)
draconis: Default icon (Default)
From: [personal profile] draconis
Thank you -- although it helps when you know what things the IT team looks for, so you can make sure you avoid those. But it's not like it's a super-secret list, or anything.

Yeah, spoofing the return address isn't all that hard if you don't care whether or not you receive any replies from them. And yes, of course that was one of the things I did as part of my exercise. :-)

January 2026

S M T W T F S
    1 23
45678910
11121314151617
18192021222324
25262728293031

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 2nd, 2026 05:05 pm
Powered by Dreamwidth Studios