{"id":17461,"date":"2018-11-05T10:06:47","date_gmt":"2018-11-05T02:06:47","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=17461"},"modified":"2022-01-27T18:08:42","modified_gmt":"2022-01-27T10:08:42","slug":"phishing-mail-pretending-sheep","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/phishing-mail-pretending-sheep\/","title":{"rendered":"Phishing Mail : A Big Wolf Pretending as a Sheep\u2019s Knocking on Your Monitor Screen"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17463 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=640%2C335&#038;ssl=1\" alt=\"\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/span><\/p>\n<h2><strong>Phishing Mail<\/strong><\/h2>\n<p>I am A, an Exabee working at Exabytes.<\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m just an ordinary human who joins the crazy morning traffic to Exabytes Office in Payar Lebar every day to fulfill the mission of <\/span><b><i>\u2018Grow Your Business Online!\u2019<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">What the\u2026this is surely not a good start amid Monday Blues because I just received a similar email which I thought was some kind of love story, and moved it straight to the Junk folder. <\/span><strong>And I found a Big Bad Wolf Hiding &#8220;Phishing Mail&#8221; behind Exabytes Mail. <\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17464 size-medium\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?resize=300%2C300&#038;ssl=1\" alt=\"spot phishing mail \" width=\"300\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?resize=421%2C420&amp;ssl=1 421w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?resize=114%2C114&amp;ssl=1 114w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/phishing-mail.jpg?w=450&amp;ssl=1 450w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, I grabbed a cup of coffee and started to perform an analysis.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">GOSH! <\/span><span style=\"font-weight: 400;\">\u201cEmail <strong>target@domain.com<\/strong><\/span><span style=\"font-weight: 400;\">\u00a0has been compromised!\u201d<\/span><\/p>\n<h2><b>Look How I Met Big Bad Wolf<\/b><b> in some Phishing Mails. <\/b><\/h2>\n<h3><b>Email header + Content<\/b><b><\/b><\/h3>\n<p><span style=\"font-weight: 400;\">All emails consist of an Email header and Email body.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email header records every single relay point going through before it reaches your mailbox.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is like how you trace your parcel from a courier service provider after purchasing something online.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td>\u00a0Received: from [12.12.12.123] (UnknownHost [12.12.12.123]) by mail.domain.com with SMTP;<\/p>\n<p><span style=\"font-weight: 400;\"> Thu, 29 Oct 2018 06:17:21 +0800<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Message-ID: &lt;xxxxxx&gt;<\/span><\/p>\n<p>From: &lt;<strong>target@domain.com<\/strong>&gt;<\/p>\n<p><span style=\"font-weight: 400;\">To: \u00a0&lt;<strong>target@domain.com<\/strong>&gt;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Subject: account <strong>target@domain.com<\/strong> is compromised<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Date: 29 Oct 2018 06:00:12 +0800<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17469 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=640%2C335&#038;ssl=1\" alt=\"phishing mail hacker\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-4.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h4><b>Suspicion 1: I know your password!<\/b><\/h4>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">I&#8217;m a hacker who hacked your email and device a few months ago.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">You entered a password on one of the sites you visited, and I intercepted it.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">Of course you can\/will change your password, or already changed it.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">But it doesn&#8217;t matter, my malware updated it every time.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">Do not try to contact me or find me, it is impossible, since I sent you an email from your account.<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">If you have my email account password, why didn\u2019t you directly authenticate\/relay over the mail server but instead sending from a third party host [12.12.12.123], and pretended that you know my password?<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17470 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=640%2C335&#038;ssl=1\" alt=\"Phishing Spying\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-5.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3><\/h3>\n<h3><b>Suspicion 2: Spying on you!<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">Through your email, I uploaded malicious codes to your Operating System.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">I saved all your contacts with friends, colleagues, relatives, and a complete history of visited websites.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">I also installed a Trojan on your device and have been spying on you for a long time.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">You are not my only victim. I usually lock computers and ask for a ransom.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">But I was struck by the sites of intimate content that you often visit.<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The spammer seems to put on more pressure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If he\/she is a real hacker that got \u201cfull access\u201d to my laptop\/desktop, then he\/she should deploy a ransomware instead of sending a phishing mail, and wait for me to take the bait.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17472 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=640%2C335&#038;ssl=1\" alt=\"Phishing Scam photo\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-7.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><br \/>\n<\/span><\/p>\n<h3><b>Suspicion 3: I made screenshot from your photos!<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">So, when you had fun on piquant sites (you know what I mean!), I made screenshot using my program from your camera device.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">After that, I combined them with the content of the currently viewed site.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">There will be laughter when I send these photos to your contacts! BUT I&#8217;m sure you don&#8217;t want this to happen.<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">My broken camera already stopped working for a some time and the website I frequently visit is exabytes.my. Now you really make me laugh, I get your joke! LOL!<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17473 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=640%2C335&#038;ssl=1\" alt=\"Phishing Bitcon Scam\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-8.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3><b>Suspicion 4: Pay me or Data gone!<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">Therefore, I expect payment from you for my silence.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">I think $852 is an acceptable price for it!<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">Pay with Bitcoin.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">My BTC wallet: 1DVU5Q2HQ4srFNSSaWBrVNMtL4pvBkfP5w<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">If you do not know how to do this &#8211; Search this on Google &#8220;how to transfer money to a bitcoin wallet&#8221;. It is not difficult.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system.<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It seems that you care about me more than I do regarding this data. You care about me so much that you provided me with the steps on how to make payment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wow, the last line sounds like a scene in Mission Impossible. Are you a fan of the box office?<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17474 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=640%2C335&#038;ssl=1\" alt=\"Phishing Example\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-9.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3><b>Suspicion 5: Time is running out! I&#8217;m coming now!<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">My Trojan have auto alert, after this email is read, I will know it!<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">You have 2 days (48 hours) to make payment. If this does not happen &#8211; all your contacts will get crazy shots from your dark secret life! Soon your device will be blocked too (also after 48 hours).<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">I read the similar email last week, did you not track that?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email actually got a function called \u201cRead receipts\u201d. And why would you need to spend time writing a Trojan?<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17475 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=640%2C335&#038;ssl=1\" alt=\"phishing wolf or husky\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/October-is-CyberSecurity-Awareness-Month-10.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3><b>Suspicion 6: Do not be Silly!<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<h4><span style=\"font-weight: 400;\">Do not be silly!<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">Police or friends won&#8217;t help you for sure &#8230;<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">P.S. I can give you advice for the future. Do not enter your passwords on unsafe sites.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">I hope you understand your situation now.<\/span><\/h4>\n<h4><span style=\"font-weight: 400;\">Farewell.<\/span><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Finally, I saw a meaningful line in the whole content\u2026Yes, Do not be silly with such low level phishing mail, and I will sure help my friends by spreading this information ^^<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bye Mr. Spammer, good try!<\/span><\/p>\n<p>For More Similar Post About Cyber Security and Scam Mails<\/p>\n<ul>\n<li>[Infographic] <a href=\"https:\/\/www.exabytes.sg\/blog\/what-is-phishing-scams\/\" target=\"_blank\" rel=\"noopener\">What is Phishing Scams<\/a><\/li>\n<li><a href=\"https:\/\/www.exabytes.sg\/blog\/scam-email-alert\/\">Latest Scam Email Report from Exabytes<\/a><\/li>\n<li><a href=\"https:\/\/www.exabytes.sg\/blog\/update-backdoor-attack-website-singapore\/\">Backdoor Attack Website in Singapore<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Mail I am A, an Exabee working at Exabytes. I\u2019m just an ordinary human who joins the crazy morning traffic to Exabytes Office in Payar Lebar every day to fulfill the mission of \u2018Grow Your Business Online!\u2019 What the\u2026this is surely not a good start amid Monday Blues because I just received a similar [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":17463,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293,7],"tags":[],"class_list":{"0":"post-17461","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"category-sharing-tips-for-success"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/11\/New-Project-1.png?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-4xD","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=17461"}],"version-history":[{"count":12,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17461\/revisions"}],"predecessor-version":[{"id":22018,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17461\/revisions\/22018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/17463"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=17461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=17461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=17461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}