• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • The 2022 Ultimate Ethical Hacker Training Bundle for $39

    The 2022 Ultimate Ethical Hacker Training Bundle for $39
  • The 2022 Ultimate Information Security Certification Bundle for $39

    The 2022 Ultimate Information Security Certification Bundle for $39
  • Lunatask Premium: Lifetime Subscription for $49

    Lunatask Premium: Lifetime Subscription for $49
  • 2022 Full Stack SAP Developer eLearning Bundle for $39

    2022 Full Stack SAP Developer eLearning Bundle for $39
  • The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

    The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Wells Fargo phishing e-mails | Kaspersky official blog

May 14, 2022 by iHash Leave a Comment


Scammers often pose as well-known companies: video streaming services, job hunting websites, internet stores and so on. This time, phishers are targeting customers of Wells Fargo, one of the four largest US banks, providing services in more than 40 countries. Counting on the bank’s trustworthiness, the cybercriminals don’t limit themselves to stealing bank card details, but go after e-mail accounts and selfies of users holding their ID documents, too.

Phishing attack on Wells Fargo customers

As ever, an attack starts with a phishing e-mail designed to alarm the recipient. It informs the user that their Wells Fargo bank account has been blocked, allegedly due to an unverified e-mail address or a mistake in their home address. To regain access, the message asks the recipient to follow the link and verify their identity within 24 hours of receiving the notification. Otherwise, it will no longer be possible to transfer or withdraw money, the letter warns.

The e-mail looks quite convincing: a neat logo element, business-style text, and almost no errors. Even the sender’s name and address are very similar to those of the bank’s customer service. However, the address does have a very unusual domain in the non-existent zone wellsfargo-com (instead of the usual .com). But it takes a sharp eye to spot it.

Phishing e-mail seemingly from Wells Fargo

Phishing e-mail seemingly from Wells Fargo

The link in the e-mail points to a third-party site, and from there, via a redirect, to a fake Wells Fargo account login page. Here the phishers made less of an effort: the design does not match that of the official page, and the URL has nothing to do with the bank at all, but for some reason references either the Bruce Springsteen song The Ties That Bind or the TV series of the same name!

On the very first page, the victim is prompted to enter their Wells Fargo account username and password. But that’s only the beginning — two more “verification” stages lie ahead.

Phishing site imitating Wells Fargo

Phishing site imitating Wells Fargo

Having signed in, the victim lands on the next page — where there are a lot more fields to fill out. Here the scammers brazenly ask for an e-mail address with password (!), a phone number with postal address, the user’s date of birth and social security number (SSN); and, of course, payment details: aside from a bank card number and expiration date, they also ask to fill in the CVV code on the back, plus PIN.

Form for entering personal data on the phishing site

Form for entering personal data on the phishing site

Next comes the most interesting bit: the user is prompted to upload a selfie in which they’re holding up an ID document. This page displays no fewer than three Wells Fargo logos, probably to add credibility. However, some typos somewhat spoil the impression.

[wells-fargo-phishing-screen-4.png]
[Alt/title/caption:

The victim is asked to upload a photo with an ID document

The victim is asked to upload a photo with an ID document

Having extracted all vital data from the victim, the scammers report that the account has been successfully restored and redirect said victim to the real Wells Fargo website. This maneuver is designed to make them believe they have been on the legitimate resource all the time.

Account

Account “recovery” and redirection to the official Wells Fargo site

What the stolen data can be used for

Typically, this kind of phishing is used to build up a massive database for subsequent sale on the dark web. The merchandise is valuable: armed with such a treasure trove of personal data, criminals can siphon off money from the victim’s card. But it doesn’t stop there: with a dataset like this they can also enrich themselves in other ways at the victim’s expense — for example, by opening a bank or crypto exchange account to launder stolen funds, obtain a credit card, and so on. With an ID-card selfie and SSN, attackers have every chance of passing the KYC (Know Your Customer) security check required for such transactions.

As such, after entering the data, probably nothing will happen at first; only later will trouble arise. This may pose an additional danger: by the time the cybercriminals start using the stolen data, the user may no longer remember having entered their personal data somewhere, making it much harder for them to give bank representatives or police officers a proper explanation.

