Deutsch   English   Français   Italiano  
<vbijfn$1igia$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Don Y <blockedofcourse@foo.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Phishing
Date: Sat, 7 Sep 2024 15:18:19 -0700
Organization: A noiseless patient Spider
Lines: 57
Message-ID: <vbijfn$1igia$1@dont-email.me>
References: <vbcvp4$eoqp$1@dont-email.me> <lk3ko1F881iU1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 08 Sep 2024 00:18:33 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="0653a2464c640fc67dedbce0322cbd50";
	logging-data="1655370"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+G7K7ohwuqPv+7kFep68+D"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.2.2
Cancel-Lock: sha1:utoAp4+y65ypYIPt7TnCiY9MfMc=
In-Reply-To: <lk3ko1F881iU1@mid.individual.net>
Content-Language: en-US
Bytes: 3485

On 9/7/2024 11:35 AM, Joerg wrote:
> On 9/5/24 12:11 PM, Don Y wrote:
>> I'm checking my "deflected" incoming mail to see if anything that
>> *should* have been allowed through was mistakenly diverted
>> (false positive).
>>
>> I see a fair number of phishing attempts on my "public" accounts.
>> But, all are trivially identified as such.
>>
>> So, how is it that folks (organizations) are so often deceived
>> by these things?  Are users just lazy?  Would it be more helpful
>> to have mail clients make it HARDER to activate an embedded
>> URL or "potentially compromised" attachment?
>>
>> Or, will the stupidity of users adapt, accordingly?
> 
> I am generally stunned how naive people can be. "But it came from a PG&E 
> address and had a PG&E link in there!" ... "There is a customer service number 
> on your paper statements. Did you call them about that past due accusation?" 
> ... "Ahm, well, no".

I see it more as laziness.  They know there are ways to check
<whatever> but don't want to be "bothered" to do those things.

"Didn't you check up on the 'company' before committing to that $20,000
swimming pool he was eager to sell you?"

"But, he had a *truck* with the company's name on it!"

(Wow, imagine how hard that would be to accomplish!  <rollseyes>)

> When it comes to politics and elections it's even worse. "But he had such a 
> nice smile!". Don't get me started ...

I had *one* email slip through my (first version) of my filters.
It was to a "non-public" account that I use so had to pass *just*
my WhiteList (content is "trusted" from WhiteListed senders).

It was a solicitation for money for a "friend" -- who was
suspiciously not near his phone (yet ALWAYS sends mail FROM his
phone!).  That, coupled with the ambiguous/impersonal plea
(e.g., not using my real name to address me) threw up flags.

The "Reply-To" address (something I hadn't checked in previous
filter designs, relying, instead, on the "From" address) cinched it:
Instead of "Ray" it was "RRay".

I replied:  "Sure!  I'll drop it off on my way out to shopping!"

Of course, this put the emailer in a bit of a panic as I would now
be in direct contact with the person he was impersonating and, as
such, could alert him to the ongoing scam.

Too late to prevent his ex-wife from sending $400 to "him"...

Maybe she will have learned her lesson?