Email Scam Info

Outages

Support

Dear Wightman Telecom Customer

You have reached this page because the link you clicked on was in an email that came from a spam, spoofing or phishing attempt.

Wightman Telecom has taken the appropriate action to notify the hosting server and domain provider of the abuse of their services. We have also put this page in place to help reduce the amount of users who fall victim to these scammers and to explain to you what phishing and spoofing is. We will also give you some information on how you can protect your account.

Learn More

  • Use a Strong password
  • Recognizing Spam/Scams
  • What you can do to avoid becoming a victim
  • Phishing Emails
  • Spoofing
  • Virus-Generated Email
  • Trojan Horse Email
  • Other Scams to watch out for

Use a Strong Password

Using a strong password is important in today's online world. There are so many online services that we rely on and everyone thinks "oh, I'll never get hacked" or "I don't have anything to hide anyway". We want to assure you that it is important to consider using a strong password for your Wightman account. Here are a few tips to creating a good strong password:

Example:

Password: iL2gFiTsDa5!
Phrase: I like to go fishing in the summer daily after 5PM.

(Back to top of page)

 

Recognizing Spam/Scams

Unsolicited commercial email, or "spam", is the starting point for many email scams. Before the advent of email, a scammer had to contact each potential victim individually by post, fax, telephone, or through direct personal contact. These methods would often require a significant investment in time and money. To improve the chances of contacting susceptible victims, the scammer might have had to do advance research on the "marks" he or she targeted.

Email has changed the game for scammers. The convenience and anonymity of email, along with the capability it provides for easily contacting thousands of people at once, enables scammers to work in volume. Scammers only need to fool a small percentage of the tens of thousands of people they email for their ruse to pay off.

The following sections provide information to help you spot an email scam when it lands in your mailbox. They describe some, but by no means all, of the many email-based scams you're likely to encounter. Armed with this information, you will better recognize email scams, even those not specifically mentioned here.

"Old-fashioned" Fraud Schemes

Many email scams have existed for a long time. In fact, a number of them are merely “recycled” scams that predate the use of email. The USA FTC has a list of the 12 most common (http://www.ftc.gov/opa/1998/07/dozen.shtm). The list includes:

  • bogus business opportunities
  • chain letters
  • work-at-home schemes
  • health and diet scams
  • easy money
  • “free” goods
  • investment opportunities
  • bulk email schemes
  • cable descrambler kits
  • “guaranteed” loans or credit

 

(Back to top of page)

 

What you can do to avoid becoming a victim

Filter Spam

Because most email scams begin with unsolicited commercial email, you should take measures to prevent spam from getting into your mailbox. Most email applications and web mail services include spam-filtering features, or ways in which you can configure your email applications to filter spam. Consult the help file for your email application or service to find out what you must do to filter spam.

You may not be able to eliminate all spam, but filtering will keep a great deal of it from reaching your mailbox. You should be aware that spammers monitor spam filtering tools and software and take measures to elude them. For instance, spammers may use subtle spelling mistakes to subvert spam filters, changing "Potency Pills" to "PotençPills."

Regard Unsolicited Email with Suspicion

Don't automatically trust any email sent to you by an unknown individual or organization. Never open an attachment to unsolicited email. Most importantly, never click on a link sent to you in an email. Cleverly crafted links can take you to forged web sites set up to trick you into divulging private information or downloading viruses, spyware, and other malicious software.

Spammers may also use a technique in which they send unique links in each individual spam email. Victim 1 may receive an email with the link http://dfnasdunf.example.org, and victim 2 may receive the same spam email with the link http://vnbnnasd.example.org. By watching which links are requested on their web servers, spammers can figure out which email addresses are valid and more precisely target victims for repeat spam attempts.

Remember that even email sent from a familiar address may create problems: Many viruses spread themselves by scanning the victim computer for email addresses and sending themselves to these addresses in the guise of an email from the owner of the infected computer.

Treat Email Attachments with Caution

Email attachments are commonly used by online scammers to sneak a virus onto your computer. These viruses can help the scammer steal important information from your computer, compromise your computer so that it is open to further attack and abuse, and convert your computer into a 'bot' for use in denial-of-service attacks and other online crimes. As noted above, Email attachments are commonly used by online scammers to sneak a virus onto your computer. These viruses can help the scammer steal important information from your computer, compromise your computer so that it is open to further attack and abuse, and convert your computer into a 'bot' for use in denial-of-service attacks and other online crimes. As noted above, a familiar "from" address is no guarantee of safety because some viruses spread by first searching for all email addresses on an infected computer and then sending itself to these addresses. It could be your friend's computer is infected with just such a virus.

Use Common Sense

When email arrives in your mailbox promising you big money for little effort, accusing you of violating the Patriot Act, or inviting you to join a plot to grab unclaimed funds involving persons you don't know in a country on the other side of the world, take a moment to consider the likelihood that the email is legitimate.

Install Antivirus Software and Keep it Up to Date

If you haven't done so by now, you should install antivirus software on your computer. If possible, you should install an antivirus program that has an automatic update feature. This will help ensure you always have the most up-to-date protection possible against viruses. In addition, you should make sure the antivirus software you choose includes an email scanning feature. This will help keep your computer free of email-born viruses.

Install a Personal Firewall and Keep it Up to Date

A firewall will not prevent scam email from making its way into your mailbox. However, it may help protect you should you inadvertently open a virus-bearing attachment or otherwise introduce malware to your computer by following the instructions in the email. The firewall, among other things, will help prevent outbound traffic from your computer to the attacker. When your personal firewall detects suspicious outbound communications from your computer, it could be a sign you have inadvertently installed malicious programs on your computer.

