{"id":1114,"date":"2019-04-06T19:33:31","date_gmt":"2019-04-06T19:33:31","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=1114"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"BT-Yahoo-'Final-Warning'-Phishing-Scam","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=1114","title":{"rendered":"BT Yahoo &#8216;Final Warning&#8217; Phishing Scam"},"content":{"rendered":"<div>\n<p><b>Outline<\/b><br \/>\nMessage purporting to be a &#8220;Final Warning&#8221; from BT Yahoo claims that users must immediately click a link to verify their account before they can receive pending emails. <\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><b>Brief Analysis<\/b><br \/>\nThe message is not from BT Yahoo. The message is a phishing scam designed to trick recipients into disclosing their email login details to Internet criminals.<\/p>\n<p><b>Example<\/b><\/p>\n<div class=\"example\">\n<p><strong>Subject: Final warning!!!<\/strong><\/p>\n<p>Dear Customer,<\/p>\n<p>Your incoming messages were placed on pending due to our recent upgrade.<br \/>\nVerify your account immediately to get your mail working by pressing the to get your mail updated<\/p>\n<p>Click Here<\/p>\n<p>Thank you for using BT Yahoo!<\/p>\n<p>BT Yahoo! \u00a92013<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><b>Detailed Analysis<\/b><br \/>\nAccording to this message, the recipient&#8217;s BT Yahoo emails have been &#8220;placed on pending&#8221; due to a recent upgrade. Recipients are advised to &#8220;immediately&#8221; click a link in order to verify the account and receive their pending emails.<\/p>\n<p>However, the message is not from BT Yahoo or any other legitimate service provider. In fact, the message is a<a href=\"http:\/\/hoax-slayer.net\/phishing-scams-anti-phishing-information\/\"> \u00a0typical phishing scam \u00a0<\/a>whose sole purpose is to extract email login details from unsuspecting Internet users.<\/p>\n<p>Those who take the bait and click the link in the scam message will be taken to a bogus website that hosts a Yahoo email login box. The fake page looks almost exactly like the genuine Yahoo login and features seemingly official Yahoo logos and formatting. Unless they look at the web address of the page &#8211; which has no connection to Yahoo and is \u00a0not even secure \u00a0&#8211; many users may not realize that they are not on a genuine Yahoo web page.<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-format=\"fluid\"\n     data-ad-layout=\"in-article\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"9162856233\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p> If uses proceed and provide their Yahoo ID and password on the fake site, they will be rapidly and automatically transported to the genuine Yahoo login page. Many will conclude that some simple glitch has occurred and will login again &#8211; this time on the real Yahoo site &#8211; without taking too much notice of the apparent double login anomaly. Meanwhile, however, their account login details have been sent to the criminals running this phishing campaign.<\/p>\n<p>Once they have collected this information, the criminals can login to the Yahoo accounts belonging to their victims, lock out the rightful owners by changing passwords, and use the accounts to \u00a0launch further spam and scam campaigns.<\/p>\n<p>Email phishing campaigns such as this one are \u00a0<a class=\"norm\" title=\"Btinternet Email Account Phishing Scam\" href=\"http:\/\/www.hoax-slayer.com\/bt-yahoo-email-phishing-scam.shtml\">ongoing<\/a> \u00a0and have targeted users of all \u00a0major email providers. Do not open links or attachments in any unsolicited email that claims that you must verify or confirm your account details. \u00a0Some variants \u00a0of these scams ask recipients to reply to the message with their username and password. Genuine service providers are very unlikely to request sensitive personal information from users in such a manner.<\/p>\n<p>It is always safest to login your online accounts by entering the service&#8217;s web address into your browser&#8217;s address bar rather than by clicking an email link.<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- Third Content Ad Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1909104632\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<div align=\"center\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block;\" data-ad-client=\"ca-pub-0355887770822260\" data-ad-slot=\"1358951439\" data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/bt-yahoo-final-warning-phishing-scam\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/bt-yahoo-final-warning-phishing-scam\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Outline Message purporting to be a &#8220;Final Warning&#8221; from BT Yahoo claims that users must immediately click a link to verify their account before they can receive pending emails. Brief Analysis The message is not from BT Yahoo. The message is a phishing scam designed to trick recipients into disclosing their email login details to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/1114"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1114"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/1114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}