{"id":444,"date":"2007-06-25T19:26:00","date_gmt":"2007-06-26T01:26:00","guid":{"rendered":"http:\/\/royblumenthal.com\/wordpress\/?p=444"},"modified":"2007-06-25T19:26:00","modified_gmt":"2007-06-26T01:26:00","slug":"419-phishing-the-scams-that-hurt-the-internet-how-they-work","status":"publish","type":"post","link":"https:\/\/royblumenthal.com\/wordpress\/419-phishing-the-scams-that-hurt-the-internet-how-they-work\/","title":{"rendered":"419 Phishing &#8212; the scams that hurt the internet &#8212; how they work"},"content":{"rendered":"<div class=\"flickr-illustrate\" style=\"border: 2px solid black; margin: 8px; padding: 5px 3px 3px 5px; float: right; display: inline; font-family: Arial,Helvetica; font-style: italic; font-size: 0.75em; text-align: center;\"><a href=\"http:\/\/www.flickr.com\/photos\/49502994427@N01\/127177128\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/static.flickr.com\/46\/127177128_050660517c_m.jpg?w=605\" style=\"border: 1px solid black; margin: 0px; padding: 0px;\" border=\"0\" \/><\/a><a class=\"f-i-attribution\" style=\"text-decoration: none; color: black; display: block; font-weight: bold; text-align: right;\" href=\"http:\/\/www.flickr.com\/people\/fynes\/\">Photo: Gord Fynes<\/a><\/div>\n<p>Arthur (Goldstuck, I presume?) commented on my post, &#8216;<a href=\"http:\/\/schmucknews.blogspot.com\/2007\/06\/gone-phishing-anita-fripong-promises-me.html\">Gone Phishing<\/a>&#8216;, pointing out that technically, what I received is the standard &#8216;419&#8217; scam, and that phishing is a lot more sophisticated.<\/p>\n<p>It&#8217;s worth looking at this in a little detail.<\/p>\n<p>The &#8216;419&#8217; works like this&#8230; I receive an email, seemingly targeted at me, mentioning some vast amount of money that has been erroneously left in someone&#8217;s bank account. For some reason, normally to do with the tragic death of the bank account holder, that money has to be disposed of by a certain date, or else it gets redistributed to someone in power.<\/p>\n<p>The person sending the email is empowered through some technicality to involve me in the transaction, and for simply receiving and forwarding the money, I&#8217;ll get a percentage of the money.<\/p>\n<p>Phishing is different. I get an email from a banking (or other) institution, informing me most sincerely and convincingly that there&#8217;s been some sort of security breach on my online account (whether or not I hold one), and that I must go to the institution&#8217;s site and redo all of my security settings.<\/p>\n<p>When I follow the link to the site, I&#8217;m asked for all sorts of interesting and useful information. Such as my ID number. My bank account number. My &#8216;old&#8217; password. The size of my underpants.<\/p>\n<p>And like the dutiful idiot I am, I supply all of these details, convinced that my bank would never bend me over a barrel and slather my nether regions in KY Jelly, ready to take one for the team.<\/p>\n<p>Fourteen seconds later, my cellphone beeps, telling me that everything I&#8217;ve earned in my entire life has now been transfered to an account in the Bahamas. Clever me.<\/p>\n<p>Now how do I equate the two scams?<\/p>\n<p>Firstly, out of sheer laziness. But secondly, cos they&#8217;re both con-based. Both scams rely on the naivete of the user for the hook to sink.<\/p>\n<p>The 419 uses pure greed as its lure. And the phishing scam uses fear.<\/p>\n<p>With the 419, my brain sees sums like \u00a330 000 000, and 10%. And my brain short circuits. And I think, &#8216;Hell! Ten perCENT? They outta their cotton picking minds??? I&#8217;m gonna take the WHOLE LOT!!!&#8217; And so, I&#8217;m already plumped to be reeled in as they make their strange and quaintly illiterate requests for information and cash and bank account details and ID numbers.<\/p>\n<p>Phishing uses the fear that someone might be in the position to scam me. &#8216;Someone&#8217; has breached the bank&#8217;s security. And this &#8216;someone&#8217; has the power to strip my account of all my earnings and my entire overdraft. And if I act FAST, I&#8217;ll be able to thwart the scammer! And so I play right into their hands and hand it all to them on a plate.<\/p>\n<p>Both are very clever. And both operate on a subtle level.<\/p>\n<p>The crazy broken English of the 419 scam is deliberate, I would say. They make themselves SOUND as though they&#8217;re thicker than two scoops of soft-serve in Iceland. And that&#8217;s all in the service of activating our greed. They WANT us to think, &#8216;Oh, jeez! This chump can&#8217;t even speak English! I&#8217;m a phenominally gifted person in the brains department! Surely one such as I can outwit this scumbag? How stupid can he think I am???&#8217;<\/p>\n<p>If that happens, we don&#8217;t stand a chance.<\/p>\n<p>We must resist. We must say, &#8216;If I were to run a scam like this, how would I want my &#8216;opponent&#8217; to feel about me?&#8217; The correct answer is: &#8216;I&#8217;d want my opponent to think that my brains are runnier than a Mumbai sewer.&#8217;<\/p>\n<p>The subtlety of phishing scams is that they make me feel that they&#8217;re deeply concerned about the safety of my money. I respond to their concern by thinking, &#8216;Well, they MENTION things like fraud and theft and stuff like that, so that means they&#8217;re obviously NOT fraudsters themselves. I mean, what kinda fraudster would actually MENTION their fraud in the fraud setup? No way. This MUST be legit.&#8217; And then we&#8217;re dead. Bye bye money.<\/p>\n<p>So. Let&#8217;s resist this crud. If you get a phishing or scamming attack, here&#8217;s what Arthur suggests you do&#8230;<\/p>\n<p><span style=\"font-style: italic;\"><\/span><\/p>\n<blockquote><p><span style=\"font-style: italic;\">When I get these, I take great delight in c&#038;p&#8217;ing the e-mails header record, and then forwarding the e-mail with the header to the relevant ISP and\/or e-mail service. When that&#8217;s the likes of Yahoo or Hotmail, I usually end up by getting an e-mail saying that the user&#8217;s address has been canned. And at the very least, they&#8217;d have to find another e-mail address. It takes me all of 30 seconds. I also do it for the &#8220;lottery winner&#8221; scams.<\/span><\/p>\n<p><span style=\"font-style: italic;\"> I&#8217;d like to think that the reason I get far fewer of these than I used to, is because of these services of mine to the online fraternity. But it&#8217;s probably because of better ISP filters.<\/span><\/p><\/blockquote>\n<p>If you&#8217;re a Gmail user like me, you MIGHT know that they&#8217;ve got a &#8216;Report Phishing&#8217; button in the &#8216;Reply&#8217; dropdown menu. Click it, and it asks you to confirm that you&#8217;re reporting a phishing attack. (I kinda wish Gmail would wake up to the Web2.0 potential of this tool. If they &#8216;rewarded&#8217; their users by revealing how accurate their phishing reporting activities were, so many more people would be aware of the crime. I&#8217;d LOVE to know how accurate my efforts have been.)<br \/><span class=\"byline\"><\/span><br \/>Another thing to do, especially with standard Banking phishing attacks, is, in Arthur&#8217;s words, to &#8216;forward the e-mail and header to the &#8220;real&#8221; supplier&#8217;.<\/p>\n<p>The thing NOT to do is reply or respond in ANY way. Your email header contains a heck of a lot more information than you&#8217;d like these crazed lunatics to know. They can deduce all sorts of stuff about you if you respond. So don&#8217;t do it.<\/p>\n<p>Now. I&#8217;m off to Columbia, where someone&#8217;s widow is offering me free sex and eighteen billion Deutsche marks. What&#8217;s that in Zim dollars?<\/p>\n<div style=\"font-style: italic;\" class=\"tag_list\"><span style=\"font-size:85%;\">Tags: <span class=\"tags\"><a href=\"http:\/\/technorati.com\/tag\/arthur+goldstuck\" rel=\"tag\">arthur goldstuck<\/a>, <a href=\"http:\/\/technorati.com\/tag\/goldstuck\" rel=\"tag\">goldstuck<\/a>, <a href=\"http:\/\/technorati.com\/tag\/roy+blumenthal\" rel=\"tag\">roy blumenthal<\/a>, <a href=\"http:\/\/technorati.com\/tag\/royblumenthal\" rel=\"tag\">royblumenthal<\/a>, <a href=\"http:\/\/technorati.com\/tag\/blumenthal\" rel=\"tag\">blumenthal<\/a>, <a href=\"http:\/\/technorati.com\/tag\/phishing\" rel=\"tag\">phishing<\/a>, <a href=\"http:\/\/technorati.com\/tag\/419\" rel=\"tag\">419<\/a>, <a href=\"http:\/\/technorati.com\/tag\/scam\" rel=\"tag\">scam<\/a>, <a href=\"http:\/\/technorati.com\/tag\/email\" rel=\"tag\">email<\/a>, <a href=\"http:\/\/technorati.com\/tag\/crime\" rel=\"tag\">crime<\/a>, <a href=\"http:\/\/technorati.com\/tag\/fraud\" rel=\"tag\">fraud<\/a>, <a href=\"http:\/\/technorati.com\/tag\/prevention\" rel=\"tag\">prevention<\/a><\/span><\/span><\/div>\n<div class=\"blogger-post-footer\">Roy Blumenthal is a writer, director, artist, and <a href=\"http:\/\/snipurl.com\/visualfacilitator\">visual facilitator<\/a>. Hire him to make pictures of your meetings or workshops.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Photo: Gord Fynes Arthur (Goldstuck, I presume?) commented on my post, &#8216;Gone Phishing&#8216;, pointing out that technically, what I received is the standard &#8216;419&#8217; scam, and that phishing is a lot more sophisticated. It&#8217;s worth looking at this in a &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/royblumenthal.com\/wordpress\/419-phishing-the-scams-that-hurt-the-internet-how-they-work\/\"> <span class=\"screen-reader-text\">419 Phishing &#8212; the scams that hurt the internet &#8212; how they work<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[14,13],"tags":[],"class_list":["post-444","post","type-post","status-publish","format-standard","hentry","category-14","category-phishing"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p521FP-7a","_links":{"self":[{"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/posts\/444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/comments?post=444"}],"version-history":[{"count":0,"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/posts\/444\/revisions"}],"wp:attachment":[{"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/media?parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/categories?post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/royblumenthal.com\/wordpress\/wp-json\/wp\/v2\/tags?post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}