This is the message I had from WordPress, I have redacted some of the information and sent the hacker an email. The original WordPress message can be seen at the bottom of the screenshot.
Fw:  Failed WordPress login attempt by IP 188.8.131.52
From: xxxxxx@xxxxxxxxxxxxx Tue 08/06/2021 11:37
I have just done an IP Address Look UP
IP Address Location Information for 184.108.40.206
SCROLL TO READ NOTIFICATION FROM WORDPRESS
Postal Code: 5403
Time Zone: +06:00
Host Info for 220.127.116.11ASN: 135115ISP: Wims OnlineHost Name: 18.104.22.168 Domain: wimsbd.com
Proxy Check Info for 22.214.171.124
And am wondering why you are attempting to hack www.disabledentrepreneur.uk ??????????????????????🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬 IF YOU PLAY WITH FIRE, YOU WILL GET BURNT!🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥
From: firstname.lastname@example.org <email@example.com> Sent: 08 June 2021 10:48 To: xxxxxxxx@xxxxxxxxxxxxxxxx> Subject:  Failed WordPress login attempt by IP 126.96.36.199
12 failed login attempts (3 lockout(s)) from IP 188.8.131.52 Last user attempted: xxxxxxxxxxxx IP was blocked for 20 minutes
This notification was sent automatically via Limit Login Attempts Reloaded Plugin. This is installed on your disabledentrepreneur.uk WordPress site. Please login to your WordPress dashboard to view more info.
Under Attack? Try our advanced protection. Have Questions? Visit our help section.
I have never thought too much about it until one of my clients forwarded me an email he had received from a person supposedly trying to steal my business. I had to look twice and realised that the entity was actually referring to an old domain my client had until it was stolen and cybersquatted.
You can ready the whole three part cybersqualtting incident here:
Futhermore the domain supposedly changed hands in July of this year but my client is still getting emails this tells me the same entity is still using the domain name and still has my client’s data. Had the domain really have gone to a thirdparty they would not have had access to my clients data or email address. My client’s email that he received today was to his gmail email not his company email meaning how would the new owner know about my clients gmail email unless they were one and the same entity?
So when you open these emails two things that can happen if you reply to such emails they could either be malware infected and will be embed on your computer or you may get lots of spam messages whereby the sender will be then able to use your email address and spam other people.
Another way cyber criminals work is by using undisclosed email addresses this way they can send bulk emails. An undisclosed email may be used if you previously have had an email subscription and your email has be leaked or sold to a thirdparty that may then want to send out spam emails in bulk.
This goes against your privacy protection and you have to remember that email lists are worth a lot of money to some people so it stands to reason that they can be sold and misused.
How to spot a dodgy email.
Apple know how to spell and they use their company name to send out information.
Check For Misspellings
The first and most obvious tip-off is misspellings. In the header above, the name of the company is spelled incorrectly, and the likelihood that a big corporation would misspell its own name is pretty unlikely.
Also look out for subdomain names such as firstname.lastname@example.org No legitimate company would send out emails from their subdomain. Subdomains are the extension to a the originators website and are mainly used for blogs: https://ukdomainbrokers.ukwebsitedesigners.co.uk/
So for all intent and puposes the above is an example of my sub domain and I would not send out an email from email@example.com. I would however send one out from firstname.lastname@example.org
Another quick trick is to look up the IP address the message came from. If it’s in a different country than the company, it’s probably fake.
The “Received” line tells you where the email originated from. If the email is actually from who it says it’s from, it would probably come from the company’s website. In the email above, the website the email came from has nothing to do with the company it says it’s from. If however the email mimicks your email the sender is hiding their identity.
Same goes for the “Reply To” field. You can tell the email address has been spoofed because the “Reply To” address doesn’t match the “From” address.
Email spoofing the process of disguising the original senders identity by creating email messages with a forged sender email address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the message.
Always check the recipients email. If you do not know or were not expecting anything from anyone DO NOT OPEN EMAIL ATTACHMENTS.
If you get emails from web designer telling you your website is s##t do ask your current web designers to send an audit report of your website. Also if the sender is sending you an email from a gmail, hotmail or msn account without a company signature in the footer of the email this is reason for alarm bells to ring.
DO NOT USE OFFSHORE WEBSITE DESIGNERS.
SUPPORT LOCAL BUSINESSES!
Do not reply to anyone that has a suspicious email address, especially if it is a long thread of letters and numbers that do not resemble a person or company.
Always check email addresses from the sender.
Lastly always mark emails that have landed in your inbox as ‘report phishing’ rather than simply deleting them as the email client will block this email from their servers to stop other people falling victim.
I named and shamed this person whom sent me the email whom most probably is not even using their real name. So low and behold today I receive another email to a website I own which is a Business Directory and Community Hub for the district in CardiffUK where I live ‘Roath’.
Now you have to think to yourself how would this keyword be a conflict or beneficial to anyone in China?
The email is as follows and when I replied back it bounced, you can come to your own conclusions but I think some one is attempting to scam me and whoever it is has to get up earlier than me to catch me out.
Original Scam Email.
Nick Liu <email@example.com> 05:35
(It’s very urgent, therefore we kindly ask you to forward this email to your CEO. If you believe this has been sent to you in error, please ignore it. Thanks) Dear CEO, This is a formal email. We are the Domain Registration Service company in China. Here I have something to confirm with you. On November 4, 2020, we received an application from Hongxin Ltd requested “roathlife” as their internet keyword and China (CN) domain names (roathlife.cn, roathlife.com.cn, roathlife.net.cn, roathlife.org.cn). But after checking it, we find this name conflict with your company name or trademark. In order to deal with this matter better, it’s necessary to send email to you and confirm whether this company is your distributor in China? Best Regards
Nick Liu | Service & Operations Manager
China Registry (Head Office)
6012, Xingdi Building, No. 1698 Yishan Road, Shanghai 201103, China
This email contains privileged and confidential information intended for the addressee only. If you are not the intended recipient, please destroy this email and inform the sender immediately. We appreciate you respecting the confidentiality of this information by not disclosing or using the information in this email.
Your domain names are on different GEO territories to myself being the owner from the time 2020-03-06 and I have actively developed my sites, therefore there is no trademark conflict as I was the first person to publicly publish my domains names.
I would suggest your client refrains from registering the domain names because this could cause a problem in future, although I have no intention of ever marketing my business in China.
Mail Delivery System<firstname.lastname@example.org>
This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more ofits recipients. This is a permanent error. The following address(es)failed: email@example.com:SMTP error from remote server for RCPT TO command, host: mx.chinaregistryshanghai.org (184.108.40.206) reason: 550-Rejected because 220.127.116.11 is in a black list at zen.spamhaus.org550 https://www.spamhaus.org/sbl/query/SBL275660
— The header of the original message is following. — Received: from oxbsltgw54.schlund.de ([172.19.249.7]) by mrelayeu.kundenserver.de (mreue106 [18.104.22.168]) with ESMTPSA (Nemesis) id 1MnItm-1jtEYQ3Htc-00jJDA for <firstname.lastname@example.org>; Wed, 04 Nov 2020 14:09:54 +0100Date: Wed, 4 Nov 2020 13:09:53 +0000 (GMT)From: info <email@example.com>To: Nick Liu <firstname.lastname@example.org>Message-ID: <email@example.com>In-Reply-To: <firstname.lastname@example.org>References: <email@example.com>Subject: Re: roathlifeMIME-Version: 1.0Content-Type: multipart/related; boundary=”—-=_Part_17396_1939878953.1604495393253″X-Priority: 3Importance: NormalX-Mailer: Open-Xchange Mailer v7.10.3-Rev26X-Originating-Client: open-xchange-appsuiteX-Provags-ID: V03:K1:0iM3qWu96k7+nm6+4FH27tKPwLRBi3asRo6IkltspIx3TiUD8kb 64Uvu0jRQatF1oh4vDfkRIqu/dq6NyeeDKKZXgjPLwi3RTMcoCU6+tQ/oULYFxnptlDS3oS IlPnkssjWtzaXo3GN5ANdoR8YOAFSgjH7j7v7yiwWdYUG6l3EGRySxCDl5dFixgSGqCZFZc 7KMuQNqSZjTIl6nphFPyA==X-Spam-Flag: YESX-UI-Out-Filterresults: junk:10;V03:K0:dkv51dmL+xI=:uYemXnJzgY5oUhy06auNt9z0 /s6XKe4ewOfXuhxlYsCuQnjZQZ8rRyx3d9vm8um4MQVT2TCP40TEZLgS+hlkJ7zOGoNigfUsO /uxX0VlvP1Y2598VU7SFDa71yNpiYn57pI+0NRWuxMDVxzXftUBgs9OWRrR2YcRpBBBLAc4OL uQE+bUIjVqcX7gI9Ht/2gH/HmgicgKTL7IRwiJmPzRin6agRweednEeaGngyVgz1hFNU/JwWe aFqNNvU0Q+2UHmAdKte0AlLqugU/30/GG++dkm//fmctpH/2xvAOMmWRH3UMEjaQybSFNEGIv rVSrzn+pPorxI8nsm5NaMKHrKhFiP4kZ3xt/yT8fY9Tc/b6BOBTtFT41i5RNa/cP14dDxlVG/ Grj3D5HVH4qNOjgzjPEcQFhvViI8WGsQFX+gLi1NC7E/EIpaWoXFI3YD4oL0ihfpC/JoCsPL3 /SLhxA6S4CWKkdsFvBSQfJNSddtAnxDwjcsy+RS5YEGl4i6nIqqFkNTeFeiU7lMpeE1I85/AN uc79t8O70Dx02z5zhq2c=
People who prey on vulnerable people online are called cyber criminals.
These cyber criminals use a multitude of strategies to help someone part with sensitive information in order then to commit a crime.
The most common is email phishing whereby the recipient opens an email with a virus in it called malware. Malware can infiltrate the users computer and will collect data without the user knowing. Another way a cyber criminal targets a user is through telephone or text message by someone posing as a legitimate institution to lure an innocent person into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. This as a consequence can lead to identity theft.
If you notice an email that has clickable hyperlinks and attachments do some due diligence.
I will post a couple of emails that I have had today.
Cyber crime has been around for a very long time with the first phishing lawsuit filed in 2004 against a teenager from California who cloned a website “America Online”. This fake website conned people into thinking it was the real deal and as a consequence sensitive data from users was stolen to gain access to credit card details to withdraw money from their accounts. There are other ways that cyber criminals work other than through emails and website phishing. These other methods can also be ‘vishing’ (voice phishing), ‘smishing’ (SMS Phishing).
Most Popular Email Phishing is ad follows:
(In most case you do not know who has sent you the email but cybercriminals are being clever by cloning a popular organization such as Netflix, Apple, HMRC, GOV websites and Banks).
Always be vigilant and open the senders email address to see if the sender looks legitimate or not.
Sometimes the sender may look legit as in the example I set out below but may have a clickable hyperlink. Never click on clickable links or download attachments if you are not expecting anything from anyone or do not know who the sender is.
Sometimes the cybercriminals may use an alternative website very similar to the original one to make it look like the email was sent from the real company. Usually by simply opening the senders email address you can see if they are the ‘Real McCoy’ or not. If you have been cc’d and you can see multiple recipients this is either spam or a virus.
Sometimes you may get an email saying you have been hacked and you are being blackmailed to pay them with bitcoin within 24 hours or all your data will be sold on the dark web. Never interact with these people as it only could cause further problems, instead block and report and change you passwords.
What do you do when you receive these email?
Depending on your email client. I use outlook for mine I can block their email and then report them as phishing emails. I think what Microsoft does is bounce all emails from the sender after they get reported or block them permanently.
Remember that clickable hyperlinks and attachments could contain payloads like ransomware or other viruses. Hyperlinks are either blue or purple and your cursor turns into an arrow when you hover over them.
Below is a couple of dodgy emails I received today one forwarded from my client and when I phoned the number it went dead. (I did not click it ). The other thing may I add is if you type any words after the forward slash of any domain name that does not correspond to a created page, the search results will always be the same and will come up with a 404 error message or page not found. This is a way for a non IT person who relies on Web Designers and may not realise the danger they may be in by receiving an email like the one below and may inevitably end up get hood winked and scammed.
In the last few days I attempted to set up dentistry insurance only to find the Cardiff in particular al though it applies to all of Wales in the UK as from Friday 23rd October to 9th November 2020 we are on lockdown again. So before I could even set up the dentistry plan I then had second thoughts and cancelled it this morning and asked if the company I was dealing with was associated with Close Brothers and they said they were not.
I then rang ‘Close Brothers’ after attempting to copy and paste the url into my browser
Why set a name called Atlantis 1 and then use a totally different name for the domain name……….very confusing and I have not got a clue who sent me this email and why. Obviously I will have to wait it out.