If you find our resources valuable, please support us by making a small donation. Thank you!

x

Credit Cards

SCAM: A mouse-over of any link in these emails reveals that they do not point to the website they claim to represent. [View the lower left corner of each graphic.] These types of emails typically point to fake websites that are designed to look like a bank or credit card website. These are called phishing sites. Victims give away their login credentials for their real accounts when the try to log into these fake sites. Some phishing websites are so clever that when the victim logs into the phishing site, the fake site will use the information and forward them to the real site AND log them into the account. The victims therefore have no idea they have been phished. Some of the emails offer attached files to click on or download. Most of these contain malware and are very dangerous.

WHAT TO LOOK FOR: Besides looking at the link revealed in the lower left corner of most of these scams by a mouse-over, notice that nearly all of these emails lack any personal information that identifies the recipient. None of the credit card emails, for example, identify the last 4 digits of the recipient's credit card.

CAUTION: We do not advise visiting the links revealed in these scam emails because it is possible that some of these websites might cause a computer infection.

A “dead” give-away that an email is a scam is when you see that all links in the email point to the exact same address. It doesn’t matter whether you mouse-over “click here” “view our privacy statement” or “contact customer service.”

A mouse-over of all links in this email point to “traditionalrecords.com.” A WHOIS look-up of traditionalrecords.com shows it to be registered in Toronto, Canada but not currently in use.

A mouse-over of the links in this email reveal that they point to “biorytm.com.pl.” “.pl” is the 2-letter country code for Poland. MalwareURL.com lists this website as a known security risk and a source of malware.

A mouse-over of any of the active links in this email reveal that they point to “eisai.co.in.” “.in” is the 2-letter country code for India.

The email address was spoofed to look like it came from “discover@email.discover.com.” However, the scammers forgot to disguise their link and recipients can see that it points to “cxy106.internetdsl.tpnet.pl.” “.pl” is the 2-letter country code for Poland. They have created a document on their server called “discowercard.com.html” to try to trick the recipient.

The “click here” link in this email points to a WordPress blog at “pingmango.tv” Pinkmango.tv appears to be a site for gay men in Bangkok, Thailand and was likely hacked  by the  scammers and used to hide the scammer’s phishing web pages.

This email is being spoofed to look as though it comes from AmericanExpress@email.americanexpress.com. However, a mouse-over of the “Click Here” link reveals that it points to IP address 218.28.65.49. A reverse IP look-up shows that this IP (Internet Protocol) address is for a computer in China.

A surefire way to manipulate someone into clicking a link they should not is to tell them that they’ve been charged money!

s2Member®