Skip to main content

hoaxed/spoofed email

 

 




A hoaxed/spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authored by someone else. Commonly, the sender’s name/address and the body of the message are formatted to appear from a legitimate source, as though the email came from a bank or a newspaper or legitimate company on the Web. Sometimes, the spoofer will make the email appear to come from a private citizen somewhere.


In more benign cases of email hoaxes, these spoofed messages are used to spread urban myths and preposterous stories (e.g. Mel Gibson was horrifically burned as a teenager). In other more malevolent cases, the spoofed email is part of a phishing (con man) attack. In other cases, a spoofed email is used to dishonestly market an online service or sell you a bogus product like scareware.


Why Would Someone Fraudulently 'Spoof' an Email?

Purpose 1: the email spoofer is trying to “phish” your passwords and login names. Phishing is where the dishonest sender hopes to lure you into trusting the email. A false (spoofed) website will be waiting off to side, cleverly disguised to appear like a legitimate online bank website or paid Web service, like eBay. Far too often, victims will unwittingly believe the spoofed email and click to the false website. Trusting the spoofed website, the victim will enter his password and login identity, only to receive a false error message that “web site is unavailable”. During all of this, the dishonest spoofer will capture the victim’s confidential info, and proceed to withdraw the victim’s funds or perform dishonest transactions for monetary gain.
Purpose 2: the email spoofer is a spammer trying to hide his true identity, while still filling your mailbox with advertising. Using a mass-mailing software called “ratware”, spammers will alter the source email address to appear as an innocent citizen, or as a legitimate company or government entity.
The purpose, like phishing, is to get people to trust the email enough so that they will open it and read the spam advertising inside.


How is Email Spoofed?

Dishonest users will alter different sections of an email so as to disguise the sender as being someone else. Examples of properties that are spoofed:
  1. FROM name/address
  2. REPLY-TO name/address
  3. RETURN-PATH address
  4. SOURCE IP address or “X-ORIGIN” address
 These first three properties can be easily altered by using settings in your Microsoft Outlook, Gmail, Hotmail, or other email software. The fourth property above, IP address, can also be altered, but usually, this requires more sophisticated user knowledge to make a false IP address convincing.

 While some spoof-altered emails are indeed falsified by hand, the great majority of spoofed emails are created by special software. The use of mass-mailing “ratware” programs is widespread amongst spammers. Rat-ware programs will sometimes run massive built-in word lists to create thousands of target email addresses, spoof a source email, and then blast the spoof email to those targets. Other times, rat ware programs will take illegally-acquired lists of email addresses, and then send their spam accordingly.

Beyond ratware programs, mass-mailing worms also abound. Worms are self-replicating programs that act as a type of virus. Once on your computer, a mass-mailing worm will read your email address book. Then the mass-mailing worm will falsify an outbound message to appear sent from a name in your address book, and proceed to send that message to your entire list of friends. This not only offends the dozens of recipients but tarnishes the reputation of an innocent friend of yours. Some well-known mass-mailing worms include Sober, Klez, and ILOVEYOU.



How Do I Recognize and Defend Against Spoof Emails?

Like with any con game in life, your best defense is skepticism. If you don’t believe that the email is truthful, or that the sender is legitimate, then simply don’t click on the link and type your email address. If there is a file attachment, simply don’t open it, lest it contains a virus payload. If the email seems too good to be true, then it probably is, and your skepticism will save you from divulging your banking information.

Comments

Popular posts from this blog

REVOLUTIONS-INDUSTRIAL AND INFORMATION

INDUSTRIAL   REVOLUTION  Starts   in   Europe  particularly  in  England  in  eighteen  century.It   changed  the  whole   of Europe   and   England 's  economy.During  this  period    New    machines  are  invented  in   England   to  speed  up  the    spinning  of  wool  and  cotton .At  first  they  were  powered  by  water  wheels  but  later steam  engines   are  developed.Iron   become  cheaper  and  stronger  as  Iron  making  techniques   improved.Canals  are  dug  to  carry   coal   from  the  mines and  to  transport  finished  goods.After ...

WEB SITES TO ENTERTAIN YOU

If  you   get  bored   from  the   web  viewing  the  same  stuff    over  and  over  again -social media  ,blogs,   news  etc  then  you  certainly   need  some  thing  different  that  can  soothe   your  soul and  give  you some  kind of entertainment  then  here  are some  sites  that  can  solve  your  purpose. Bored Panda   Bored Panda is the place you want to be when you want to discover interesting and visually appealing content. It's a blog that publishes regular updates on the coolest finds in travel, photography, illustration, animals, DIY, technology, design and all sorts of other great categories. You can also create an account to vote posts up or down. Brain Pickings .     ...

KEY BOARD SHORT CUTS

While   surfing  the Web,  these commands  could  help  you  and  are absolutely worth learning. By making repetitive motions faster, web surfing becomes so easy  and    pleasant! The following shortcuts can  be   work with desktop versions of Chrome, Firefox, and IE. CTRL-T to launch a new browser tab page. Tabbed pages are very useful: they let you open multiple web pages simultaneously without the same memory load as a full browser window.  Simply press CTRL-T to launch a new tab. Related: use CTRL-Page Up and CTRL-Page Down to navigate between the tabs.  CTRL-Enter to type 'www.' and '.com' Once you ...