{"id":189,"date":"2019-04-06T19:33:16","date_gmt":"2019-04-06T19:33:16","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=189"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"'Confirm-UCount-Reward-Points'-Phishing-Scam-Email","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=189","title":{"rendered":"&#8216;Confirm UCount Reward Points&#8217; Phishing Scam Email"},"content":{"rendered":"<div>\n<p><span style=\"color: #ff0000;\"><strong>Outline:<\/strong><\/span><br \/>\nEmail claims that you have accumulated \u00a0over R8,500 in UCount Reward points and should therefore open an attached file to confirm a redemption request for your points.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Brief Analysis:<\/strong><\/span><br \/>\nUCount is a \u00a0rewards programme offered by South Africa&#8217;s Standard Bank. However, this email is not from Standard Bank. Instead it is a phishing scam designed to steal your bank account login details via a fraudulent webpage made \u00a0to look like \u00a0a Standard Bank website.<\/p>\n<div class=\"example\"><span style=\"color: #ff0000;\"><b>Example:<\/b><\/span><br \/>\nSubject: Confirm UCount reward points<\/div>\n<div class=\"example\"><\/div>\n<div class=\"example\">Your reward points from shopping have accumulated over R8,500.<br \/>\nPlease check copy below to confirm redemption request.<br \/>\nOnline Ucount.Processing<\/div>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HSNet Article Center --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"5727909035\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Detailed Analysis:<\/strong><\/span><br \/>\nAccording to this email, your UCount reward points from shopping have accumulated over \u00a0R8,500. The email asks you to open an attached file to confirm a redemption request for the accumulated points.<\/p>\n<p>UCount is a rewards programme offered by South Africa&#8217;s Standard Bank. The programme allows you to collect \u00a0reward points while shopping with a Standard Bank card.<\/p>\n<p>However, this email is not from Standard Bank and the attached file does not allow you to redeem your UCount reward points as claimed. Instead, it is a <a title=\"Phishing Scams - Anti-Phishing Information\" href=\"http:\/\/www.hoax-slayer.com\/phisher-scams.html\">phishing scam<\/a> designed to steal your bank account login details. If you click the attachment, a fraudulent bank login form will open in your default browser.  \u00a0The form is on a webpage that has been designed to closely emulate the genuine Standard Bank website. If you login on the fake webpage, your username and password can then be collected by criminals and used to hijack your Standard Bank account.<\/p>\n<p>The bank has published the following alert on its login page to warn customers about the scam:<\/p>\n<blockquote>\n<p><em>Important security alert! Standard Bank will never ask you to access your UCount Rewards account through a link in an email. Don&#8217;t fall victim to fraud!<\/em><\/p>\n<\/blockquote>\n<p>There have been several variations of this scam. If you receive one of these emails, do not click any links or open any attachments that it contains.<\/p>\n<p>Standard Bank has <a title=\"Standard Bank - Phishing Information\" href=\"http:\/\/www.securitycentre.standardbank.co.za\/Scams\/Phishing.aspx\">published information about such phishing scams<\/a> on its website.<\/p>\n<div align=\"center\">\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1358951439\"\n     data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p><a href=\"http:\/\/hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1.jpg\" data-rel=\"penci-gallery-image-content\"  rel=\"attachment wp-att-1248\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1248\" data-permalink=\"https:\/\/www.hoax-slayer.net\/confirm-ucount-reward-points-phishing-scam-email\/password-phishing-scam-screen-1\/\" data-orig-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1.jpg\" data-orig-size=\"800,386\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"password-phishing-scam-screen-1\" data-image-description=\"\" data-medium-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1-300x145.jpg\" data-large-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1.jpg\" class=\"aligncenter size-full wp-image-1248\" src=\"https:\/\/hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1.jpg\" alt=\"Password Phishing Scam\" width=\"800\" height=\"386\" srcset=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1.jpg 800w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1-300x145.jpg 300w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/03\/password-phishing-scam-screen-1-768x371.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p class=\"date\">Last updated: March 16, 2016<br \/>\nFirst published: March 16, 2016<br \/>\nBy Brett M. Christensen<br \/>\n<a class=\"foot\" href=\"http:\/\/www.hoax-slayer.com\/about.shtml\">About Hoax-Slayer<\/a><\/p>\n<p class=\"ref\">References<br \/>\n<a title=\"Phishing Scams - Anti-Phishing Information\" href=\"http:\/\/www.hoax-slayer.com\/phisher-scams.html\">Phishing Scams &#8211; Anti-Phishing Information<\/a><br \/>\n<a title=\"Standard Bank - Phishing Information\" href=\"http:\/\/www.securitycentre.standardbank.co.za\/Scams\/Phishing.aspx\">Standard Bank &#8211; Phishing Information<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/confirm-ucount-reward-points-phishing-scam-email\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/confirm-ucount-reward-points-phishing-scam-email\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Outline: Email claims that you have accumulated \u00a0over R8,500 in UCount Reward points and should therefore open an attached file to confirm a redemption request for your points. Brief Analysis: UCount is a \u00a0rewards programme offered by South Africa&#8217;s Standard Bank. However, this email is not from Standard Bank. Instead it is a phishing scam [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/189"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=189"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/189\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}