lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

62
active users

#phishing

3 posts3 participants0 posts today
Renée Burton<p>The Russians aren't coming, they are already here. Without most anyone realizing, they've created an entire malicious adtech industry whose story is just as complex as the Chinese organized crime we're now realizing from their ventures into pig butchering. </p><p>VexTrio is just one Russian organized crime group in the malicious adtech world, but they are a critical one. They have a very "special" relationship with website hackers that defies logic. I'd put my money on a contractual one. all your bases belong to russian adtech hackers.</p><p>Today we've released the first piece of research that may eventually prove whether I am right. This paper is hard. i've been told. I know. We've condensed thousands of hours of research into about 30 pages. <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> tried to make the main points a lot more consumable -- and wrote a fabulous complimentary article : read both! </p><p>There's so much more to say... but at the same time, between ourselves and Brian, we've released a lot of lead material ... and there's more to come. I've emphasized the Russian (technically Eastern European) crime here, but as Brian's article points out there is a whole Italian side too. and more. </p><p>We've given SURBL, Spamhaus, Cloudflare, Domain Tools, several registrars, and many security companies over 100k domains. They are also posted on our open github.</p><p>Super thanks to our collaborators at Qurium, GoDaddy Sucuri Security, and elsewhere. </p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/vextrio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vextrio</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/InfobloxThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfobloxThreatIntel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> </p><p><a href="https://blogs.infoblox.com/threat-intelligence/vexing-and-vicious-the-eerie-relationship-between-wordpress-hackers-and-an-adtech-cabal/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/vexing-and-vicious-the-eerie-relationship-between-wordpress-hackers-and-an-adtech-cabal/</span></a></p><p><a href="https://krebsonsecurity.com/2025/06/inside-a-dark-adtech-empire-fed-by-fake-captchas/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/06/in</span><span class="invisible">side-a-dark-adtech-empire-fed-by-fake-captchas/</span></a></p>
Generika 🍉<p>Beware of a legit looking tracking notices from USPS dot COM</p><p>there is a "your package is on its way" delivery scam coming from the dot com address. ???????</p><p>"USPS will not send customers text messages or e-mails without a customer first requesting the service with a tracking number, and it will NOT contain a link. So, if you did not initiate the tracking request for a specific package directly from USPS and it contains a link: don’t click the link!"</p><p>📬<br><a href="https://bananachips.club/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <br><a href="https://bananachips.club/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <br><a href="https://bananachips.club/tags/usps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usps</span></a></p>
Cori Faklaris 👩🏻‍💻<p>Scammers prey upon our fears and our stressors. For int'l students, these are very high. A <span class="h-card" translate="no"><a href="https://hci.social/@SPEX_lab" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SPEX_lab</span></a></span> RA, Eesha Alla, put together this visual guide to common scams: <a href="https://spexlab.org/staysafe.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">spexlab.org/staysafe.html</span><span class="invisible"></span></a><br><a href="https://hci.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://hci.social/tags/smishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smishing</span></a> <a href="https://hci.social/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> <a href="https://hci.social/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a></p>
Michael Fenichel<p>Interesting ... Newsletter from Malwarebytes - Aside from the usual alerts and scams, and warnings of Facebook privacy intrusions...</p><p>Just in time for summer travel and travel planning, an alert about a popular site being pirated and used for malware/phishing... BOOKING.COM</p><p>Newsletter (hopefully works - talk about tracking by url!) No way to 'clean' this. Hope it works. Stay safe, focused, alert.</p><p><a href="https://clicks.malwarebytes.com/s/vb/xJ35LIFHkOfiBy_Y7jY0xlSUGSGDoGxgiDOPg5l663rQZxlk71WI9A-Sm7X_GMgi53EwrteHE71EQsP5SKJDCXZarROnsRviVKfRLsB6V3g_HdSAungljAORdPhvzugQ3XBK9pi81bPC7gAw7nU_5IJT4MGexaZ6DLOT5w/x95VX5mIhv1BgE-lkUnY2GldBbzFrmDR/9" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">clicks.malwarebytes.com/s/vb/x</span><span class="invisible">J35LIFHkOfiBy_Y7jY0xlSUGSGDoGxgiDOPg5l663rQZxlk71WI9A-Sm7X_GMgi53EwrteHE71EQsP5SKJDCXZarROnsRviVKfRLsB6V3g_HdSAungljAORdPhvzugQ3XBK9pi81bPC7gAw7nU_5IJT4MGexaZ6DLOT5w/x95VX5mIhv1BgE-lkUnY2GldBbzFrmDR/9</span></a> </p><p><a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/Booking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Booking</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
