I have advice - use google. http://hellopeter.com/skyline-global-so … in-1227675 but that is one review. It could just as easily be a bad news employee, trying to get at a company because he's useless and needs someone to blame. Search for yourself and decide.
Ahmed Bakran with Skyline Global Solutions in Pennsylvania
Mary Versteeg>firstname.lastname@example.org<- 2009-11-06I was offered a position to teach in Saudi Arabia by this agent. His company name is Skyline Global solutions, the website is www.globaltechsolutions.com. Has anyone had experience with him. He says he recruits teachers from the US, Canada, and Britain to work in Saudi Arabian universities as ESL teachers.Tell a FriendREPLYView All - [To view all the posts in this thread at once click this link]Messages In This ThreadAhmed Bakran with Skyline Global Solutions in Pennsylvania -- Mary Versteeg -- 2009-11-06Re Ahmed Bakran with Skyline Global Solutions in Pennsylvania-- Arianna -- 2010-06-26Re Ahmed Bakran with Skyline Global Solutions in Pennsylvania-- John -- 2010-12-16Re Ahmed Bakran with Skyline Global Solutions in Pennsylvania-- Matthew -- 2011-02-09Re Ahmed Bakran with Skyline Global Solutions in Pennsylvania-- Geoff -- 2011-02-09Re Ahmed Bakran with Skyline Global Solutions in Pennsylvania-- Lisa -- 2011-02-12
Job Discussion Forums :: View topic
leez Joined: 05 Jun 2009 Posts: 115 Location: wait until next week...yes, of course the embassy is closed on monday! Posted: Sat Aug 01, 2009 4:18 pm Post subject:
Scam Jobs - MLM Sports Marketing
UPDATE: Because of this post The Landers Group was forced out of business (or at least has changed names). Our original intent was to shed light on the practices that The Landers Group used, but this post has evolved into a fabulous resource for helping job seekers avoid hiring scams. The tactics that these Multi-Level Marketing companies use are typically the same, so read through the post and check the 200+ comments section to get the latest names these firms are using. This should help you determine whether the company that you’re about to interview with is a scam or not. And if you’re looking for legit entry level jobs, browse around the site—you’ve come to the right place. One Day, One Job is about helping college students find great entry-level jobs. We’ve always taken this literally by featuring companies that look like great places to work (we can’t ever be 100% on this, but we do our best). Well, a big part of finding a great first job is avoiding the not so great (or really awful) jobs that are out there, so, today, we are going to look at a company called The Landers Group, which has been identified as a scam by people online and in the media. As it gets later in the post-graduation job hunting season, many new grads become desperate. It makes them easy prey for employment scams like those peddled by The Landers Group. I’m Smart, I Don’t Fall for ScamsYeah, that’s what suckers say. How do we know that smart people fall for these scams? We’ve seen it happen. One of my friends is a freshman at an Ivy League school. He was torn between getting a summer job or an internship, so he was looking at all kinds of options. He told me that he had landed an interview with a really cool sports marketing company. Being a reader of One Day, One Internship, he knew to contact us with questions on how to research a potential employer. He had already scheduled an interview with the company for when he returned home, but he sent us the name of the company (The Landers Group) so that we could tell him a little bit more about it. Within seconds we found a number of Google results that indicated he was in for a learning experience (but not the kind you want to get out of your internship). Our friend is a smart kid. He’s proactive and trying to get a Summer internship even though he’s only a freshman. He was about to get burned. Why You’ll Fall For ItWe’ve never had firsthand experience with The Landers Group or any other company that follows similar business practices, but we’ve found enough evidence through our research to indicate that any time spent in contact with one of these companies is wasted. You will usually find these jobs listed on major job boards with titles like “Sports and Entertainment Marketing – Entry Level Positions.” The job description will go into great detail about all of the wonderful things that await those who apply – excellent pay, travel opportunities, learning experiences, and quick advancement. Take a look at all of The Landers Group’s Job Postings on CareerBuilder. They’ll also brag about their amazing client list. From their website: One by one The Landers Group has added every major sports team in Southern California to its portfolio. No other advertising and marketing firm in the area can make the same claim… Our unparalleled