Log In | Subscribe | | |

spam

The return, with increasing frequency, of internet domain name fraud, is usually at least accompanied by a form of what the fraudster hopes is a sufficient disclaimer to prevent prosecution. The latest iteration omits even that and resorts to blatant threats. Also, it seems that the criminals have obtained access to the domain sevenresortsnet.com to send mail and to present a landing page for those who click to respond to the demand.

CoNet Section: 

It's been a while since spammers hawked "meds" in spam. But recently, we got one. The amazing thing is that it's the same as they ever were.

In the past day or so, a company called emailmovers limited using the domain xmr3.com have sent out a number of spam e-mails addressed to personal e-mail addresses at companies. They claim "Emailmovers is one of the UK's only B2B email data owners who provide Full Email Marketing services in house" which is, in itself a nonsensical statement.

But it's their claim for how many people they feel it's OK to send unwanted commercial email to that is interesting. Just how did they get it and how do they think it's legal to use it? And is it a predicate crime for money laundering purposes if they have breached GDPR?

You should neither know nor care exactly what criminal activity lies behind the link in this e-mail. The fact that it's fraud from beginning to end should be enough.

CoNet Section: 

Fraud is cyclical. Historically, frauds would lie dormant for, perhaps, five years then come back. But the cycle has become much shorter, often only two or three months. Some frauds have become perpetual, aided by e-mail that hits so many prospective targets at such a low marginal cost. Others have a few days in the light before disappearing into relative darkness for a matter of weeks, perhaps because the targets are sorted by e.g. alphabetical order, into batches. One such is fraud relating to domain names. They take several forms but the same basic structure. The fraudster hints that, if you don't pay up, your domain name will stop working. Here's the anatomy of one such fraudulent mail that has reached us multiple times in the past several days.

CoNet Section: 

We all get the scams telling us that a criminal has our data. Many of us get scams saying that the criminals have details of access to pornographic websites and, even, footage taken from cameras on our desktop or laptop machines. Usually, we are told that we are being blackmailed and ordered to pay a sum, via bitcoin, to a specified wallet, 1Lughwk11SAsz54wZJ3bpGbNqGfVanMWzk. This wallet should, obviously, be disabled with immediate effect.

CoNet Section: 

When Australia took action against an internet scammer for sending out notices relating to domains (see here) the effect on those committing similar frauds was... zero.

CoNet Section: 

Who remembers the dark web, that place where, if you could work out how to access it, you could buy false identification, illicit drugs (or licit drugs on an illicit basis) and even rent a hit man? Welcome, charlselwatson@gmail.com, not only don't you use the dark web, you even promote your services via a public bulletin board.

Sending server: webmail.123-reg.co.uk
Request for External Wire transfer

CoNet Section: 

It's incredible how many spammers (not, scammers) don't think that their standard of English reflects on the quality of work they might offer.

Below is an example of the many spam e-mails that find their way into our electronic shredder because we don't want to read them but, sometimes, it's worth looking to see how advertising is presented. This example is never, ever, going to get business from any business that requires professional standards of itself and its suppliers.

CoNet Section: 

Pages