Probable phish alert
I got a pretty convincing phish message in yesterday's e-mail that purported to be from Comcast, our internet provider. It looked like this:
I foolishly clicked on the link, which sent me to a log-in page that looked pretty authentic:
I logged in, and then was directed to a page that asked for stuff like an address, a phone number, and a Social Security number. I actually started entering that data before it dawned on me that I might be being had. Fortunately I hadn't yet clicked on "Submit" or "Send."
Sure enough, retracing my steps, I noticed that the link I originally clicked on out of the e-mail message had as part of the URL address "mail.haining.gov.cn." That is an address in China. Maybe Comcast is operating out of China these days, but I doubt it. I hightailed it out of there and logged on to Comcast a different way. I changed my password and am hoping that's the end of it.
It sure doesn't seem legit.
Comments (26)
Well you better change your real log on name and password because they have that now.
Posted by Ben | March 4, 2009 10:25 AM
oh you did,,,,,,,
Posted by Ben | March 4, 2009 10:26 AM
You might want to file an IC3 complaint.
http://www.ic3.gov/default.aspx
Someone is spoofing my email address for spam. The emails originate in Romania and other overseas places. I filed an IC3 complaint and also made a report to Interpol about one email which came from the computer of a Russian government agency.
You can cut and paste the email header into your complaint so that the real source can be identified.
Posted by Audaciously Hopeful | March 4, 2009 10:36 AM
Yup. In these HTML-ized emails, the link you're reading may not be the actual link you're going to.
Often that's legit (for click-counting purposes), but it can also be used to do phishing scams.
Most companies have now moved to a no-links policy when sending emails about people's passwords, finances, etc. They just tell you to visit their website - which means you'll have to type in the address yourself... ensuring your safety.
Posted by Kari Chisholm | March 4, 2009 10:39 AM
I'm surprised that you would be fooled by such an email!
Of course now you've learned your lesson, always CALL first before filling out anything like that!
It's the only growth industry left:
IDENTITY THEFT!
Posted by b h | March 4, 2009 10:40 AM
I got something almost identical supposedly from AT&T.
Posted by BobM | March 4, 2009 10:42 AM
I hope you are all at least reporting and forwarding these emails to the purported senders so that they can put out warnings to their customers.
Posted by Audaciously Hopeful | March 4, 2009 10:50 AM
Jack,
You know you should have phish on Fridays.
Posted by Bark Munster | March 4, 2009 10:53 AM
Curses foiled again !!!
My moderate republican associates and I will have to resort to the double super secret plan b.......
Posted by Fonzi | March 4, 2009 11:25 AM
I got something similar from my "provider" recently. The rule is to never, ever give out your password. Any email asking for your password is bogus.
Posted by Ray | March 4, 2009 11:48 AM
That was what was so tricky about it. It didn't ask for my password in so many words. It asked me to log in, and from a page that looked more authentic than most of these that I've gotten over the years.
Posted by Jack Bog | March 4, 2009 12:19 PM
Maybe Comcast is operating out of China these days...
Certainly not for the network services - they only like a government where they can put the fix in, not vice versa.
Posted by John Rettig | March 4, 2009 12:25 PM
I get at least a dozen of those a day from banks, credit unions, the IRS, and other companies and agencies from all over the world. It is hit or miss: eventually they send one from somebody who I actually have an account with.
Rule of thumb: If an official-looking email doesn't mention your name in the text of the email, it is not from who it says it is from.
Posted by antiplanner | March 4, 2009 12:30 PM
Jack
Just curious, had you had "several failed login attempts"
Posted by mp97303 | March 4, 2009 12:58 PM
No, but the implication of the e-mail message was that someone else was trying to get into my account, and Comcast had blocked those attempts.
Posted by Jack Bog | March 4, 2009 1:33 PM
Alas, I fell for a similar phishing site. I thought I was logging-in to Wells Fargo, with the intent of doing some online banking.
The log-in site requested the usual log-in name and password (typical of the real Wells Fargo site), then I was told something like, "For the ongoing security of your online account, please type your PIN."
I just thought that it was a new layer of protection, so I typed my PIN.
It was after that when I realized that I'd been "had."
I called Wells Fargo, they filed a fraud investigation, and I had to go in to a branch office, establish a new account name, account log-in, and a new PIN. They then placed a "watch" on my account for any untoward activity.