John Leach<p>A sysadmin friend was the target of a phishing attack that used a job recruitment guise. The tech test they gave him came with some code that had a back door! He didn't fall for it though!</p><p>He wrote it up: <a href="https://blog.amen6.com/blog/2025/06/anatomy-of-a-recruitment-phish/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.amen6.com/blog/2025/06/an</span><span class="invisible">atomy-of-a-recruitment-phish/</span></a></p><p><a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://mastodon.social/tags/recruitment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>recruitment</span></a></p>
Chris<p>There is currently a wave of phishing emails going to 20i customers claiming that a domain renewal payment failed</p><p>The emails look legitimate but comes from an unconnected domain &amp; has masked links</p><p>20i are aware of it and confirm that it started today &amp; their abuse team are working on resolving the issue</p><p>If you or anyone you know uses 20i, be aware of this and be very careful</p><p>The renewal date listed was also wrong</p><p><a href="https://mstdn.social/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://mstdn.social/tags/20i" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>20i</span></a> <a href="https://mstdn.social/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mstdn.social/tags/DomainRegistration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DomainRegistration</span></a> <a href="https://mstdn.social/tags/EmailScammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmailScammers</span></a></p>
Yle News<p>Police: New three-step phishing scam spreading in Finland</p><p>In a new wave of scams, cybercriminals are calling victims on the phone, impersonating bank representatives in order to get hold of their online banking credentials.</p><p><a href="https://yle.fi/a/74-20165569" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yle.fi/a/74-20165569</span><span class="invisible"></span></a></p><p><a href="https://social.ahlroos.me/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://social.ahlroos.me/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.ahlroos.me/tags/bankfraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bankfraud</span></a> <a href="https://social.ahlroos.me/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.ahlroos.me/tags/onlinesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onlinesecurity</span></a></p>
Marcel Waldvogel<p>4️⃣ Letzte Woche ging es bei <a href="https://waldvogel.family/tags/DNIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNIP</span></a> um <a href="https://waldvogel.family/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a>: Erkennung und wie Schweizerdeutsch da eine Schlüsselrolle einnimmt.</p><p>Bruce <a href="https://waldvogel.family/tags/Schneier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schneier</span></a> hat am Wochenende einen Artikel geteilt, in dem er klar herausarbeitet, dass Phishing nicht das Problem der Mailempfänger:innen sein kann. Sondern dass dies an anderer Stelle gelöst werden müsste.</p><p><a href="https://dnip.ch/2025/06/03/dnip-briefing-27-parmelin-mit-p-wie-pr/#Phishing-ist-kein-Problem-der-Nutzer" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/06/03/dnip-briefi</span><span class="invisible">ng-27-parmelin-mit-p-wie-pr/#Phishing-ist-kein-Problem-der-Nutzer</span></a></p>
heise online<p>Wer haftet bei einem Phishing-Angriff, wenn Geld auf ein falsches Konto überwiesen wird? 🤔 Das Landgerichts Rostock entschied, dass der Rechnungssteller weiterhin Anspruch auf Zahlung hat, sofern die Fälschung erkennbar war. Das Risiko liegt beim Überweisenden.</p><p>Zum Artikel: <a href="https://heise.de/-10420964?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">heise.de/-10420964?wt_mc=sm.re</span><span class="invisible">d.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.heise.de/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <br>______________________</p>
ResearchBuzz: Firehose<p>NPR: Americans are warned as latest DMV phishing scam targets phones. “DMVs across the country are warning drivers of a new batch of fake, phishing text messages, designed to scam respondents out of their personal and financial information. The latest round of scam texts have been reported by departments of motor vehicles in at least three states: New York, Florida and California.”</p><p><a href="https://rbfirehose.com/2025/06/01/npr-americans-are-warned-as-latest-dmv-phishing-scam-targets-phones/" class="" rel="nofollow noopener noreferrer" target="_blank">https://rbfirehose.com/2025/06/01/npr-americans-are-warned-as-latest-dmv-phishing-scam-targets-phones/</a></p>
