{"id":1070,"date":"2018-10-24T11:08:44","date_gmt":"2018-10-24T16:08:44","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1070"},"modified":"2024-04-16T21:44:56","modified_gmt":"2024-04-16T21:44:56","slug":"password-compromised-phishing-scam-october-23-2018","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/password-compromised-phishing-scam-october-23-2018\/","title":{"rendered":"\u201cPassword Compromised\u201d \u2013 Phishing Scam \u2013 October 24, 2018"},"content":{"rendered":"<p>Below is the most recent phishing email and website we have seen. \u00a0Similar to past emails, this scam attempts to trick users into entering personal account information (e.g. username\/password). Users should not click any links in this email and should delete it right away. As a reminder, Loyola will never ask for your password or to verify your account.<\/p>\n<p>If you have any questions about this or any email, before you act on the email, please call or email the ITS Helpdesk 773-508-4487, helpdesk@luc.edu.<\/p>\n<hr \/>\n<p>From:<\/p>\n<p>Sent: Wednesday, October 24, 2018 1:31 PM<\/p>\n<p>To:<\/p>\n<p>Subject: password compromised<\/p>\n<p>&nbsp;<\/p>\n<p>Hello!<\/p>\n<p>I&#8217;m a hacker who cracked your email and device a few months ago.<\/p>\n<p>You entered a password on one of the sites you visited, and I intercepted it.<\/p>\n<p>This is your password from () on moment of hack: ()<\/p>\n<p>&nbsp;<\/p>\n<p>Of course you can will change it, or already changed it.<\/p>\n<p>But it doesn&#8217;t matter, my malware updated it every time.<\/p>\n<p>&nbsp;<\/p>\n<p>Do not try to contact me or find me, it is impossible, since I sent you an email from your account.<\/p>\n<p>&nbsp;<\/p>\n<p>Through your email, I uploaded malicious code to your Operation System.<\/p>\n<p>I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources.<\/p>\n<p>Also I installed a Trojan on your device and long tome spying for you.<\/p>\n<p>&nbsp;<\/p>\n<p>You are not my only victim, I usually lock computers and ask for a ransom.<\/p>\n<p>But I was struck by the sites of intimate content that you often visit.<\/p>\n<p>&nbsp;<\/p>\n<p>I am in shock of your fantasies! I&#8217;ve never seen anything like this!<\/p>\n<p>&nbsp;<\/p>\n<p>So, when you had fun on piquant sites (you know what I mean!) I made screenshot with using my program from your camera of yours device.<\/p>\n<p>After that, I combined them to the content of the currently viewed site.<\/p>\n<p>&nbsp;<\/p>\n<p>There will be laughter when I send these photos to your contacts!<\/p>\n<p>BUT I&#8217;m sure you don&#8217;t want it.<\/p>\n<p>&nbsp;<\/p>\n<p>Therefore, I expect payment from you for my silence.<\/p>\n<p>I think $871 is an acceptable price for it!<\/p>\n<p>&nbsp;<\/p>\n<p>Pay with Bitcoin.<\/p>\n<p>My BTC wallet: 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj<\/p>\n<p>&nbsp;<\/p>\n<p>If you do not know how to do this &#8211; enter into Google &#8220;how to transfer money to a bitcoin wallet&#8221;. It is not difficult.<\/p>\n<p>After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system.<\/p>\n<p>&nbsp;<\/p>\n<p>My Trojan have auto alert, after this email is read, I will be know it!<\/p>\n<p>&nbsp;<\/p>\n<p>I give you 2 days (48 hours) to make a payment.<\/p>\n<p>If this does not happen &#8211; all your contacts will get crazy shots from your dark secret life!<\/p>\n<p>And so that you do not obstruct, your device will be blocked (also after 48 hours)<\/p>\n<p>&nbsp;<\/p>\n<p>Do not be silly!<\/p>\n<p>Police or friends won&#8217;t help you for sure &#8230;<\/p>\n<p>&nbsp;<\/p>\n<p>p.s. I can give you advice for the future. Do not enter your passwords on unsafe sites.<\/p>\n<p>&nbsp;<\/p>\n<p>I hope for your prudence.<\/p>\n<p>Farewell.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below is the most recent phishing email and website we have seen. \u00a0Similar to past emails, this scam attempts to trick users into entering personal account information (e.g. username\/password). Users should not click any links in this email and should delete it right away. As a reminder, Loyola will never ask for your password or [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,7],"tags":[],"class_list":["post-1070","post","type-post","status-publish","format-standard","hentry","category-front-page","category-phishing","category-published"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1070"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1070\/revisions"}],"predecessor-version":[{"id":2011,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1070\/revisions\/2011"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}