Clean structure, with some weaknesses in content, but with the correct name of the recipient: this email from fraudsters pretends to come from PayPal and alerts the recipient about supposedly unusual access patterns to the PayPal account.


SPONSORED AD


But we warn: this email is a fake that is intended to mislead the recipient. The aim of this email is to get the recipient to click on the link behind “Click here to solve the account problems” out of their uncertainty. This would redirect the recipient to a fake PayPal page where a phishing trap lurks.

image

The content of this email is in barrier-free plain text:

Limiting Your Account

Your action is required

Hello Klaus [***],

Due to unusual account access patterns, we have limited your account for the time being.
To solve the problems, please follow the instructions on the Solve Problem page, the link can be found below.
Once your information has been received and verified, the restriction will be removed.

Click here to resolve account issues

Kind regards,
your PayPal security team

This email does NOT come from PayPal! Fraudsters have recreated a warning message here and are now trying to unsettle recipients so that they click on the link in the email and are directed to fake pages.

Fraud!

Kaspersky Internet Security 's phishing protection works straight away: the email and its built-in link are an attempted fraud!

image
(Try Kaspersky Internet Security Multi-Device 2016 for 60 days click here)

Without protective mechanisms, a page opens that is modeled on the PayPal login. This page has the constructed address: “ service-problemloesung.online ”. The following shows a common process of a phishing scam: first, login details are requested.

image

As a result, personal and address data, as well as sensitive bank data, are then intercepted using the fake forms.

image

General phishing warning:

  • Phishing emails generally try to appear as if they come from the relevant company . Fraudsters use these to try to get personal data, preferably bank credit cards or other payment data.
  • Protection software is helpful! With updated databases and appropriate heuristics, malicious sites are often blocked. We use Kaspersky protection software .
  • The real “art” of these emails is the story with which the recipient is supposed to trust the email and open the inserted link. Expression, grammar and spelling, as well as plausibility and individuality play a very important role here. Especially in the recent past, there have been an increasing number of emails that shined with individuality: they could address the recipient with the correct name and also provide actual address and personal data.
  • However, you can generally note: Banks, payment and purchase portals never ask you to log in to the account using a built-in link! In addition, although a generic salutation is always an indication of phishing, an existing correct salutation is not proof of the authenticity of an email .
  • Never log in via a link that is sent by email, but always type the relevant page by hand into the address bar of your browser and log in there. If there are actually announcements of the relevant service, they will be displayed there. In addition, if possible, you should also refrain from carrying out banking transactions via public/third-party WiFi networks , as you never know exactly whether (and in an emergency from whom) these networks are being used be logged.
  • Never enter real data in the form fields! Under certain circumstances, the data can even while typing without having to confirm with “continue”.

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )