What to do about Phishing emails

As like most people I am getting fed up with Phishing emails pretending to come from BT etc etc and have no real idea if anyone is trying to do anything about it i have started to do something myself.
On some of them particularly those with "Buttons" you can see the routing to where the Trojan programme etc is located.
I now email the owner of the site either by any contact information given or by looking it up on "Whois" if it is shown as a numeric.
I then send them a polite message saying that it looks as though there site has been hacked and they are hosting a programme that is used for Phishing.
So far i have sent 10 and got 8 replies 4 said they have removed the link and the associated account 4 said that they have left the link but advised the local police regarding the fraud.
So far i have had replies from the Phillapines, China and Malaya.
I have no illusions that this will stop it but it might dent it more than seems to be dane by anyone else.

Like you, I'm more than cheesed off with daily, false, "BT" emails but there is another issue, which so far I can't see anybody has raised i.e....... probably like everyone else I've sent countless copies of fakes to "Phishing" and to "Abuse" at BT only to receive the same pointless standard answers, with no action, from BT.
It is just not good enough for BT to fob off these complaints from many, many people, by saying that they (BT) can only do something if fake emails come from BT source / customer ..... these fake emails are leading unsuspecting people to believe that they are genuine and in any other (business) circumstance, this could be treated as fraud or misrepresentation, and could be actioned on by law enforcement / Trading Standards.
Does BT not care that their Logos / Headings / personnel are all clearly being massively misrepresented, day after day to countless numbers of their clients, all with an end view to illegal activity being carried out by the sender ??????
How much longer before senior personnel get off their rear ends and do something, instead of cowering behind their standard replies and paying lip service only to this problem, a problem which has existed for years, and is now increasing due to BT changes, and to get their vast resources to take action on this criminal activity, which we, as high cost paying customers, are expected to endure ???

Similar Messages

  • What to do about phishing web site?

    Went to a link in a friend's email and it was a phishing web site.  It took control of my computer and I couldn't leave the site.  I couldn't do a force quit or shut down my computer and had to pull the plug.  This happened a few days ago and I haven't noticed any problems since then.  I did change my email password.  I  use an iMac intel based computer with 10.9.5 installed and 5 GB of memory.
    Do I need to do anything now?  Am I ok to install Yosemite?

    Phishing?
    It is best to report this to Apple and follow the suggestion in the article.
    https://www.apple.com/legal/more-resources/phishing/
    Best.

  • Increase in phishing emails supposedly from BT

    In the past few months I've noticed that I am getting more & more phishing emails pretending to be from BT.
    They are all going to an email account that I don't use anymore (but what I used to set up my internet with originally) but have forwarded to my current email address
    So there were a lot of BT Yahoo classic is closing ones, update your email, even had ones pretending that my bill was ready
    I reported one with the ebilling on it and BT kindly forced me to change my password as "my account has been compromised" (er no it hasn't).  So I'm reluctant to report any more.
    I'm just not sure what to do about them.  I obviously don't want genuine bt emails to go to the trash. 

    There are many phishing emails from BT doing the rounds no doubt trying to catch people out because of the forthcoming migration from Yahoo to Critical Path.
    If you hover your mouse over the senders email address it will show you where it came from and if you hover your mouse over any links you will see where the link will take you.
    Basically BT will not ask you to confirm any passwords, usernames or account details or verify accounts via links in an email. If you want to verify or change any of those, do it by going to the BT website via your web browser and not by clicking on links in emails.
    If in any doubt about an email, delete it.
    See link for details about phishing emails.
     http://bt.custhelp.com/app/answers/detail/a_id/9191/~/what-is-phishing%3F-is-the-email-i-have-receiv...

  • Iphone 5 hacked - about 30 emails sent out to what looks to be a phishing website - TELUS customer

    Woke up to find out my iphone had sent out about 30 emails to contacts (not my full contact list - guessing maybe the last 30 contacts that have been either received/sent via email).  The web site isn't one I ever remember accessing (which in iteself is weird).  http://dcrconsultores.com.br/pbolqlx.pho
    This is a fairly new phone acquired from my provider TELUS sent directly from TELUS during the inital shipment of iphone 5's last year.
    I am on the latest IOS 6.0.2....model MD295C.......
    Any suggestions on how to fix the problem
    Yes I have a window's PC.....but it was powered off last night when the emails went out from my iphone....also when I checked this morning there were no outgoing emails in Outllook....... 

    Sounds like you're focusing too much on the possibility of malware on one of your machines. E-mail hacking these days is often done remotely, without any involvement from one of your computers. See:
    Someone is sending messages from my e-mail address!
    (That article is written from a Mac-centric point of view, but the particular portion I'm directing you to mostly applies to any device.)
    As to the iPhone, unless you have jailbroken it, there is no malware that can affect it. So it is not a hacked or infected iPhone causing the problem. You can set your mind at ease in that regard.

  • I received a phishing email from what I thought was my bank.  Do I need to do anything to my MAC for security?

    I received a phishing email from what I thought was my bank.  Do I need to do anything to my MAC for security? I have no anti-virus software.

    Evelyn, there is nothing that can prevent you or anyone from falling victim to those attempts to defraud you – other than you.
    "Phishing" scams are the most common way of getting people to voluntarily supply information that should be kept as secure as any other personal possession. "Anti-virus" solutions can't possibly prevent that sort of fraud, and if anything can only lull you into falsely believing you're being protected from threats, be they real or perceived.
    Do you have any further advice so that I don't fear my Mac?
    There is no reason to fear your Mac; it's a tool to be used for your sole benefit. Like any tool though, it can be misused. If there is any explanation for fear, it's a lack of education. Knowledge conquers fear and renders it inert. Learn what real threats actually exist, how to defend yourself from them, and how to distinguish them from those propagated by fear mongering psychopaths that justify their existence by keeping others misinformed. There are an abundance of the latter.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it. The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • I have gotten about 4 emails with a quick time attatchment, but it won't play because it says it is in a format it can't read.  Do I need to download some sort of additional software for this and if so  what?

    I have gotten about 4 emails (Frontier) with quick time attatchments, but it won't play them.  I just get a mesage saying it can't read it in the current format.  Do I need to download additional software and if so what?

    You might try adding Perian.  It can help QT play a with a wide variety of formats.

  • What is this User agreement email people are talking about prior to shipment of 4s?

    What is this user agreement email that people are talking about prior to shipment of 4s?

    I would say the left is too blue on the cool side where the iPhone 4 is more neutral, putting it beside that blue screen makes it possibly look yellow, try comparing to something white.

  • We have to add about 900 email address to cost center master data. Whats th

    Hi sap guru's,
    We have to add about 900 email address to cost center master data. Whats the best way of achieving this?
    pls help me.
    Thanks in advance,
    RAVI

    Hello Ravi,
    I do not see any email ID field in the cost center master. You may insert the ID in one of the available address fields. You may use LSMW or BDC to upload the same or even mass processing transaction KS12.
    BR // SG

  • What to do about email with no sender?

    I get email with no sender on my iPad only (not on my computer and not in webmail).  There is no sender or no message, and it is dated 12/31/69. It will not delete.  My ipad inbox is filled with this stuff now and I don't know what to do about it. I get 2 or 3 a day.  Another post that I googled said they also had this but that it would delete.  Mine will not, and this is getting to be a major problem.
    I don't think I can set up a rule on the iPad to stop it.  And, any rule that I set up on my iMac does not carry over to the iPad.

    Janice Fisher wrote:
     After 12 Hours the ipad was only 75 percentPercent charged.  Not sure what that means except that I'll have to pay a small fortunennkn,njjjkk for a data sync cord. The long and inexpensive one doesn't work apparently.
    I am not sure what you mean.
    How are you recharging the iPad battery?
    What do you mean by "data sync cord"? The USB cable supplied with every iPad? What "long and inexpensive one"?
    Using the 10W USB power adapter, I can recharge my iPad's battery from 0% to 100% in just under 4 hours.
    I am recharging the exhausted battery right now, and after 2 hours it has reached 64%.

  • What to do about a virus that uses your mac to send email?

    what to do about a virus that uses your mac to send email?

    It's highly unlikely that your Mac has a virus, since no virus, worm or trojan has been reported, much less confirmed, as having the behavior you mention. As LB suggested, most likely it's your email account itself that has been compromised, or some other computer (a Windows system, almost certainly) that has your addresses on it has been infected.
    Check the "sent" folder for your email account and see if the bogus messages are shown there. If they are, that at least would verify that the emails were sent via your email account. Report back and let us know whether your email account is POP, IMAP or Exchange, and who your email host is.
    If the messages are not shown anywhere in your "sent mail" folder, then someone has almost certainly gotten hold of your contact list and spoofed your email address.
    Regards.

  • Hi ive received what i think may be a phishing email can anybody help?

    hi ive received what i think may be a phishing email can anybody help?

    this is a copy of the e-mail i received is there someone i can report it to if it isnt legitimate
    thanks for any help
    From: "Apple Store" <[email protected]>
    Date: 6 January 2014 04:15:58 GMT
    To: Recipients <[email protected]>
    Subject: Important
    Dear Customer apple.
    We have recently determined that different computers connect to your apple account, Password and multiple failures were present before the login.
    We now need to confirm again the apple of your account information.
    If it does not activate within 48 hours, we will be forced to suspend your account indefinitely, because it can be used in a fraudulent purposes.
    Thank you for your understanding in this way.
    To confirm your account online:
    >>> Click here<<<

  • I updated iPhoto this morning. And now I can't email photos directly from iPhoto. Whats that all about?