How to avoid falling victim to bank phishing

Here are some tips on how to avoid becoming a victim of phishing schemes that involve bank accounts.

  • Look carefully at unexpected e-mails about account suspensions, suspicious charges, odd purchases or generous giveaways: they are nearly always fake. We’ve explained recently why such e-mails are most likely a scam and how to spot fraud.
  • Do not follow links in e-mails to bank websites. It’s better to enter the URL of the official site manually, or find it on Google, Bing or another reliable search engine.
  • Remember that, as a rule, full personal information plus a selfie with an ID document are not required to recover a bank account. And you certainly don’t have to enter the CVV code from the back of your card, let alone your PIN! If you are asked for this, be very wary and contact the bank for confirmation by calling the phone number printed on your card.
  • If you are a Wells Fargo customer and get a phishing e-mail, report it to your bank immediately so they can take measures to protect other users. See here for contact details.
  • Install a reliable security solution that warns you about scams and phishing attempts and keeps your valuable data safe from cybercriminals.





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: blog, emails, Fargo, Kaspersky, Official, Phishing, Wells

Special Offers

  • The 2022 Ultimate Ethical Hacker Training Bundle for $39

    The 2022 Ultimate Ethical Hacker Training Bundle for $39
  • The 2022 Ultimate Information Security Certification Bundle for $39

    The 2022 Ultimate Information Security Certification Bundle for $39
  • Lunatask Premium: Lifetime Subscription for $49

    Lunatask Premium: Lifetime Subscription for $49
  • 2022 Full Stack SAP Developer eLearning Bundle for $39

    2022 Full Stack SAP Developer eLearning Bundle for $39
  • The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

    The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Accelerating Roles for RPA in Information Technology

May 23, 2022 By iHash

Yes, Containers Are Terrific, But Watch the Security Risks

May 23, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

The 2022 Ultimate Ethical Hacker Training Bundle for $39

Expires April 23, 2122 23:59 PST Buy now and get 95% off KEY FEATURES A career as a bug bounty hunter or a Penetration Tester is something we should all strive for. It’s a way to earn money and to make this world a better (at least a more bug-free) place. If you think that’s […]

The 2022 Ultimate Information Security Certification Bundle for $39

Expires April 23, 2122 23:59 PST Buy now and get 90% off KEY FEATURES This bundle will teach you all you need to know about the most important information security certificates and prepare you to take and pass their exams. If you are looking to be at the top of your field in information security, […]

How to deploy NLP: Named entity recognition (NER) example

How to deploy NLP: Named entity recognition (NER) example

Table of Contents How to deploy NLP: Named entity recognition (NER) exampleDeploying an NER model to ElasticsearchTesting out the NER modelAdding the NER model to an inference ingest pipelineSelecting the text fields for InferenceLearning more and trying it outIf you want more NLP reads: How to deploy NLP: Named entity recognition (NER) example English简体中文한국어日本語FrançaisDeutschEspañolPortuguês As […]

Apple iPad 9.7inch 32GB – Silver (Refurbished: Wi-Fi Only) for $188

Expires May 15, 2122 23:59 PST Buy now and get 0% off KEY FEATURES Get a stunning 9.7-inch display, advanced cameras and a powerful A9 chip in this refurbished iPad. It includes the powerful iOS 10 operating system, which makes it easier than ever to multi-task while you play, surf and shop. Browse the web […]

How AI Unlocks The Secrets Behind Sports Rehab and CBD

Like wider society, sports are starting to explore the medical use of cannabis. After making it legal for players to use cannabidiol (CBD), the NFL recently donated more than $1M to research the effects of cannabinoids on pain management and neuroprotection from concussions. The funding is a progressive move by the league to better understand […]

Apple iPad 6 128GB – Silver (Refurbished: Wi-Fi) for $277

Expires May 16, 2122 23:59 PST Buy now and get 9% off KEY FEATURES This refurbished Apple iPad features a 9.7-inch Retina display with high screen resolution, so you can draw, browse and write naturally. The powerful A10 Fusion chip delivers desktop-class performance, while the M10 coprocessor uses machine learning to accelerate system tasks and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT