Dan.Strassberg dan.strassberg@att.net
Thu Mar 31 11:40:18 EDT 2011

Yes, but usually a phishing exploit requires you to open an attached
file or follow an included link before the message will do its dirty
work. The message in question did include a link and the .it in the
link suggested that the host site was in a foreign country (Italy, in
this case). Another tip-off can be that the message uses the Cyrillic
(Russian) character set. Most people would not follow such a link even
if it were to a site with a US domain name, let alone a foreign one.
But if it were late at night after a long day and the recipient had
lapsed into a near-coma or gone into sleepiness-induced autopilot
mode, I suppose s/he might stumble into following the link or opening
the attachment.

BTW, I read recently that attachments with a .PDF fulename extension
have apparently become the most dangerous for injecting malware into
recipients' PCs, based on the relative frequency of occurrence of
files with .PDF extensions among all malicious file attachments. Be
particularly leery of PDF attachments to messages from people whom you
do not know and trust.

Dan Strassberg (dan.strassberg@att.net)
eFax 1-707-215-6367

----- Original Message ----- 
From: "Sid Schweiger" <sid@wrko.com>
To: <boston-radio-interest@lists.BostonRadio.org>
Sent: Thursday, March 31, 2011 7:15 AM
Subject: RE: rjoc04679

> "How so?"
> It's known as phishing...sending an e-mail containing some sort of
> deception which gets the recipient to give up their password or some
> other personal information.  Telling the recipient they've won a
> prize, have some money waiting somewhere (the erstwhile Nigerian
> scam) or will have some account shut down for some ominous looking
> reason are three of the most common.
> Sid Schweiger
> IT Manager, Entercom New England
> 20 Guest St / 3d Floor
> Brighton MA  02135-2040

More information about the Boston-Radio-Interest mailing list