portfolio includes the Los Angeles Dodgers, the LA Clippers, the LA Kings, the Anaheim Mighty Ducks, MLS’ Chivas USA, the UCLA Bruins, and also clients such as Crowne Plaza Resorts, Disneyland, and Sea World. Our unique grass-roots marketing approach has given our clients a valuable edge in the marketplace and it places them front and center in the public eye! Since it seems that Sports and Entertainment Marketing are extremely popular fields with college students, these job listings must get viewed thousands of times. Many of those who read the job descriptions get excited and apply. We don’t have a reference to back this up, but we’re going to guess that everyone who applies gets an interview. The “Interview” ProcessIt’s relatively likely that your “interview” with The Landers Group might be your first ever job interview. Whether you realize that something’s fishy depends on how perceptive you are. We’ve heard that their secretary will not refer to the company by name, probably because they operate under multiple names and don’t want you to realize it. Your first interview will most likely be informational, where they’ll continue the pitch that they started in the job posting. Any questions about what the company actually does or what their entry-level jobs are like will probably get a vague response. You’re also likely to hear, “You’ll have to see it to believe it.” Since scammers usually don’t turn away people, we’re going to guess that you’ll get asked back for a second interview too. The second interview is where you’ll really get to see The Landers Group in action. You will be tagging along with one of the company’s employees. The story usually goes that you end up in a sketchy car with a sketchy person going to a sketchy neighborhood. Once you get there, you find out what The Landers Group does. They sell coupons door to door. Remember that amazing client list? That’s whose coupons you will be selling. You’ll be given one side of the street, and the employee will take the other. You’ll essentially spend the day working for free. How do we know? We’ve found stories from people who have done it like thisand this. If you’re lucky, you’ll just end up having wasted a day. If you’re not, you may end up stranded many miles from homeor having had a gun pointed at you and with mud all over your only suit. How to Avoid Getting BurnedNow that you’ve read about The Landers Group, you will hopefully know to avoid these scams. If you’re not sure whether an employer is legitimate, use what we’ve taught you to do some employer research. Our articles How to Use Google to Find a Joband Turning the Tables: Digging Dirt on Employersare both excellent resources that will teach you what to need to know. And you can always trust us to help you fine real entry level opportunities in sports, entertainment, and marketing. Often, finding out the truth is as easy as doing a Google search with the company name and the word scam – here are the results for “The Landers Group scam.”Also, remember that these companies use major job boards as their main recruiting tool. Don’t think that because something is listed on Monster, Yahoo! HotJobs, or CareerBuilder it is legitimate – anyone can pay to post their jobs on these sites. Don’t forget that The Landers Group operates under a variety of names. There are also many other companies that use similar business practices to recruit unsuspecting college students into bum jobs. The stories are often different, but the end result is usually the same. Although The Landers Group is focused quite heavily on selling an actual product, some of these companies are even skeezier. Instead of selling, you’ll be doing their bidding by recruiting more suckers to work for you recruiting more suckers. In general these types of operations are known as Multi-Level Marketing (MLM)operations, and they should be avoided unless you are completely comfortable with what you’re getting into. Here’s a post from the Consumeriston other operations that are using tactics similar to those of The Landers Group. A List of Companies Known to Have Similar Practices The Landers GroupKelly AdvertisingGranton MarketingDS MaxAfter Five Marketing GroupDalton ManagementInnovageThis is by no means a comprehensive list. If you know of other companies that should be added, please leave a comment with the company’s name and a reference or personal story telling us why they should be included. Links to Help You Begin Your Research The Landers Group“Careers” at The Landers GroupThis was obviously a different kind of post for us. What do you think? Leave a comment. We love to hear feedback. If you’re still not sold on the fact that MLM “opportunities” aren’t worth your time, check out this in-depth articleon how they work and why you’ll end up wasting time and losing money.
8 warning signs of a job scam
By Kathy Kristof Updated on: September 26, 2014 / 7:45 AM/ MoneyWatch If you were hoping to get a flexible job or work-from-home position, there's never been a better time. The number of flexible and home-based jobs are soaring partly because companies have found that they can save money and hire better workers by giving them the ability to set their own hours or work remotely. Experts at job search sites report that they're seeing a massive rise in demand for everything from minimum-wage call center employees to part-time professionals, who can command generous salaries. "The customer service and call-center segment is growing exponentially," says Christine Durst, co-founder of RatRaceRebellion.com. "We are also seeing a big rise in telecommuting positions from big insurance companies like United Heath, Aetna and Travelers." Adds Sara Sutton Fell, founder of FlexJobs.com: "In the past, freelance jobs were typically associated with vertical careers such as writing, graphic design and software development, but now you can find freelance work in very surprising -- and often high-level -- roles, such as law and medicine." A number of factors are fueling the trend. As older managers "who got sweaty palmed" about work from home arrangements retire, they're being replaced by a generation of workers more comfortable with flexible working arrangements, says Durst. Technology is also better, making communication -- and tracking employee availability and productivity -- far simpler than it was in the past. Companies also started experimenting with work-from-home arrangements as a way to prepare for disasters, such as terror attacks and severe weather, a few years ago and were surprised to discover that their telecommuters were every bit as productive as the office-based employees, she adds. The arrangements also save companies money. Global Workplace Analytics estimates that companies save an average of $10,000 per employee on office space, absenteeism and reduced turnover when they allow workers to telecommute. The bad news? For every one legitimate job that's available, there are at least 60 scams, experts contend. And it's not just rubes who get conned. "I would like to say that reasonable people don't get caught, but that's not the case," Durst says. "Very smart people sometimes just have a moment of weakness." Con artists also are getting sneakier and more skilled, says Fell. In one recent case, scammers managed to mimic the site of a real employer, for instance. Because the design and domain name was so similar to the real company site, job applicants had their guard down. When the bogus employer said new hires had to pay to get the company's work-at-home software, but would be reimbursed in their first paycheck, they shelled out $400 each. Needless to say, once the applicant paid up, neither the software nor the job materialized. Other scammers bank on the applicant's forgetfulness, she adds. Realizing that many people apply for hundreds of jobs at a time, one email scam says: "Thank you for your application. You look like a qualified candidate. We need you to fill out this second set of applications to go to the next level." At this stage, applicants may not have any idea what the job is or who is inquiring, but they assume it's a response to their application. So they blindly click on a link in the email and provide potentially damaging personal data to the crook. Fell suggests that applicants never send out more than 10 resumes at a time, so they can keep track of all the places they've applied. If a response is coming from someone you can't identify, get more information before giving any. "A number of the scams are really savvy and subtle," says Fell. "If you weren't paying close attention, it would be really easy to fall for them." What are the warning signs of a flexible-work scam? Few details: Real job postings include lots of detail about the actual job, the skills required and the title. If a job is short on requirements -- from hours and duties to the kind of skill required -- but talks repeatedly about the flexible nature of the work, consider it a red flag. High pay/low effort: Listen to your gut, says Durst. Is somebody really going to be offering you easy work and a flexible schedule for high pay? Promising that their "guaranteed system" will make you a mint, if you act now? Get real. Unless your skill set is in such high demand that you'd get as much or more from a brick-and-mortar position, a work-at-home opportunity isn't either. Burned applicants: Before applying for an online opportunity, type in the name of the company and "scam," suggests Fell. If it's one of the many bogus jobs, you'll quickly find web-based complaints. Durst also likes work-at-home forums, such as those at wahm.com and workplacelikehome.com. She suggests that anyone serious about finding good opportunities, register at these sites and just lurk in the forums to find out what other people are complaining about. "Hell hath no fury like a woman scammed," she says. "If somebody's been burned, they're going to tell you about it in no uncertain terms." Upfront cash: Real jobs pay you. You don't pay the employer. Unless you're buying a franchise (and that's another story altogether), you should not have to pay to get paid. Don't be fooled by slick claims, testimonials or "guaranteed programs" designed to make you rich. If they're asking for money in advance to get a job, they're likely to be crooks. (This is distinct from job search sites, including FlexJobs, that charge for membership as a way of providing an advertising-free site.) Too much information: Though most work-at-home scams seek cash payments from victims, a few appear to be going after the personal information that could make you a target of identity theft. You don't need to put your Social Security number or driver's license number on a job application. If the application asks for those identifying numbers or for a credit card number, back away. Anonymous emails: If you're dealing with a human resources manager at a particular company, their email address should be coming from the company's domain name, not an anonymous domain like Gmail, Yahoo or AT&T. Unprofessional communication: Job postings and email communications with multiple exclamation marks, misspellings and grammatical errors are also likely to be scams. Over payments: One of the pervasive mystery shopper scams provides big up-front checks to mystery shoppers, who are instructed to deposit the money in their own bank accounts; use what they need to buy an inexpensive product and pay themselves a fee. The mystery shopper is then told to wire the remaining funds back to the "employer." In reality, the check the scammer gave you is a forgery. But it may be a good enough fake to keep your bank guessing past the point when banking rules require that they "provisionally" provide the funds. What does that mean? It will look like the check cleared. But the bank will debit your account later if the check is a fake -- and that could happen weeks after you've spent the money. You're on the hook for the cost of the purchased products, whatever amount you refunded to the crook, as well as any overdraft fees that the fake check caused. First published on September 26, 2014 © 2014 CBS Interactive Inc.. All Rights Reserved.
Scammers’ delivery service: exclusively dangerous
ContentsWell-known companies and brands are favorite targets for fraudsters. After all, it is much easier to get people’s attention with the use of a popular name, so scammers have more chance of trapping a gullible user. In this article, we will analyze phishing and malicious emails sent by fraudsters that claim to come from international delivery services. The most popular of these are DHL (Germany), FedEx and United Parcel Service (USA), TNT (Netherlands). All of these companies are international, with millions of customers using branches in major countries all over the world. They provide similar services, so scammers use the same methods and techniques in their fraudulent mails. The phishers’ goals include: Theft of confidential data (bank card credentials, logins and passwords from personal accounts), mainly with the help of fake web pages imitating official pages of the site. In a phishing attack users provides the fraudsters with their personal data by filling the fields on fake sites or sending them via email.Installing various malicious programs on users’ computers. These programs are used not only to monitor user online activity and steal personal information, but also to organize botnets to distribute spam and launch DDoS attacks.Headings of fraudulent emailsThe From fieldStructurally, the address in the From field looks like this: Sender Name . To confuse recipients, scammers can change parts of the address and often make it look very similar to an official address of the delivery service. There are several groups of email addresses seen in fraudulent emails: Email addresses which closely resemble companies’ legitimate public addresses. Generally, they use the name of the company (DHL INC, TNT COURIER SERVICE, Fedex, etc.) as the sender name. The name of the mailbox often includes the words info, service, noreply, mail, support which are typical of email addresses used to send official notifications. The server domain name often has a real or very plausible company domain. Addresses which do not resemble legitimate company addresses. The sender name still reflects the company name (FedEx, DHL Service, FedEx.com) but the domain name usually belongs to a free email service or an absolutely different company. The email address could be taken from a real user (taken from public sources or hacked mailboxes) or automatically generated addresses. The latter usually appear as a random sequence of letters, words and numbers. Addresses that resemble e-mail addresses of company employees. The sender name may contain the name and surname of a supposed employee, or the company name, or a position (courier, manager, etc). The name of the email box usually contains the same name and surname as the sender name because any difference in the data may alert the recipient to a fraudulent email. Either the real company domain or other domains not related to delivery companies might be used as a domain name. Addresses which only indicate the sender’s address without a name. While analyzing sender address, remember that scammers do not need to hack the company servers to use the real company domain in the From field. They can simply insert the necessary domain name of the server into the From field. The Subject fieldThe subject of the fraudulent mail should capture the imagination of recipients and encourage them to open the message, but it also needs to be plausible. Therefore spammers choose common phrases typical of official notifications from delivery services. After sending a parcel or a document, customers worry about its successful delivery and try to follow its progress by reading any notification from a delivery service. The most popular subjects are: Subjects related to the delivery/shipment (shipment notifications, delivery status, shipping confirmation, shipment documents, delivery information, etc.).Examples: Subjects related to tracking shipments, order information and invoices (the tracking number of the shipment, tracking the shipment, etc.).Examples: Subjects related to notifications about messages and accounts (creation and confirmation of accounts, new messages, etc.). The design of the emailScammers pay special attention to the design of the email. Their main goal is to make message as believable as possible. After all, if it looks suspicious, a potential victim will most likely delete it despite the attractive subject and plausible sender address. Let’s analyze the basic techniques that fraudsters use to make emails look legitimate. Graphic designAll major international companies have their own corporate style, including wordmarks, graphic trademarks, corporate fonts, slogans and color schemes. These are used on the official website, in mailings and commercials, and in other design components. Scammers use at least some of these elements when designing fraudulent emails to make them look convincing. Usually phishers focus on logos because these elements are unique to each company and is an immediate identifying mark. Examples of DHL company logos used in fraudulent emails. Let’s take a closer look at these examples. It’s immediately obvious that the second example is very different from the company’s official logo. Another sign of a forgery is the difference in size between the false logo and the original, as seen in the fourth example where the logo takes almost a third of the message. Here the plan is probably to attract the reader’s attention with a large bright picture rather than plain text. That also explains why the phishing links appear in a larger font: users should respond to it immediately, without trying to read the small print. In the first example, the scammers are trying to copy the design from the official site (a very popular method). However the logo is placed on the right-hand side rather than on the left. Also they are using a color blend for the logo background rather than making it single-color. The logo in the third example most closely imitates the original DHL logo: the scammers have tried to match its size and design. It’s not really all that difficult to make a logo for a fake notification: there are plenty of versions of the original image available online in several formats, including vector graphics. In addition to the logo the fraudsters use the color spectrum chosen by the company in its official resources and mailings. For example, for DHL it is a combination of yellow and red. The text designIn most official emails we find a number of set phrases, especially when it comes to standard notifications generated and sent automatically. These messages often include contacts and links to the official resources of the sender. Therefore, to make the text of the fake email look like an original notification from a delivery service the fraudsters use: Standard phrases typical of official mass mailings: Please do not reply to this email, This is automatically generated email, please do not reply, All rights reserved, Diese Versendung ist automatisch, Bitte beantworten Sie diese nicht, This communication contains proprietary information and may be confidential. Questo e’ un email automatico, Si prega di non rispondere, etc. Links to the official page of the company. Not all links contained in the fraudulent email are phishing – spammers may also use the links which really lead to the official resources on order to make their emails look legitimate and bypass spam filtering. Contact for feedback. The fraudsters often indicate the contact information of the sender or the company (name, surname, position, office address). These contacts might be real or fictitious. The content of the emailWhen fraudsters send out fake emails convincing readers that it is a real message is only part of the battle. The next step is to persuade the potential victim to do what the scammer requires, such as providing personal information or installing a malicious file. This is where psychology comes into play, and the email content is the main tool. In fraudulent notifications allegedly sent on behalf of delivery services often use the following tricks: Notifications of various problems (eg. unsuccessful delivery, lack of information, wrong address, no recipient at the delivery address). These phrases are usually related to the delivery since the companies in question are in the service sector. Therefore, a logistics company warning of a problem with a delivery doesn’t prompt any suspicion, especially if the email contains some details of the situation. A demand to do something or face some consequence. For example, “collect your parcel within 5 days otherwise it will be returned to the sender”.The scammers use deadlines like this to make recipients react immediately. The phishers hope that users will be so worried about losing the parcel or paying extra costs that they won’t hesitate to provide personal details or open a suspicious attachment. Phrases about the content of an attachment or link (invoices, detailed information, documents).Users are unlikely to open unknown attachments or follow unknown links. That’s why scammers imitate official websites and present malware as a document with information a parcel. In addition, if the text of the notification states that the attachment contains, for example, a consignment document, the malicious archive will have a similar name, such as “consignment.zip.” This applies to phishing links as well – scammers name their links with an appropriate phrase from the text, such as “shipping information”. This simple trick is intended to reassure recipients that the attachment or link is perfectly legitimate. Phrases about the need to do something (follow a link, open an attachment, print out a file, etc.).Assuming the fraudsters have convinced the recipients that the email is real, the next step is to tell the victims how to solve their problems. Fulfilling these instructions is the ultimate goal of the fraudulent email. Here it is important for the scammers not just to tell recipients what they need to do, but to make them understand correctly what is written in the message. To avoid any misunderstanding on the part of the recipients, messages often contains detailed instructions about what to do. How the text might changeCheating the user is not the only thing scammers have to do. They also need to bypass spam filters and deliver the email to the email boxes of potential victims. One of the most popular and long-used methods to bypass filtering is to change text fragments within the email. Modern programs designed to send out spam messages include ample opportunities to generate multiple changes