Dec. 1st, 2020

thewayne: (Default)
Dear Valued Customer,


During our usual security enhancement protocol, we observed multiple login attempt errors while login in to
your online banking account.

We have believe that someone other than you is trying to access your account for security reasons, we have temporarily suspend your account and your access to online banking and will be restricted if you fail to
update.


* * * * *


I didn't discard the email out of hand. While we don't do any checking/savings/credit card with Chase, Russet's Subaru from the elk crash last year is financed through them, so I had to open it.

Yep, spam.

Love the spacing! Unfortunately you can't see the multiple internal spaces between words, like you can't see that the Dear Valued Customer is not lined up with the rest of the verbiage. I particularly loved the "during our usual security enhancement protocol" and "errors while login in to" and "We have believe". And 'we believe someone is trying to access my account for security reasons'? They're going to improve your security, or my security, or what? The second paragraph is a complete mess.

Of course, the email address of (at)Frontier.com was a complete giveaway. They don't even make a decent attempt at hiding their domains anymore!

I don't think they completed their Financial Spam Email 201 course.
thewayne: (Default)
This particular piece of pond scum had an interesting approach: pay him a bit coin or your web site would get hit with a distributed denial of service. He also ran a side job of phoning in bomb threats to over 2,200 schools in the U.S. and U.K. if you needed to get out of a test or just wanted to prank your school. And he got a kick out of taunting computer journalist Brian Krebs on Twitter.

Nice guy, eh?

Krebs helped to take down an associate, but they had trouble getting info on this guy, known as HDGZ or HDGZero. Then in January of last year, hackers broke into a gaming company's server and stole a user database and dumped it online, selling user credentials. Eventually the whole database leaked publicly, and in it was a user and email account for HDGZero which was ultimately traced to one Timothy Dalton Vaughn of Winston-Salem, NC.

He plead guilty to federal charges, one count each of "conspiracy to convey threats to injure, convey false information concerning use of explosive device, and intentionally damage a computer; one count of computer hacking; and one count of possession of child pornography." While sentences will be served concurrently, he'll still be 30 when he gets out and with a Federal criminal conviction, including for sex crimes.

Dalton's online aliases included “WantedbyFeds” and “Hacker_R_US”. I think he's going to have to change those when he gets out, and when he gets his using online connected devices privileges restored.

https://krebsonsecurity.com/2020/12/bomb-threat-ddos-purveyor-gets-eight-years/

August 2025

S M T W T F S
     12
34 56789
10111213 141516
17181920212223
24252627282930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 16th, 2025 12:45 pm
Powered by Dreamwidth Studios