Learn the Email Policies of the Organizations You Do Business With

Most organizations doing business online now have clear policies about how they communicate with their customers in email. Many, for instance, will not ask you to provide account or personal information via email. Understanding the policies of the organizations you do business with can help you spot and avoid phishing and other scams. Do note, however, that it's never a good idea to send sensitive information via unencrypted email.

Configure Your Email Client for Security

There are a number of ways you can configure your email client to make you less susceptible to email scams. For instance, configuring your email program to view email as "text only" will help protect you from scams that misuse HTML in email.

(Back to top of page)

 

Phishing Emails

Phishing emails are crafted to look as if they've been sent from a legitimate organization. These emails attempt to fool you into visiting a bogus web site to either download malware (viruses and other software intended to compromise your computer) or reveal sensitive personal information. The perpetrators of phishing scams carefully craft the bogus web site to look like the real thing.

For instance, an email can be crafted to look like it is from a major bank. It might have an alarming subject line, such as "Problem with Your Account." The body of the message will claim there is a problem with your bank account and that, in order to validate your account, you must click a link included in the email and complete an online form.

The email is sent as spam to tens of thousands of recipients. Some, perhaps many, recipients are customers of the institution. Believing the email to be real, some of these recipients will click the link in the email without noticing that it takes them to a web address that only resembles the address of the real institution. If the email is sent and viewed as HTML, the visible link may be the URL of the institution, but the actual link information coded in the HTML will take the user to the bogus site.

For example:

The bogus site will look astonishingly like the real thing, and will present an online form asking for information like your account number, your address, your online banking username and password -- all the information an attacker needs to steal your identity and raid your bank account.

visible link: http://www.yourbank.com/accounts/
actual link to bogus site: http://www.other-site.com/data/yourbank/index.html

 

(Back to top of page)

 

Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some areas.

(Back to top of page)

 

Virus-Generated Email

Note that, in some cases, a familiar "from" address does not ensure safety: Many viruses spread by first searching for all email addresses on an infected computer and then sending themselves to these addresses. So, if your friend's computer has become infected with such a virus, you could receive an email that may, in fact, come from your friend's computer but which was not actually authored by your friend. If you have any doubts, verify the message with the person you believe to be the sender before opening any email attachment.

(Back to top of page)

 

Trojan Horse Emails

Trojan horse email offers the promise of something you might be interested in -- an attachment containing a joke, a photograph, or a patch for a software vulnerability. When opened, however, the attachment may do any or all of the following:

  • create a security vulnerability on your computer
  • open a secret "backdoor" to allow an attacker future illicit access to your computer
  • install software that logs your keystrokes and sends the logs to an attacker, allowing the attacker to ferret out your passwords and other important information
  • install software that monitors your online transactions and activities
  • provide an attacker access to your files
  • turn your computer into a "bot" an attacker can use to send spam, launch denial-of-service attacks, or spread the virus to other computers

What To Look For

Trojan horse emails have come in a variety of packages over the years. One of the most notorious was the "Love Bug" virus, attached to an email with the subject line "I Love You" and which asked the recipient to view the attached "love letter." Other Trojan horse emails have included the following:

  • email posing as virtual postcard
  • email masquerading as security bulletin from a software vendor requesting the recipient apply an attached "patch"
  • email with the subject line "funny" encouraging the recipient to view the attached "joke"
  • email claiming to be from an antivirus vendor encouraging the recipient to install the attached "virus sweeper" free of charge

(Back to top of page)

 

Other Scams to watch out for

Discount Software Offers

These scams frequently consist of advertisements for cheap versions of commercial software like Windows XP or Photoshop. The discounts offered may be hard to believe, and with good reason: the scammers either do not deliver the promised software at all, or provide illegal, pirated versions preloaded with Trojan horse software the scammer or other malicious individuals can use to exploit your computer and the information it contains.

Health and Diet Scams

Health and diet scams prey on the insecurities some people have about the state of their well-being. These insecurities make some people particularly susceptible to the scams because they may be reluctant or embarrassed to discuss their problems with a doctor, or they can't afford to buy legitimate drugs or treatment. The scams attempt to lure consumers with promises of quick fixes and amazing results, discount pricing, fast delivery, waived prescription requirements, privacy, and discreet packaging. The email offering these items will have subject lines that look like the following:

  • Need to lose weight for summer?
  • Increase Your Sexual Performance Drastically
  • CONTROL YOUR WEIGHT!!
  • Natural Health Remedy That Works!
  • Reduce body fat and build lean muscle without exercise
  • Young at any age
  • Takes years off your appearance
  • Gives energy and burns fat

 

Though they may be backed by customer testimonials, beware: the products don't work.

Bogus Business Opportunities

These scams promise the opportunity to make a great deal of money with very little effort. They're normally full of enticements such as "Work only hours a week," "Be your own boss," "Set your own hours," and "Work from home." The email messages offering these "opportunities" often have subject lines that look like the following:

  • Make a Regular Income with Online Auctions
  • Get Rich Click
  • Put your computer to work for you!
  • Use the Internet to make money
  • eBay Insider Secrets Revealed 6228

In most cases, the email gives very little detail about the nature of the business opportunity. Most provide an address or web site from which you can, for a fee, obtain an "information kit" about the opportunity. These opportunities, however, usually amount to nothing more than pyramid schemes in which the "opportunity" involves your ability to recruit more unsuspecting people to buy into the scam. Eventually, the scam is uncovered or the pool of new recruits runs dry and it fails.

 

(Back to top of page)