Sunday, November 18, 2018

WITH GOD YOUR SUCCESS IS GUARANTEED

PAYMENT DISBURSEMENT SECTION, QUARTIER, ACCRA GHANA Address: Liberia Road, Heritage Tower, Ambassadorial, Ridge, Accra Ghana Tel: 00233 547 493 588 E-mail: tafikdada@accountant.com This is to inform you that your name appeared among twenty five foreign depositors listed for part payment of their long overdue funds in (UBA BANK). The governor of UBA BANK released the payment order of (US$950,000.00). only after a debt reconciliation meeting with the President of Republic of Ghana which was held in Accra on 28th of October 2018. The governor signed the payment to be made through two prime banks(UBA and ECO BANK) in Ghana. The payment starts from today and will end on the 30th NNovember 2018. Note, if you are not able to receive the payment on or before the date given above, your payment will be cancelled. UBA BANK will effect the payment through ATM Master/Visa Card. Please take note, the payment takes effect from today and you are advised to send the following information for your payment: Name:……………………………………… Address:………………………………………… Phone Number:……………………………………….. You are given maximum of 24hours to respond to this message. Failure to respond on or before the given date, this office will assume you are not the supposed recipient and will cancel your name from the list. I am looking forward to receive your reply. Regards, Mr. Tafik Dada Section Head

Email analysis :

NOTE : tafikdada@outlook.com
NOTE : tafik@wit.ocn.ne.jp
NOTE : Received : ⁨from User (p180087-ipngn200304yosemiya.okinawa.ocn.ne.jp [180.25.1.87])


NOTE : by vcwit.ocn.ne.jp

Your life is in your hands

Hi

Dо nоt mind оn my illitеrасy, I аm from China.

This is your last chance to save your life.

I uрlоаdеd thе maliсiоus рrоgram оn yоur systеm.
Sinсе thаt mоment I рilfеrеd аll рrivy baсkgrоund frоm yоur systеm. Аdditiоnally I havе somе morе соmрrоmising evidеnсе. Thе mоst intеrеsting evidenсе thаt I stоlе- its a vidеоtаре with yоur *. I аdjustеd virus оn а * wеb sitе аnd аftеr yоu loadеd it. Whеn yоu dесidеd with thе video аnd tарреd оn a рlаy buttоn, my dеlеtеriоus sоft аt оnсе sеt uр on your systеm. Аfter adjusting, yоur саmera shооt thе vidеоtаре with yоu *, in аddition it savеd рreсisеly the * videо you * оn. In nеxt fеw dаys my mаlwаre cоllесtеd аll your sосiаl and wоrk соntacts.

If you wаnt tо delеtе the rесords- pay me 888 еuro in BTC(сryptоcurrеncy).
I providе you my Btс numbеr - 1DQqZVUFopQ6v1rMC8GeCZNKnrEQt2guha
Yоu havе 24 hours after rеаding. When I get trаnsfеr I will dеstroy thе vidеotаpе еvermоrе.
If you need 50h just Open the calculator on your desktop and press +++
Other way I will sеnd thе tаpe to аll yоur сollеаguеs and friends.

Email analysis :

NOTE : Viktoria@wellnesselfie.com
NOTE : Received : ⁨from treyleraksesuar.com (treyleraksesuar.com [193.124.44.32])

Reply

Your ATM Card of $5.5 Million is ready for shipment. Urgently reconfirm your Delivery address and your direct
phone number immediately

Reynolds Garrison
Group Managing Director
First Bank

Email analysis :

NOTE : raynoldsdarrison51@gmail.com
NOTE : text@extra.ocn.ne.jp
NOTE : Received : ⁨from User (p722031-ipngnfx01aobadori.miyagi.ocn.ne.jp [153.156.220.31])


NOTE : by vcextra.ocn.ne.jp

Monday, October 29, 2018

Attention Dear Beneficially !!

Attention Dear Beneficially !!

Your over due compensation fund from UBA Bank Of Africa which we agreed to deliver to you in fiscal cash payment, the fund is already sealed and package with a security proof box sum of $2.5 Million, his currently at your Airport in United State of America, by diplomatic agent, and he is waiting for you to forward your current information.

Quickly contact him with your full information,

your full name:................,
resident address:...............,
mobile phone number:..........,
name of your nearest airport:..........,

For him to locate your home with your package, and to avoid delivery to wrong person,
contact him on his current phone number:+1 (661) 339-8536 ,
forward it today for him to locate you immediately and delivering your package to you .

Make sure you forward your full information to him and his name is Mr. Robert Umar, E-mail: (dip.robertumar@gmail.com )

Compliment of the Year ,

Kind regards,
Mrs Jacinta Hilary.

UN Foreign Payment Officer.

Email analysis :

NOTE : dip.robertumar@gmail.com
NOTE : dip.robertumar.@crest.ocn.ne.jp
NOTE : X-Originating-Ip : ⁨[156.0.214.61]⁩

Saturday, October 6, 2018

Email spoofing



Email spoofing is the creation of email messages with a forged sender address. Because the core email protocols do not have any mechanism for authentication, it is common for spam and phishing emails to use such spoofing to mislead the recipient about the origin of the message.

Technical detail

When an SMTP email is sent, the initial connection provides two pieces of address information: MAIL FROM: - generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address.RCPT TO: - specifies which email address the email is delivered to, is not normally visible to the end user but may be present in the headers as part of the "Received:" header. Together these are sometimes referred to as the "envelope" addressing, by analogy with a traditional paper envelope, and unless the receiving mail server signals that it has problems with either of these items, the sending system sends the "DATA" command, and typically sends several header items, including:


From: Joe Q Doe < joeqdoe@example.com > - the address visible to the recipient;

but again, by default no checks are done that the sending system is authorized to send on behalf of that address.

