Better Business Bureau warns of phishing scam
The scam urges users to download a file that may be a computer virus
Computerworld - The Better Business Bureau is warning of a spoofing scam that uses its name and a phony e-mail that urges recipients to click a hyperlink that could download a computer virus.
The BBB system, which has 129 branches, said that a company from Kennesaw, Ga., had its computer system hacked Monday night and that the company's computers were generating thousands of counterfeit messages to businesses and consumers, purporting to be a complaint filed with the BBB against the recipient.
The incident was first reported to the BBB branch that serves the Columbus, Ga., area by one of its members, according to the alert. The spoofed e-mails were sent to thousands of businesses in the U.S. and Canada.
According to the BBB, the e-mail has a false return address of firstname.lastname@example.org and a phishing hyperlink citing a BBB complaint case number, such as "DOCUMENTS FOR CASE #263621205." But the links direct users to a fake Web site that asks users to download documents related to the complaint. The BBB said the download is an executable file that could be a computer virus. The phishing e-mail return address of email@example.com does not exist, the BBB said in the alert.
An example of the false e-mail message is also provided on the BBB Web site.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts