2
Charity or Chicanery? This has been a year filled with natural disasters – tornadoes, earthquakes, droughts, wildfires, and floods. The devastation to lives and property has been overwhelming and makes us want to help the victims, frequently through donations of money. But be careful: the Federal Internet Crime Complaint Center (IC3) has issued an alert warning you that bad times frequently bring out bad people. When you make a donation to a charity, be sure to protect yourself by following these straightforward guidelines: Never respond to unsolicited email. Delete it. Be skeptical of people representing themselves as officials using email to solicit for donations. Never click on a link in an unsolicited email. Be cautious of email claiming to contain pictures in attachments. The attachments might contain viruses. Donate directly to known charities. If you are not familiar with a particular charity, the Internet can provide a wealth of information. By using this easy strategy, you can ensure that your hard-earned dollars are going exactly where you want them to go. Fall 2008 When U.S. legislators ratified the Anti-Spam Act of 2003, there was a notable exclusion – political candidates are still allowed to solicit contributions via email. This is a mixed blessing. It allows political candidates to quickly reach millions of potential contributors, but it also provides a golden opportunity for phishers. During the 2000 presidential election, phishing was still in its infancy and its impact was minimal. Then in 2004, phishers targeted the Kerry-Edwards campaign because they were actively using the Internet to communicate. One of the known attacks was an email directing people to a phony website soliciting donations. Many people willingly provided credit card and other personal information thinking that they were supporting their chosen candidate. In another scam, an email requested that the recipient call a specific 900 number to discuss the issues. Those who called the number were billed at $1.99 per minute. Neither perpetrator was caught. Now phishing attacks have gained momentum and the 2008 presidential campaign is a well-stocked phishing pond! Here are some common sense suggestions to make sure your money goes where you want it to. 1. If you receive an email soliciting a donation, do a little research before responding. Both candidates and phishers are counting on your impulsiveness. 2. Do not click on any link in the email or view any attachments. The safest action is to contact local campaign headquarters by telephone or in person. They can give you the official campaign website address. 3. Be aware that there are “sounds like” web URLs that can be used for phishing expeditions, so make sure you repeat the website address back to verify it. 4. Keep in mind that you should contact them. Do not respond to an unsolicited telephone request for a campaign contribution. Unsolicited calls can be vishing attacks! The election promises to be an exciting one and we encourage your participation – just do it in a way that protects your personal finances and information! Phishing on the Campaign Trail Protecting yourself against phishing attacks is really quite simple. 1. Make a call to verify information. Make sure you use the phone number in your rolodex, not one provided in a suspicious email. 2. Type it yourself. Don’t just click on a link or cut and paste it onto your browser. Type your trusted URL yourself and you’ll get to the real destination. 3. Beef up your security. There’s no good reason not to have anti-virus, anti-spam, and spyware detection on your computer. There are inexpensive software bundles available and even free programs you can download from the Internet. 4. Read your bank and credit card statements. Take a quick scan of your statements as soon as they arrive. If you see something suspicious, it’s much better to check it out sooner rather than later. 5. Recognize the Sharks. Visit the Maine Anti-Phishing Coalition website at www.noPhishing.org for the latest information on phishing attacks and links to helpful resources. Five Easy Pieces (of advice) The Official Newsletter of noPhishing.org

Phishing on the Campaign Trail

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Phishing on the Campaign Trail

Charityor Chicanery?

Thishasbeenayearfilledwith

naturaldisasters–tornadoes,

earthquakes,droughts,wildfires,

andfloods.Thedevastationto

livesandpropertyhasbeen

overwhelmingandmakesuswant

tohelpthevictims,frequently

throughdonationsofmoney.

Butbecareful:theFederalInternet

CrimeComplaintCenter(IC3)has

issuedanalertwarningyouthatbad

timesfrequentlybringoutbadpeople.

Whenyoumakeadonationtoacharity,

besuretoprotectyourselfbyfollowing

thesestraightforwardguidelines:

•Neverrespondtounsolicitedemail.

Deleteit.

•Beskepticalofpeoplerepresenting

themselvesasofficialsusingemail

tosolicitfordonations.