Reply-to: Jane Roe < Jane.Roe@example.mil > - similarly not checked

and sometimes:

Sender: Jin Jo < jin.jo@example.jp > - also not checked.

The result is that the email recipient sees the email as having come from the address in the From: header; they may sometimes be able to find the MAIL FROM address; and if they reply to the email it will go to either the address presented in the From: or Reply-to: header - but none of these addresses are typically reliable, so automated bounce messages may generate backscatter.


Use by spam and worms

Malware such as Klez and Sober and many more modern examples often search for email addresses within the computer they have infected, and use those addresses both as targets for email, but also to create credible forged From fields in the emails that they send, so that these emails are more likely to be opened.

For example:

Alice is sent an infected email which she opens, running the worm code.

The worm code searches Alice's email address book and finds the addresses of Bob and Charlie.

From Alice's computer, the worm sends an infected email to Bob, but forged to appear to have been sent by Charlie.

In this case, even if Bob's system detects the incoming mail as containing malware, he sees the source as being Charlie, even though it really came from Alice's computer; meanwhile Alice may remain unaware that her computer has been infected.


Fooling media

It has happened that the media printed false stories based on spoofed e-mails.

In October 2013, an e-mail which looked like it was from the Swedish company Fingerprint Cards was sent to a news agency, saying that Samsung offered to purchase the company. The news spread and the stock exchange rate surged by 50%. It was later discovered the e-mail was a fake.

Legitimate use

In the early Internet, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as "open relays", this was a common practice. As spam email became an annoying problem, these sorts of "legitimate" uses fell out of favor.

When multiple software systems communicate with each other via email, spoofing may be required in order to facilitate such communication. In any scenario where an email address is set up to automatically forward incoming emails to a system which only accepts emails from the email forwarder, spoofing is required in order to facilitate this behavior. This is common between ticketing systems which communicate with other ticketing systems.

The effect on mailservers

Traditionally, mail servers could accept a mail item, then later send a Non-Delivery Report or "bounce" message if it couldn't be delivered or had been quarantined for any reason. These would be sent to the "MAIL FROM:" aka "Return Path" address. With the massive rise in forged addresses, Best Practice is now to not generate NDRs for detected spam, viruses etc. but to reject the email during the SMTP transaction. When mail administrators fail to take this approach, their systems are guilty of sending "backscatter" emails to innocent parties - in itself a form of spam - or being used to perform "Joe job" attacks.

Identifying the source of the email

Although email spoofing is effective in forging the email address, the IP address of the computer sending the mail can generally be identified from the "Received:" lines in the email header. In many cases this is likely to be an innocent third party infected by malware that is sending the email without the owner's knowledge.

Countermeasures

The SSL/TLS system used to encrypt server-to-server email traffic can also be used to enforce authentication, but in practice it is seldom used, and a range of other potential solutions have also failed to gain traction.

However a number of effective systems are now widely used, including:

  • SPF
  • Sender ID
  • DKIM
  • DMARC

Although their use is increasing, estimates vary widely as to what percentage of emails have no form of domain authentication: from 8.6% to "almost half". To effectively stop forged email being delivered, the sending domains, their mail servers, and the receiving system all need to be configured correctly for these higher standards of authentication.

As modern countermeasures prevent spammers from spoofing the envelope-from address, many have moved to utilising the header-from address as seen by the recipient user rather than processed by the recipient MTA. Proprietary implementation beyond the scope of the SPF schema is required to protect against certain header-from spoofing implementations.

© From Wikipedia, the free encyclopedia

Security Warning

Hello!

I'm a member of an international hacker group.

As you could probably have guessed, your account *@* was hacked, because I sent message you from your account.

Now I have access to all your accounts!
For example, your password for *@* : dod419419xk

Within a period from July 31, 2018 to October 3, 2018, you were infected by the virus we've created, through an adult website you've visited. So far, we have access to your messages, social media accounts, and messengers. Moreover, we've gotten full damps of these data. We are aware of your little and big secrets...yeah, you do have them. We saw and recorded your doings on porn websites. Your tastes are so weird, you know.. But the key thing is that sometimes we recorded you with your webcam, syncing the recordings with what you watched! I think you are not interested show this video to your friends, relatives, and your intimate one...

Transfer $800 to our Bitcoin wallet: 1PwENLsmQ2Z6b4EJfXDeeXKBj9v878uHRf

If you don't know about Bitcoin please input in Google "buy BTC". It's really easy.

I guarantee that after that, we'll erase all your "data" :)

A timer will start once you read this message. You have 48 hours to pay the above-mentioned amount.

Your data will be erased once the money are transferred.
If they are not, all your messages and videos recorded will be automatically sent to all your contacts found on your devices at the moment of infection.

You should always think about your security.
We hope this case will teach you to keep secrets.
Take care of yourself.

Email analysis :

NOTE : BTC : 1PwENLsmQ2Z6b4EJfXDeeXKBj9v878uHRf
NOTE : Received-Spf : ⁨Softfail (mailfrom) identity=mailfrom;
NOTE : client-ip=87.196.189.84; helo=87-196-189-84.net.novis.pt;


INFOS : It's just an "Email spoofing".
INFOS : (Email spoofing is the creation of email messages with a forged sender address.)
INFOS : The password was already used in other scams.
INFOS : (http://www.scam.cz/search?q=dod419419xk)