in the text. The text of a message which varies from email to email makes the email unique, while different personal information specified within one mailing (such as the number of the shipment, the form of the address, the dates) helps to convince recipients that the email is intended for them. In addition, the fraudsters can send out emails designed in the same style for several months – they only need to change some elements in the text. Fraudulent notifications from delivery services can change: The information about the order/shipment, including the tracking number of the shipment, delivery dates, etc.)Contact details, sender names and company names. Some mass mailings provide an e-mail address or a phone number of a company representative for feedback. This particular data changes from email to email. In addition, names of company representatives and even company names themselves may also vary.The name of the attachment. It mainly refers to malicious attachments which names vary in messages within one mass mailing while these different names hide one and the same malicious program.Links. In phishing emails and emails with malicious attachments scammers often specifically change the addresses of the links, masking them with the help of different URL shorteners. Most of these links are quickly blocked by current antivirus programs.Phrases indicating numbers and dates. These can refer to timetables (days, hours), sums of money and dates (day and month)The greeting. Here spammers generally use the email address and/or the name of the recipient. Sometimes they use generic expressions (Dear client, Dear customer, etc.) instead.Other text fragments. Some words are replaced with other phrases that have a similar meaning so the general sense of the sentence remains unchanged.Let’s analyze some examples of changes in the text of fraudulent emails. Below are some emails from yet another mass mailing. Fake pagesTo steal personal information from users, scammers create phishing HTML pages which partially or completely copy the official website of a company. If victims of fraud enters their personal information (bank details, usernames and passwords) on this page, that data immediately falls into the fraudsters’ hands. To mask the links leading to phishing websites the fraudsters often use popular free URL shorteners. In addition, most services offer customers the ability to view the statistics on the short link which tells fraudsters more about the number of clicks on any links etc. Phishing pages can be located on specially registered domains which usually have a short life span as well as on compromised domains whose owner may not even be aware that the web site is being used for fraudulent purposes. Let’s analyze a fake email sent on behalf of FedEx in which recipients are asked to update their account information. The text of the email contains a link to the official website of the company while the real address to which the user is redirected is nothing like the legitimate page and is located on a free URL shortener service. This becomes obvious when you hover on the link. After clicking the link, users get to a fraudulent page imitating the official website of FedEx, where they are asked to enter their logins and passwords to access their accounts. Once the users fill in the fields and click “Login”, the entered information is transmitted to the scammers who can then access the victims’ personal accounts. The menu tabs and other links on the phishing page are often inactive, so clicking on them will not take users to the appropriate page. However, in some cases, phishers imitate all links on the page so that users do not have any doubt about its legitimacy. Sometimes the design of the page imitates the official site but does not copy it completely. If you have a closer look at the details, you will see some differences between the designs of the real and the fake pages. However, most users do not pay attention to small details and this carelessness helps the scammers to steal personal information. Below is yet another example of an email sent on behalf of FedEx. This time it contains a malicious link. The email informs recipients that delivery is impossible because of missing information. And now users have to follow the specified link for verification. The link leads to a fraudulent page where potential victims are invited to download a program that will supposedly check whether they are really going to receive a parcel. Naturally, the program turns to be the well-known Zeus Trojan, which helps the fraudsters to access the computer and all the personal information on it. Scammers might not only include a phishing link in the body of the email, but also attach an HTML phishing page designed to steal personal data. However this use of HTML attachments as phishing pages is unusual for fraudulent mailings sent on behalf of delivery services. Fraudulent emails in different languagesTo increase the audience of recipients and customers, spammers are mastering new languages. In addition to traditional English and German, current spam traffic includes emails in Hebrew, Albanian and other languages which were found in advertising and fraudulent mailings a few years ago. For example, you may come across fake notifications from international delivery