• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Latest PayPal Scam

SuperSix

Elite Member
Got the latest Paypal scam email today.

From: PayPal Security Center
Subject Line: Verify Paypal, please - (Exact case)

Information requested:

Email Address
Paypal Password
Bank account
Credit card number

Basically it is an HTML page that harvests your information, and sends it to a Russian site: "http://agrafi.debug.hw.ru/1/verify.php". It then redirects back to the real Paypal site after grabbing your info.

Looks pretty legit, except for the lame Subject line.

Why is Paypal targeted so much? The psycho policies, that's why. Nothing is done when the money is swiped, so why wouldn't unscrupulous people try to beat the system?

 
Not just because of the policies, but because it's the most widely used system for moving money over the net (so there are millions of potential victims), and if you are outside the US the chance of prosecution is essentially nil.
 
good grief
rolleye.gif
won't thieves ever learn.
 
Originally posted by: kranky
Not just because of the policies, but because it's the most widely used system for moving money over the net (so there are millions of potential victims), and if you are outside the US the chance of prosecution is essentially nil.

And if they can just get 1/100th of 1 percent to respond to the scam email, its been a good day for them.
 
Originally posted by: rudder
Originally posted by: kranky
Not just because of the policies, but because it's the most widely used system for moving money over the net (so there are millions of potential victims), and if you are outside the US the chance of prosecution is essentially nil.

And if they can just get 1/100th of 1 percent to respond to the scam email, its been a good day for them.

You wouldn't believe how many morons actually respond to that type of e-mail and send their information.
 
Originally posted by: Nocturnal
Originally posted by: rudder
Originally posted by: kranky
Not just because of the policies, but because it's the most widely used system for moving money over the net (so there are millions of potential victims), and if you are outside the US the chance of prosecution is essentially nil.

And if they can just get 1/100th of 1 percent to respond to the scam email, its been a good day for them.

You wouldn't believe how many morons actually respond to that type of e-mail and send their information.

well i wouldn't call them 'morons'. I bet half of the users on this board's parents /grand parents would fall for this.


 
Originally posted by: CallTheFBI
weird. explain how that works again, they send a bogus email to you?

It's an HTML email that looks like a Paypal page, and has fields for data, credit card, bank, etc.. Once you fill in the fields and press Send, the data is "dropped off" to a Russian site via a PHP script, then it redirects back to Paypal's front page.
 
I almost clicked this one since I didn't pay much attention, and it looked real enough. The thing that threw me was the lame reply-to address.

From : "PayPal Services"<service@paypal.com>
Reply-To : user@some.com
To : REMOVED
Subject : PayPal Security Measures
Date : Tue, 18 Feb 2003 13:07:34 +0200

Please verify your information today!

Your account has been flagged in our system to be investigated about an issue concerning Fraud. We require members flagged with Fraud to verify their information.
To verify your information, click here and enter the details.

After you verify your information, your account will be taken out of Fraud and you will be allowed to make transfers again.

Thanks for using PayPal!

Please do not reply to this e-mail. Mail sent to this address cannot be answered.

<EDIT forgot the link in redirects to: http://65.54.246.250/cgi-bin/linkrd...70/%70%72%6F%63%65%73%73%69%6E%67%2E%68%74%6D </EDIT>
 
Back
Top