And I thought I was computer savvy and careful. Sheesh!
___ora et labora___
-ob
Posted by Oregbear | March 4, 2009 2:26 PM
No, actually I think Comcast IS relocated in and operating out of China these days.
Or think of it as China relocated and operating 2 blocks down the street from you these days. If that salves anxiety. Or self-medicate ... the very green 2008 vintage coast-valleys Pinot Noir already tastes like an entry-level investment sure to appreciate.
- -
Did you hear the reports that AIG has been the CIA mercenary infiltrated in China collecting (person-ID theft) 'intelligence' for several years now, under guise of "selling insurance" (read: phishing 1 billion addresses and which ones have 1 child)?
So it isn't that AIG is "Too Big to Fail," but rather, "Knows Too Much to Lose" (the Classified Secrets for the taxpayers' checks illegally already cashed ... besides the federal crime prosecution for the illegal AIG participation, of course).
Posted by Tenskwatawa | March 4, 2009 2:59 PM
Simple defense: always look at the message in plain text, or at least do so before clicking a link. If you lay your human eyes on the raw text, it takes almost no knowledge of HTML to spot a misrepresented link.
For me, that means I only use HTML e-mail when I really, *really* need it... maybe four messages a year out of thousands. The rest of the time, I send and view in plain text.
Posted by Alan DeWitt | March 4, 2009 3:19 PM
"Fortunately I hadn't yet clicked on "Submit" or "Send."
They could have been logging your keystrokes despite the presence of a submit/send button. The button is often window dressing to make the site look authentic.
"If you lay your human eyes on the raw text, it takes almost no knowledge of HTML to spot a misrepresented link."
Many phishing attacks spoof the url so viewing a "text" source is no guarantee.
Posted by squeezed | March 4, 2009 6:32 PM
"Many phishing attacks spoof the url so viewing a "text" source is no guarantee."
Well, true. But if they've compromised the DNS or the site's SSL you're pretty well screwed anyway. [shrug]
Posted by Alan DeWitt | March 4, 2009 7:41 PM
Alan's advice is very good. Most email clients have a "show original" or "show source" option.
There are also DNS services you can subscribe to (OpenDNS is free) that maintain lists of phishing domains and will provide a warning page whenever you try to load one. This is the best solution for tech-challenged folks.
In my experience a very small percentage of phishing attacks exploit bugs in your web browser to spoof the URL. And if you stay away from Internet Explorer you'll be safe from the large majority of those.
Posted by Gene | March 5, 2009 10:11 AM
Here's an eye-opening presentation on SSL security flaws if anyone wants to see how the web security emperor has no clothes.
https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
Posted by Dave C. | March 5, 2009 4:58 PM
Dave C.: Every year after Black Hat I consider changing careers* and going off to live in a cave.
[*: Before I become the sysadmin equivalent of those flat-footed guys in the background of Michael Jordan posters watching him fly by to score on them.]
Posted by Alan DeWitt | March 5, 2009 7:16 PM
Comcast is a .com not a .net. First flag.
Companies never send out an "your account has been compromised" emails.
Never. Ever.
You find this out if / when you try to log in the next time.
These are never legitimate.
Never. Ever.
And if you ever wonder, ALWAYS look at the full header of the sender.
ALWAYS.
Posted by john | March 6, 2009 11:25 PM
The "From" address looked pretty good: info@comcast.net. My own Comcast e-mail address ends in @comcast.net, and so it seemed o.k.
The key in my case would have been to roll over the link that they wanted me to click on, and be sure to look at the full URL, even though it was so long that in the e-mail display it had a "..." at the end of it. That's where the China address was.
Posted by Jack Bog | March 6, 2009 11:31 PM
"it was so long that in the e-mail display it had a "..." at the end of it. That's where the China address was."
Which of course was not at all accidental. The attacker knew that the user interface of your popular e-mail reader cuts off a long URL, and exploited that limitation to hide his attack. Reading in plain text is an effective countermeasure because it tells the program to never hide information in the mail body in a misguided attempt to be helpful. It is inconvenient at times, but it's much safer.
It's also worth mentioning that the "from" address on an e-mail means basically nothing. It's about as straightforward to fake as it is to write an incorrect return address on an envelope.
Posted by Alan DeWitt | March 9, 2009 10:23 AM