services written in Italian and Dutch. These emails do not have any special features that distinguish them from English- or German-language messages – to cheat users, the fraudsters resort to the same tricks. For example, this Italian-language fake notification from FedEx tells users to confirm their identity by following a fraudulent link. Yet another mass mailing in Italian contained a malicious archive which included the Zeus/Zbot Trojan used to steal personal data. The fraudulent email claimed that the user profiles on the website had been updated and there was more detailed information about it in the archive. Another fake notification written in Dutch on behalf of TNT informs recipients that new accounts have been formed for them, with details in the attachment. The archive attached to the email contains Backdoor.Win32.Andromeda, a malicious file that allows the scammers to control the infected computer without the user knowing. Malware in fraudulent emailsSpam is one of the most popular ways of spreading malware and infecting computers on the Internet. Attackers have various tricks to make victims install malicious software on their computers. Email traffic includes a variety of private emails, such as wedding invitations, dating offers and other similar messages. However, fake notifications from well-known companies and brands providing different services remain the most popular cybercriminal trick. International delivery services are also used by spammers as a cover for malicious spam. Malware spread in fake notifications from delivery services is divided into: Trojan programs developed to perform unauthorized operations in order to delete, block, modify or copy data, to disrupt computer or network performance. Trojans distributed in spam include Backdoors, Trojan-Downloaders, Trojan-Proxies, Trojan-PSWs, Trojan-Spies, Trojan-Bankers and othersWorms, malicious programs capable of unauthorized self-proliferation on computers or computer networks. Those copies go on to spread themselves further.What is dangerous about malicious programs? They can steal usernames and passwords from users’ accounts, as well as financial or other information sought by the attackers.They can create botnets for distributing spam, DDoS attacks and other criminal activityThey can provide fraudsters with control over victim computers, including the ability to run, delete or install any files or programs.Current malicious programs integrate broad-ranging fraudulent functionality. In addition, some malicious programs can download other malware, providing additional opportunities. These might include stealing usernames and passwords entered in the browser or seizing remote control over the whole computer. Malicious objects in fraudulent notifications can be embedded directly in the email or downloaded from a link provided in the body of the message. The most dangerous thing about it is that malware can be run and installed without users being aware or installing any software themselves. Typically, malicious ZIP (less often RAR) files enclosed in fraudulent emails have an executable .exe extension. How to recognize phishing emailsBelow are a number of features that can help to identify a fraudulent email. The sender address. If the sender address includes a random sequence of letters, words or numbers, or the domain has no connection with the official address of the company, the emails should undoubtedly be considered fraudulent and deleted without opening.Grammar and spelling mistakes. Wrong word order, incorrect punctuation, grammar and spelling mistakes can also be a sign of a fraudulent mailing.Graphic design. Scammers are doing their best to make the email look very similar to the original. To this ends they are trying to imitate other companies’ corporate styles using some of their elements such as color schemes and logos. Inaccuracies and noticeable design errors are among the signs of a fake email.The content of the email. If the recipient of the email is asked under various pretexts to urgently provide or confirm personal information, download a file or a link – especially while being threatened with sanctions for not doing so – the email may well be fraudulent.Links with different addresses. If the address of the link specified in the body of the email and address of the actual link to which you are redirected do not match, you are definitely looking at a fraudulent email. If you are viewing your email from the browser, the actual link can be usually seen in the bottom left of the browser window. If you use an email client, the actual link can be displayed in a popup window if you hover the cursor over the link in the text. Fraudulent links can also be attached to a text phrase in the email.Attached archives. Generally, ZIP and RAR archives are used by cybercriminals to hide malicious executable EXE-files. Therefore, you should not open these archives or run the attached files.Lack of contacts for feedback. Legitimate emails always provide contact information for feedback – either the company or the sender’s personal contacts.Form of address. Fraudulent emails do not necessarily use the first name or the surname to address the recipient; sometimes a universal form of address (“client”, etc.) is used.
source : international currency ，Welcome to reprint and share。