•Neverclickonalinkinan

unsolicitedemail.

•Becautiousofemailclaiming

tocontainpicturesinattachments.

Theattachmentsmight

containviruses.

•Donatedirectlytoknowncharities.

Ifyouarenotfamiliarwitha

particularcharity,theInternet

canprovideawealthofinformation.

Byusingthiseasystrategy,you

canensurethatyourhard-earned

dollarsaregoingexactlywhere

youwantthemtogo.

Fall2008

WhenU.S.legislatorsratifiedtheAnti-Spam

Actof2003,therewasanotableexclusion–

politicalcandidatesarestillallowedto

solicitcontributionsviaemail.Thisisa

mixedblessing.Itallowspolitical

candidatestoquicklyreachmillionsof

potentialcontributors,butitalsoprovides

agoldenopportunityforphishers.

Duringthe2000presidentialelection,phishing

wasstillinitsinfancyanditsimpactwas

minimal.Thenin2004,phisherstargetedthe

Kerry-Edwardscampaignbecausetheywere

activelyusingtheInternettocommunicate.

Oneoftheknownattackswasanemail

directingpeopletoaphonywebsitesoliciting

donations.Manypeoplewillinglyprovided

creditcardandotherpersonalinformation

thinkingthattheyweresupportingtheir

chosencandidate.

Inanotherscam,anemailrequestedthat

therecipientcallaspecific900numberto

discusstheissues.Thosewhocalledthe

numberwerebilledat$1.99perminute.

Neitherperpetratorwascaught.

Nowphishingattackshavegainedmomentum

andthe2008presidentialcampaignisa

well-stockedphishingpond!Herearesome

commonsensesuggestionstomakesure

yourmoneygoeswhereyouwantitto.

1. Ifyoureceiveanemailsolicitingadonation,doalittleresearchbeforeresponding.Bothcandidatesandphishersarecountingonyourimpulsiveness.

2.Donotclickonanylinkintheemailorviewanyattachments.Thesafestactionistocontactlocalcampaignheadquartersbytelephoneorinperson.Theycangiveyoutheofficialcampaignwebsiteaddress.

3.Beawarethatthereare“soundslike”webURLsthatcanbeusedforphishingexpeditions,somakesureyourepeatthewebsiteaddressbacktoverifyit.

4.Keepinmindthatyoushouldcontactthem.Donotrespondtoanunsolicitedtelephonerequestforacampaigncontribution.Unsolicitedcallscanbevishingattacks!

Theelectionpromisestobeanexcitingone

andweencourageyourparticipation–just

doitinawaythatprotectsyourpersonal

financesandinformation!

PhishingontheCampaignTrail

Protectingyourselfagainstphishingattacksisreallyquitesimple.

1. Make a call to verify information.Makesureyouusethephonenumberinyour

rolodex,notoneprovidedinasuspiciousemail.

2. Type it yourself. Don’tjustclickonalinkorcutandpasteitontoyourbrowser.

TypeyourtrustedURLyourselfandyou’llgettotherealdestination.

3. Beef up your security. There’snogoodreasonnottohaveanti-virus,anti-spam,and

spywaredetectiononyourcomputer.Thereareinexpensivesoftwarebundlesavailable

andevenfreeprogramsyoucandownloadfromtheInternet.

4. Read your bank and credit card statements. Takeaquickscanofyourstatements

assoonastheyarrive.Ifyouseesomethingsuspicious,it’smuchbettertocheckitout

soonerratherthanlater.

5. Recognize the Sharks. VisittheMaineAnti-PhishingCoalitionwebsiteatwww.noPhishing.org

forthelatestinformationonphishingattacksandlinkstohelpfulresources.

FiveEasyPieces(ofadvice)

TheOfficialNewsletterofnoPhishing.org

MEAPC.3120-13.noPhishingNewsletterIII v3.indd 1 8/15/08 3:13:37 PM

Page 2: Phishing on the Campaign Trail

W H AT TO D O I F yO U S U S P EC T yO U ’ V E

• Immediately notify your bank.

Bepreparedtoprovidethebank

withasmuchinformationaspossible.

Theymayrequestthatyouforwardthem

thephishingemail.

• Place a fraud alert on your credit report

bycontactinganyofthethreeconsumer

creditbureausbelow.

– Equifax:1-800-525-6285;

www.equifax.com;P.O.Box740241,

Atlanta,GA30374-0241

– Experian:1-888-EXPERIAN

(397-3742);www.experian.com;

P.O.Box9532,Allen,TX75013

– TransUnion:1-800-680-7289;

www.transunion.com;FraudVictim

AssistanceDivision,P.O.Box6790,

Fullerton,CA92834-6790

Contactingoneofthesecompanies

automaticallyalertstheothertwo,who

willalsoplaceanalertintheirrecords.

Whenyoucall,aninitial90-dayfraudalert

willbeplacedonyourcreditreportanda

freecopyofyourreportwillbesenttoyou.

Thefraudalertpreventsanynewaccounts

frombeingopenedinyournamewithout

permission.Aftertheinitialfraudalerthas

expired,ifyou’vefiledapolicereportyou

canrequestanextended7-yearfraudalert.

Toobtainanextendedfraudalert,youmust

providethecreditbureauswithacopyof

yourinitialpolicereportandanyother

fraudreportstheymayrequire.

AsofFebruary,2006,Mainebecameone

ofseveralstatestoallowconsumersto

“freeze”theircreditreports.Withcertain

specificexceptions,asecurityfreeze

prohibitsacreditbureaufromreleasing

yourcreditreportoranyinformation

fromitwithoutyourexpressauthorization.

Thefreezegoesintoeffectfivebusiness

daysafterthecreditbureauhasreceived

yourletter.Aftertenbusinessdaysfrom

receivingyourlettertoplaceafreezeon

youraccount,thecreditbureauwillsend

youaconfirmationlettercontaininga

uniquePIN(personalidentificationnumber)

orpassword.KeepthisPINorpasswordin

asafeplace.Ifyourcreditfilesarefrozen,

evensomeonewhohasyournameand

SocialSecurityNumberprobablywould

notbeabletoobtaincreditinyourname.

Asecurityfreezeisfreetoidentity

theftvictimswhohaveapolicereport,

investigativereport,oracomplainttoa

lawenforcementagencyconcerning

identitytheft.

Toplaceafreeze,youmustwritetoeach

ofthethreecreditbureaus.Creditbureaus

chargea$10fee,unlessyouareavictim

whosendsacopyofyourpolicereport,

investigativereport,oracomplainttoa

lawenforcementagencyconcerning

identitytheft.

Here’swhatelseyoushoulddo:

• File a reportwithlocallawenforcement.

• Review credit card or bank statements

tomakecertainallactivitywaslegitimate.

• Formoreinformationonidentitytheft,

visittheFTCIdentityTheftwebsite.

http://www.ftc.gov/bcp/edu/microsites/

idtheft

Protect yourself!

Thiscomprehensivewebsitehasa

wealthofusefulinformationtargeted

atprotectingyouandyourpersonal

informationfromphishingattacksand

identitytheft.Itincludescommonsense

suggestionsonhowtobestprotect

yourconfidentialinformation,

up-to-datereportsofscams,whatto

doifyouthinkyourinformationhas

beencompromised,andlinkstoseveral

otherhelpfulwebsites.There’sevena

fungamecalled“PhishingScams—

AvoidtheBait”whichtestsyourability

torecognizeaphishingattempt.

SponsoredbytheMaineAnti-Phishing

Coalition(MEAPC),thewebsitestrives

toprovidetimelyandusefultopics

foryourfinancialandcybersecurity.

Memberbanksworktogetherto

maintainthesiteandtocreateposters,

newsletters,andseminarsdedicatedto

increasingyourawarenessoftechniques

usedinphishingandotherscams.

Pleaseinvestafewmomentsofyour

timeexploringwww.noPhishing.org.

Itwillbetimewellspent.

B E E N P H I S H E D

ParticipatingBanksintheMaineAnti-PhishingCoalition

MEAPC.3120-13.noPhishingNewsletterIII v3.indd 2 8/15/08 3:13:43 PM