GeronBook/Ch3/datasets/spam/easy_ham/00153.2ba33aef8f6b3010c92db...

175 lines
7.1 KiB
Plaintext

From sentto-2242572-56009-1034075149-zzzz=spamassassin.taint.org@returns.groups.yahoo.com Tue Oct 8 12:27:16 2002
Return-Path: <sentto-2242572-56009-1034075149-zzzz=spamassassin.taint.org@returns.groups.yahoo.com>
Delivered-To: zzzz@localhost.spamassassin.taint.org
Received: from localhost (jalapeno [127.0.0.1])
by spamassassin.taint.org (Postfix) with ESMTP id 731DF16F03
for <zzzz@localhost>; Tue, 8 Oct 2002 12:27:15 +0100 (IST)
Received: from jalapeno [127.0.0.1]
by localhost with IMAP (fetchmail-5.9.0)
for zzzz@localhost (single-drop); Tue, 08 Oct 2002 12:27:15 +0100 (IST)
Received: from n20.grp.scd.yahoo.com (n20.grp.scd.yahoo.com
[66.218.66.76]) by dogma.slashnull.org (8.11.6/8.11.6) with SMTP id
g98B5CK12365 for <zzzz@spamassassin.taint.org>; Tue, 8 Oct 2002 12:05:12 +0100
X-Egroups-Return: sentto-2242572-56009-1034075149-zzzz=spamassassin.taint.org@returns.groups.yahoo.com
Received: from [66.218.67.201] by n20.grp.scd.yahoo.com with NNFMP;
08 Oct 2002 11:05:52 -0000
X-Sender: martin@srv0.ems.ed.ac.uk
X-Apparently-To: zzzzteana@yahoogroups.com
Received: (EGP: mail-8_2_2_0); 8 Oct 2002 11:05:49 -0000
Received: (qmail 41834 invoked from network); 8 Oct 2002 11:04:02 -0000
Received: from unknown (66.218.66.216) by m9.grp.scd.yahoo.com with QMQP;
8 Oct 2002 11:04:02 -0000
Received: from unknown (HELO haymarket.ed.ac.uk) (129.215.128.53) by
mta1.grp.scd.yahoo.com with SMTP; 8 Oct 2002 11:04:03 -0000
Received: from srv0.ems.ed.ac.uk (srv0.ems.ed.ac.uk [129.215.117.0]) by
haymarket.ed.ac.uk (8.11.6/8.11.6) with ESMTP id g98B42304365 for
<forteana@yahoogroups.com>; Tue, 8 Oct 2002 12:04:02 +0100 (BST)
Received: from EMS-SRV0/SpoolDir by srv0.ems.ed.ac.uk (Mercury 1.44);
8 Oct 02 12:04:01 +0000
Received: from SpoolDir by EMS-SRV0 (Mercury 1.44); 8 Oct 02 12:03:56 +0000
Organization: Management School
To: zzzzteana@yahoogroups.com
Message-Id: <3DA2C9B0.1469.5C8ED72@localhost>
Priority: normal
X-Mailer: Pegasus Mail for Windows (v4.01)
Content-Description: Mail message body
From: "Martin Adamson" <martin@srv0.ems.ed.ac.uk>
MIME-Version: 1.0
Mailing-List: list zzzzteana@yahoogroups.com; contact
forteana-owner@yahoogroups.com
Delivered-To: mailing list zzzzteana@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:zzzzteana-unsubscribe@yahoogroups.com>
Date: Tue, 8 Oct 2002 12:03:55 +0100
Subject: [zzzzteana] Fake bank website cons victims
Reply-To: zzzzteana@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
>>From the BBC website - www.bbc.co.uk
Tuesday, 8 October, 2002, 09:43 GMT 10:43 UK
Fake bank website cons victims
West African criminals have used a fake version of a British bank's online
service to milk victims of cash, say police. The fake site was used to squeeze
more money out of people they had already hooked.
The site has been shut down. But UK National Criminal Intelligence Service,
(NCIS), said at least two Canadians had lost more than $100,000 after being
taken in by the fake website.
The scam behind the fake web domain was the familiar one that offers people a
share of the huge sums of money they need moved out of various African
nations.
NCIS said the use of the web was helping the conmen hook victims that would
otherwise spot the scam.
Convincing site
News of this latest scam was revealed by BBC Radio5Live. It found that an
unclaimed web domain of a UK bank had been used by conmen to get more cash out
their victims.
A NCIS spokesman said the domain looked legitimate because it had "the" in
front of the bank's name.
"I have seen the microsite myself and it's very sophisticated," said the NCIS
spokesman. "It's very convincing especially to people not very experienced
online."
Once the con was discovered it was quickly shut down. However, the people
behind it have not been caught.
NCIS does know that at least two people have lost more than $100,000.
The bank involved has bought up the domain used in the con as well as many
other permutations of its name to limit the chance it could happen again.
Domain games
Usually people are first hooked in to what has become known as Advanced Fee or
419 fraud by replying to an unsolicited fax or e-mail offering a share of any
cash successfully moved out of Africa.
The '419' refers to the part of the Nigerian penal code dealing with such
crimes.
Like any con, there is no money to be moved at all and instead anyone taking
the bait is asked to pay increasingly large sums to supposedly bribe
uncooperative officials and to smooth the passage of the cash.
Although this con has been practiced for years, people still fall victim to
it.
NCIS estimates that up to five Americans are sitting in hotel lobbies in
London everyday waiting to meet people connected with this con.
Cutting edge fraud
Often the conmen provide fake banking certificates to give the con an air of
legitimacy.
People tricked into clicking on fake sites
But a spokesman for NCIS said fake or spoof websites are now being used in
place of the certificates.
"To many people nowadays the cutting edge of banking technology is web
technology," said the spokesman.
One of the first groups of conmen to use this method set up a fake website
that supposedly gave victims access to accounts held at the South African
Reserve Bank, the country's national bank.
Typically, victims are given a login name and password and are encouraged to
visit the site so they can see that the cash they are getting a share of has
been deposited in their name.
But before they can get their hands on the cash, the victims are typically
asked to hand over more of their own money to help the transfer go ahead.
Once the South African police discovered the ruse they declared it a national
priority crime and soon arrested the 18 people behind it.
Modern gloss
An briefing paper prepared by NCIS in August on organised crime noted that
criminals were increasingly turning to the web to lure new victims and give
old cons a modern gloss.
The NCIS spokesman urged people who have fallen victim to 419 fraud to come
forward and help it track down the perpetrators. He said in the last two
months it had arrested 24 people overseas involved with this type of fraud.
He said any e-mail, fax or letter making an offer that looks to good too be
true, undoubtedly is.
One of the first companies to fall victim to website spoofing was net payment
service Paypal.
Conmen set up a fake site and asked people to visit and re-enter their account
and credit card details because Paypal had lost the information.
The website link included in the e-mail looked legitimate but in fact directed
people to a fake domain that gathered details for the conmen's personal use.
------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sell a Home for Top $
http://us.click.yahoo.com/RrPZMC/jTmEAA/MVfIAA/7gSolB/TM
---------------------------------------------------------------------~->
To unsubscribe from this group, send an email to:
forteana-unsubscribe@egroups.com
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/