teufelswerk<p>In den letzten Tagen ist eine betrügerische E-Mail im Umlauf, die vorgibt, von der Steuerplattform ELSTER oder sogar der „Deutschen Regierung“ zu stammen. Die Nachricht fordert Empfänger dazu auf, ein Formular über einen Link auszufüllen – angeblich, um eine Steuererstattung zu ermöglichen. Doch Vorsicht: Es handelt sich dabei um einen raffinierten Phishing-Versuch 👇 </p><p><a href="https://teufelswerk.net/vorsicht-phishing-gefaelschte-elster-mail-zur-steuererstattung-im-umlauf/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">teufelswerk.net/vorsicht-phish</span><span class="invisible">ing-gefaelschte-elster-mail-zur-steuererstattung-im-umlauf/</span></a></p><p><a href="https://social.tchncs.de/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.tchncs.de/tags/fake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fake</span></a> <a href="https://social.tchncs.de/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://social.tchncs.de/tags/elster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elster</span></a> <a href="https://social.tchncs.de/tags/meinelster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meinelster</span></a> <a href="https://social.tchncs.de/tags/steuern" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steuern</span></a> <a href="https://social.tchncs.de/tags/steuererstattung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steuererstattung</span></a> <a href="https://social.tchncs.de/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
BSI<p>Viele Unternehmen könnten mit wenig Aufwand ihre E-Mail-Sicherheit verbessern:</p><p>✅ SPF, DKIM &amp; DMARC korrekt umsetzen</p><p>✅ moderne E-Mail-Infrastruktur nutzen</p><p>So schützt man sich besser vor <a href="https://social.bund.de/tags/Spoofing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spoofing</span></a>, <a href="https://social.bund.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> und sogenannten Person-in-the Middle-Angriffen.</p><p>👉 Praxisnahe Tipps gibt's hier: ➡️ <a href="https://www.bsi.bund.de/dok/1147322" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsi.bund.de/dok/1147322</span><span class="invisible"></span></a></p>
Peter N. M. Hansteen<p>The symptoms of what I take to have been a <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> campaign aimed at users in <a href="https://mastodon.social/tags/japan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>japan</span></a> are no longer that visible in the backscatter. </p><p>But they will be visible as new <a href="https://mastodon.social/tags/imaginaryfriends" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>imaginaryfriends</span></a> in the published <a href="https://mastodon.social/tags/spamtraps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamtraps</span></a> list we user for our our <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/spamd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamd</span></a> <a href="https://mastodon.social/tags/graytrapping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>graytrapping</span></a>, see <a href="https://nxdomain.no/~peter/traplist.shtml" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/traplist.sh</span><span class="invisible">tml</span></a> and <a href="https://nxdomain.no/~peter/spammers_believe_in_300k_imaginary_friends.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/spammers_be</span><span class="invisible">lieve_in_300k_imaginary_friends.html</span></a> (with the total now inching in the direction of the 5 million mark)</p>
Terence Eden<p>🆕 blog! “What's up with this "Please add me on WhatsApp" robocall spam?”</p><p>Over the last few weeks, I've received several calls which all have the same modus operandi. A disembodied robotic voice tries to get me to connect on WhatsApp.</p><p><a href="https://shkspr.mobi/blog/wp-content/uploads/2025/05/add-me-on-whatsapp.mp4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/wp-content/up</span><span class="invisible">loads/2025/05/add-me-on-whatsapp.mp4</span></a></p><p>Some of the voices are…</p><p>👀 Read more: <a href="https://shkspr.mobi/blog/2025/05/whats-up-with-this-please-add-me-on-whatsapp-robocall-spam/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/05/whats</span><span class="invisible">-up-with-this-please-add-me-on-whatsapp-robocall-spam/</span></a><br>⸻<br><a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a></p>
Walker<p>Cloudflare is an American company. So how is it doing business with Russian entities?</p><p>We were just hit with a phishing campaign pointing to a Russian URL, from a brand new Russian domain, from a Russian registrar, but content served through Cloudflare. </p><p>I may be mistaken on the totality of global sanctions against Russia, but it would seem that Cloudflare would not want to do business with these entities.</p><p><a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a> <a href="https://infosec.exchange/tags/russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>russia</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a></p>
Schneier on Security RSS<p>Why Take9 Won’t Improve Cybersecurity</p><p>There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to downlo... <a href="https://www.schneier.com/blog/archives/2025/05/why-take9-wont-improve-cybersecurity.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/05/why-take9-wont-improve-cybersecurity.html</span></a></p><p> <a href="https://burn.capital/tags/psychologyofsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>psychologyofsecurity</span></a> <a href="https://burn.capital/tags/securityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityawareness</span></a> <a href="https://burn.capital/tags/computersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computersecurity</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a></p>
Marcel Waldvogel<p>2️⃣ Kommt die Mail unerwartet?</p><p>* Kommt die Mail unerwartet?</p><p>* Wird darauf verwiesen, dass die Mail an eine verantwortliche Person weitergeleitet werden soll?</p><p>3️⃣ Wird Druck aufgebaut?</p><p>* .Ist die Mail dringend? («So schnell wie möglich», «Ihr Konto wurde bereits deaktiviert», …)</p><p>* Wird emotionaler Druck aufgebaut?</p><p>* Scheint es zu gut um wahr zu sein?</p><p>Alles gute Anzeichen für <a href="https://waldvogel.family/tags/Spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spam</span></a> oder <a href="https://waldvogel.family/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a>.</p><p><a href="https://dnip.ch/2025/05/28/schweizerdeutsch-liegt-im-trend-auch-bei-phishing/#Wie-erkenne-ich-Spam-und-Phishing" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/05/28/schweizerde</span><span class="invisible">utsch-liegt-im-trend-auch-bei-phishing/#Wie-erkenne-ich-Spam-und-Phishing</span></a></p>
Marcel Waldvogel<p>Aber nun zum wichtigsten Teil dieses Threads: Wie erkennst du Spam und Phishing?</p><p>1️⃣ Stimmen die Domains?</p><p>* Sieht die Absenderdomain legitim aus? Auch kein Tippfehler?</p><p>* Wird eine unübliche Top-Level-Domain verwendet? Also ist der letzte Teil hinter dem letzten Punkt nicht .ch, .li oder .com?</p><p>* Wird in der Mail eine andere Maildomain erwähnt, als die, von der die Mail angeblich stammt?</p><p>* Gehen die Links in der Mail auf nochmals andere Domains?</p><p><a href="https://waldvogel.family/tags/Spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spam</span></a> <a href="https://waldvogel.family/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a><br><a href="https://dnip.ch/2025/05/28/schweizerdeutsch-liegt-im-trend-auch-bei-phishing/#Wie-erkenne-ich-Spam-und-Phishing" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/05/28/schweizerde</span><span class="invisible">utsch-liegt-im-trend-auch-bei-phishing/#Wie-erkenne-ich-Spam-und-Phishing</span></a></p>
Marcel Waldvogel<p>Das Ziel der Falschschreibungen (Bindestriche mitten im Wort), Fremdschreibungen (Dialekt) und Umschreibungen ist dasselbe:</p><p>Spamfilter sollen diese Worte nicht erkennen. Denn in fast jedem Mailverkehr (ausser vielleicht bei Ärzten) ist «Viagra» ein Wort, das mit hoher Wahrscheinlichkeit auf Spam hindeutet.</p><p><a href="https://waldvogel.family/tags/Spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spam</span></a> <a href="https://waldvogel.family/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a><br><a href="https://dnip.ch/2025/05/28/schweizerdeutsch-liegt-im-trend-auch-bei-phishing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/05/28/schweizerde</span><span class="invisible">utsch-liegt-im-trend-auch-bei-phishing/</span></a></p>
Marcel Waldvogel<p>Spam nervt. Und Phishing noch mehr.</p><p>Man kann es aber auch machen wie ich und mal hinter die Kulissen von 1-2 Phishing-Kampagnen blicken. Und das ist eigentlich ganz spannend.</p><p>Vor einigen Wochen kam bei meiner Frau eine Phishingmail in <a href="https://waldvogel.family/tags/Schweizerdeutsch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schweizerdeutsch</span></a> an. Scheinbar wirklich vom Hostinganbieter, bei dem ihr Verein ein Web- und Mailhostingangebot nutzt.</p><p>Zwei Gründe, euch die Vorgehensweisen von Spammern näher zu bringen. Damit ihr das besser erkennt.<br>🧵<br><a href="https://waldvogel.family/tags/DNIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNIP</span></a> <a href="https://waldvogel.family/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a><br><a href="https://dnip.ch/2025/05/28/schweizerdeutsch-liegt-im-trend-auch-bei-phishing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/05/28/schweizerde</span><span class="invisible">utsch-liegt-im-trend-auch-bei-phishing/</span></a></p>