{"id":1116,"date":"2018-12-06T15:29:03","date_gmt":"2018-12-06T21:29:03","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1116"},"modified":"2024-04-16T21:44:56","modified_gmt":"2024-04-16T21:44:56","slug":"this-account-has-been-hacked-change-your-password-right-now-phishing-scam-december-06-2018","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/this-account-has-been-hacked-change-your-password-right-now-phishing-scam-december-06-2018\/","title":{"rendered":"&#8220;This account has been hacked! Change your password right now!&#8221; \u2013 Phishing Scam \u2013 December 06, 2018"},"content":{"rendered":"<div dir=\"ltr\">\n<p>Below is the most recent phishing email and website we have seen. \u00a0Similar to past emails, this scam attempts to trick users into entering personal account information (e.g. username\/password). Users should not click any links in this email and should delete it right away. As a reminder, Loyola will never ask for your password or to verify your account.<\/p>\n<p>If you have any questions about this or any email, before you act on the email, please call or email the ITS Helpdesk 773-508-4487, helpdesk@luc.edu.<\/p>\n<hr \/>\n<\/div>\n<div id=\"divRplyFwdMsg\" dir=\"ltr\">\n<div><strong>From:*REDACTED*<\/strong><\/div>\n<\/div>\n<div>\n<div>\n<p>&nbsp;<\/p>\n<\/div>\n<div>\n<p><b>Subject: This account has been hacked! Change your password right now!<br \/>\n<\/b><\/p>\n<\/div>\n<div>\n<p><b>Date: <\/b>December 03, 2018 at 3:07 PM<\/p>\n<\/div>\n<div>\n<p><b>To: <\/b>Undisclosed recipients:;<\/p>\n<\/div>\n<\/div>\n<div id=\"divRplyFwdMsg\" dir=\"ltr\">\n<div>\n<p>I have bad news for you.<br \/>\nI hacked your operating system and got full access to your accounts<\/p>\n<p>It is useless to change the password, my malware intercepts it every time.<\/p>\n<p>How it was:<br \/>\nIn the software of the router to which you were connected that day, there was a vulnerability. I first hacked this router and placed my malicious code on it.<br \/>\nWhen you entered in the Internet, my trojan was installed on the operating system of your device.<\/p>\n<p>After that, I made a full dump of your disk (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts).<\/p>\n<p>A month ago, I wanted to lock your device and ask for a small amount of money to unlock.<br \/>\nBut I looked at the sites that you regularly visit, and came to the big delight of your favorite resources. I\u2019m talking about sites for adults.<\/p>\n<p>I want to say \u2013 you are a big, big pervert. You have unbridled fantasy!!!<\/p>\n<p>After that, an idea came to my mind.<br \/>\nI made a screenshot of the intimate website where you have fun (you know what it is about, right?).<br \/>\nAfter that, I made a screenshot of your joys (using the camera of your device) and joined all together. It turned out beautifully, do not doubt.<\/p>\n<p>I am strongly belive that you would not like to show these pictures to your relatives, friends or colleagues. I think $1000 is a very small amount for my silence.<br \/>\nBesides, I spent a lot of time on you!<\/p>\n<p>I accept money only in Bitcoins.<br \/>\nMy BTC wallet: 1GJ7XX2zfMK85hFDZ95VvgoRBEFu8t5SF9<\/p>\n<p>You do not know how to replenish a Bitcoin wallet?<br \/>\nIn any search engine write \u201chow to send money to btc wallet\u201d. It\u2019s easier than send money to a credit card!<\/p>\n<p>For payment you have a little more than two days (exactly 50 hours).<br \/>\nDo not worry, the timer will start at the moment when you open this letter. Yes, yes .. it has already started!<\/p>\n<p>After payment, my virus and dirty photos with you self-destruct automatically.<br \/>\nNarrative, if I do not receive the specified amount from you, then your device will be blocked, and all your contacts will receive a photos with your \u201cjoys\u201d.<\/p>\n<p>I want you to be prudent.<br \/>\n\u2013 Do not try to find and destroy my virus! (All your data is already uploaded to a remote server)<br \/>\n\u2013 Do not try to contact me (this is not feasible, I sent you an email from your account)<br \/>\n\u2013 Various security services will not help you; formatting a disk or destroying a device will not help either, since your data is already on a remote server.<\/p>\n<p>P.S. I guarantee you that I will not disturb you again after payment, as you are not my single victim. This is a hacker code of honor.<\/p>\n<p>From now on, I advise you to use good antiviruses and update them regularly (several times a day)!<\/p>\n<p>Don\u2019t be mad at me, everyone has their own work.<br \/>\nFarewell.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Below is the most recent phishing email and website we have seen. \u00a0Similar to past emails, this scam attempts to trick users into entering personal account information (e.g. username\/password). Users should not click any links in this email and should delete it right away. As a reminder, Loyola will never ask for your password or [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,7],"tags":[],"class_list":["post-1116","post","type-post","status-publish","format-standard","hentry","category-front-page","category-phishing","category-published"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1116"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1116\/revisions"}],"predecessor-version":[{"id":2007,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1116\/revisions\/2007"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}