    I updated iPhoto this morning. And now I can't email photos directly from iPhoto. Whats that all about?

    Which iPhoto version did you update to?
    If it is iPhoto 9.6 open iPhoto's preferences, go to the Accounts pane and delete the email account.
    Now quit iPhoto, relaunch, and add the account back.
    You may have to restart the Mac for this to have effect.
    If you are using iPhoto as Mail client, you may want to switch to Mail as the email client in iPhoto's General preference pane.
    This has been much more reliable in the past and less trouble.

  • What about html email on Apple Mail 1.3.11 (v622/624)

    Does anyone know of a good tutorial about html email? I understand about the
    coding of the email proper, but my question is how you get the html to "link"
    as email content, how one posts to his server, etc. I've seen a lot of tutorials
    that explain what works with what email servers but have yet to see how you do these basic things. Finally, does the Apple Mail version I'm using below
    accomodate html email? I've already coded a simple email in html but have no idea now what to do with it...?
    using Mail 1.3.11 (v622/624)with OS 10.3.9
    thx people...bq

    Another issue with Mail (v3.6, 936); As I was responding to an e-mail this morning my cursor suddenly went nuts! It was as if the "return" key was being held down and it just keeps going! I can hold down the delete key to counteract it but as soon as I let up it starts right back again! Crazy! Might this be a virus of some sort? Anyone have any ideas?

  • Sometimes if receivers of my mail click 'answer', my email adres is not appearing automaticaly. What to do about that?

    I f i send a message to more than one person it hapens that a few of them do not get my adres when answering. First I thougt is was because i used templates, but this week it also hapened without using a template.

    If you sent the email, it must have had the 'FROM' email address correctly inserted. I presume this is your email address.
    If you want people to Reply to a specific email address which is different to the FROM email address, do either of the following:
    '''To add a Reply-to email if different from the FROM email address in only that email.'''
    Open new Write email
    The auto selected will show a TO field
    you can click on that to see a drop down selection of options.
    Select the 'Reply-to' option.
    '''This inserts a Reply-to in every email you send:'''
    Tools > Account Settings
    select the mail account name
    It will say:
    'Your Name': Your name should already be inserted here
    'Email address': your mail account 'FROM' email address should already be here
    'Reply-to Address:' Add the 'Reply-to' email address if different from 'Email Address'.
    You could try inserting your email address in the auto Reply To Address field, to see if this overcomes issues for other people. It will do no harm, but should not be necessary.
    click on OK
    If the recipient receives the email then clearly it had the correct FROM and TO details.
    No one can guess what is going on. They may be using different email clients or viewing via webmail. Your recipients need to check the source view of the email sent to them to check it has all the correct information. If they continue to have issues, they need to ask what is wrong with the email client or webmail server they are using.

  • What do I do if I have received a phishing email from HMRC?

    I have received a phishing email from HMRC which I opened. I then deleted it.  Do I need to do anything to remove any potential threat?

    No but if that happans again, "forward" the email to Apple at this address:   [email protected]
    Apple wlll never send you an email asking you to verify your Apple ID.

Maybe you are looking for

  • How do I keep folder settings below the top level

    There's a certain Finder setting I prefer for folders regarding icon view. I use a size and arrangement that works very well for me. After replacing my older MacBook Pro with a new MBP and transferring all my data, the setting I prefer only works at

  • MacBook and Applecare from Amazon

    Hi, I hope we have someone who has bought MBPro (or any Apple computer)from Amazon. I just cannot resist the deal from Amazon for MBP with $150 Rebate (new ones on back order). Question - If I buy this from Amazon, and buy Applecare (discounted at $2

  • Insecurity of Keychain Access: "secure" notes visible during authentication

    Sorry if this has been discussed before, but I'm not keen on wading through 137 pages of discussions. I recently discovered Keychain Access' ability to create "secure notes," and thought this would be a wonderful way to keep my serial numbers, bank a

  • EF 100-400mm f/4.5-5.6L IS USM

    Just acquired an EF 100-400mm f/4.5-5.6L IS USM lens.  Is there anyone in this Canon community that can offer any dos or don'ts about this lens.  Any information would be helpful.  Thanks. Solved! Go to Solution.

  • When can we download the Oracle 10g for HP Tru64 Unix?

    Hi, Could you tell me the time to release the HP Tru64 Unix version? Thanks