Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1473  |
|  August Abolins to Mike Powell  |
|  trojan inside xls file  |
|  11 Mar 20 20:48:00  |
 MSGID: 2:221/1.58@fidonet e251711e REPLY: 26.fidoinet@1:2320/105 22ce9579 PID: OpenXP/5.0.43 (Win32) CHRS: ASCII 1 TZUTC: -0400 Hello Mike! ** 11.03.20 - 17:39, Mike Powell wrote to AUGUST ABOLINS: >> attachments, and the body of the message says "This is my job >> application/resume. Password is 1234". Jeeez. MP>They are not even putting much effort behind those, are they? :) Of MP>course, I am sure they still get some folks who will open it anway. No they're not. But I guess we can be grateful that since it is so blatently stupid, it screams "to be avoided". I've seen exactly this simple type of scam since the early 2000's. The fact that we still see this today probably indicates that it is indeed successful in many cases. But it upsets me that there is the innocent unsuspecting internet newbie who would automatically go for the "click" before they realize it's too late. The attachment could actually be an .exe even though it looks like a .zip One click, and you're toast. Are tablets/smartphones immune to this type of trick? Are webbased email accounts immune? ../|ug --- OpenXP 5.0.43 * Origin: /|ug's Point, Ont. CANADA (2:221/1.58) SEEN-BY: 1/123 90/1 103/705 154/10 203/0 221/1 6 360 227/114 229/101 SEEN-BY: 229/426 452 1014 240/5832 249/206 317 400 280/464 5003 288/100 SEEN-BY: 292/854 310/31 317/3 322/757 342/200 396/45 423/81 120 712/848 SEEN-BY: 770/1 2452/250 PATH: 221/1 280/464 229/426 |
[ << oldest | < older | list | newer > | newest >> ]