Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

 

Tuesday, July 29, 2014

 
  New Resources
Travel Tips for Data Security
Free Security/Privacy Training Resources
Penn+Box
Two-step verification
Combating Malware
SafeDNS
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
 
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Spam
Phishing
Wireless Networking
Encryption & digital signatures
 
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
 
  More in-depth information for
Local support providers
System administrators
 
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
 
  Related links
Electronic privacy
PennKey
Viruses
Worms, trojans, backdoors

Hoaxes, Frauds and Scams

The dawn of the Internet Age has brought many new ways for businesses and their customers to interact. Many goods and services that, prior to the late 1990s, could only be purchased through personal visits to a brick-and-mortar business establishment can now be purchased for home delivery - overnight, if desired - using email and/or a standard web browser.

Of course, as more and more honest, legitimate businesses find new customers on the Internet, so have the crooks and con artists likewise found cyberspace to be fertile ground for frauds and scams. Many of these scams are distinctive and uniquely suited for the electronic world, but many others (such as the infamous Nigerian Scam) are simply updated versions of schemes that have been around for decades.

E-mail, of course, is an ideal medium for scammers to ply their trade, especially since the number of inexperienced "newbies" continues to rise around the world. In many cases, common sense will tell you if an email or website is fraudulent, or at the very least, suspicious. There are many clever tricks used by scammers, though, to dupe even the most vigilant person into their traps.

Scam or "Spam"?

It is certainly true that many frauds and scams are circulated in the same mass-mailing format as run-of-the-mill "spam", or Unsolicited Commercial E-mail (click here for more info on "spam"), however, not all spam is fraudulent. Annoying, yes, but not, in most cases, illegal. In general, the object of the scammer is to fool you into giving him something you have that he wants. Money, of course, is still the main goal, but more and more they are trying to get you to give them personal information about yourself - credit card numbers, bank account numbers, Social Security Numbers, etc. - that will allow them to commit, among other things, identity theft. In some cases, the object is to get you to visit a bogus web site that will surreptitiously download malicious software onto your computer, allowing them to remotely control it for use in hacking exploits such as a "Distributed Denial of Service" (DDoS) attack. Whatever the motive behind it, scams and frauds are all about separating you from your valuables in one way or another.

Hoaxes

Hoaxes are sometimes nearly impossible to distinguish from scams and frauds, and in fact can be used as a vehicle to commit fraud. In general, though, hoaxes are about trying to get you to believe something that isn't true, and act on it, rather than to engage in a fraudulent financial transaction. The lines can be blurry, though. Many hoaxes are, essentially, "Internet practical jokes" that sometimes have unfortunate consequences. Hoaxes tend to have a very long lifespan as well. The first great Internet hoax, the infamous "Good Times" virus (1994) still gets spread around by well-meaning new Internet users. In recent years, another prevalent Internet hoax revolves e-mails urging the recipients to delete the files jdbmgr.exe or sulfbnk.exe from their hard drive if they exist, allegedly because they are virus files (they're not - they're important Windows system files, see here for a rundown on this hoax). This perennial favorite is still making its way around as well. Many well-known Internet hoaxes of the last several years are simply re-workings of "urban legends" that have been around for decades.

How can I tell if an e-mail message is a hoax, fraud or scam?

It's not always easy, but start with your own common sense. If it seems fishy or phony to you, chances are it is.

You also have many powerful tools at your disposal that can help you ferret out the truth - search engines like Google, Yahoo! and Bing are very useful for seeing how widespread the e-mail is, and what other people have said and done about it. If the e-mail message contains distinctive bits of information such as company name(s), names of individual people, telephone numbers (especially toll free numbers), try plugging them into the search box to see how many "hits" you get. You might be surprised to find how well-known it is.

There are also a number of popular web sites that collect and track information about hoaxes, scams and frauds, and most of them have their own search features built in. A few of the more accredited and respected of these sites are:

www.scambusters.org
www.snopes.com

urbanlegends.about.com
www.quatloos.com


"Phishing"

A generic type of scam that has become very common via e-mail since 2002 has come to be known as "phishing". This involves a "spoofed" (i.e., forged) email, usually appearing to be from a well-known company or business, requesting the recipient to "verify" account data. Amazon.com and eBay are among the most frequently spoofed companies, but probably the most prevalent target is PayPal. These messages often contain images that are exact duplications of the firm's logos and trademarks, all the more to look legitimate and official. Here is an actual, typical example of this scam:

PayPal phishing

The objective, of course, is to get unwitting PayPal users to click on the link to a forged or otherwise bogus website and give away important personal information. These sorts of "phishing" messages are usually sent as spam to millions of addresses, and they can be sure to reach a large number of actual PayPal account holders (or Amazon, or eBay, or whatever the target "audience" is).

It is important to realize, also, that the sites these messages attempt to get you to access can be designed in a way that important information can be taken from your hard drive without your knowledge. The tendency of many people who receive a message like this, and who do not have PayPal accounts will be to click on the link and tell them they've "made an error". Doing so may expose personal information on their computer to "harvesting".

For a more thorough and detailed discussion of "phishing", see:

www.antiphishing.org

A Few Rules of Thumb

  • E-mail is a very insecure medium, and is easily forged. Do not assume that the name in the "From:" line is the real person or company that actually sent the message.
  • Just as you should not believe everything you read in a newspaper or magazine, be equally skeptical of information you read in e-mail or on websites.
  • Never, ever give sensitive, personal information (including passwords) in response to an e-mail or website query unless you are absolutely sure that you are dealing with the person or company you believe you are. When purchasing over the web, make certain that the business or company is using a Secure Server (implementation of Secure Sockets Layer [SSL] or Transport Layer Security [TLS] to encrypt data between your computer and theirs). You can tell if this is the case by looking at the URL in the box at the top. If it begins https: instead of http:, then you are communicating via a secure session, and the business is more than likely legit - OR - if you see a small "padlock" icon in the corner of the browser window, and the icon appears to be "locked", that is an indication that your session is SSL/TLS-encrypted. SSL/TLS websites make use of digital certificates issued by trusted third parties.
  • No matter how urgently an e-mail message implores you to "pass on this virus warning to everyone in your address book", and no matter how authentic it appears to be, do not blindly forward it to all your friends - you may be proliferating the next "Good Times" virus. Even if it comes from your best friend, or your mother, don't pass it on - research it first, and think how smart and cool you'll look when you can reply, "It's a hoax - check this website for the real story".
  • Look before you click on a link, whether it's in an e-mail or on a website. It may not be leading you where you think it is. With most e-mail programs and web browsers, if you pass your mouse pointer over the link without clicking, you can see the actual destination displayed on the program screen (usually at the lower left). If the link says "Click here to go to GoodCompany.com," but the link destination displayed is actually NeverHeardOfEm.org, the link may lead to a malicious site.
  • Never open an e-mail attachment unless you are absolutely, positively certain about who sent it, why they sent it, and what the attachment actually is.
  • Obtain and use good anti-virus software, and update it weekly, at least. Penn users may download officially supported anti-virus software (PennKey authentication required) from the Supported Products website.

Should I report it, and if so, to whom?

If you have received an e-mail message or visited a website that appears to be perpetrating a hoax, fraud or scam, take a little time to research it as suggested above. In most cases, you'll find that it's well-known and well-documented, and in many instances is simply a variation on an "oldie but goodie". As long as you have not responded or acted in the manner they're attempting to get you to do, you can generally delete it and not worry about reporting it to law enforcement or computing support staff. If you're still in doubt, though, you can contact Penn Information Security at security@isc.upenn.edu and request help.

Last updated: Friday, April 23, 2010

top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania