Phishing is not fishing.
Facebook is an increasingly popular platform, so it follows that the crooks will find it irresistible. Here is an example of a phishing email sent to me purporting to be from facebook.
Dear user of facebook,
Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.
The important bits are in the headers: Return-Path: <firstname.lastname@example.org> Delivery-Date: Thu, 08 Apr 2010 15:46:07 -0400 Received-SPF: softfail (mxus0: transitioning domain of ft.com does not designate 126.96.36.199 as permitted sender) client-ip=188.8.131.52; email@example.com; helo=VAZHQJW; Received: from VAZHQJW ([184.108.40.206]) by mx.XXXXX.XX (node=mxus0) with ESMTP (Nemesis) id 0MStdl-1O7yX20MT7-00Rw8B ; Thu, 08 Apr 2010 15:46:07 -0400 Received: from 220.127.116.11 by ft.com.mail6.psmtp.com; Thu, 8 Apr 2010 14:44:41 -0500 Message-ID: <000d01cad753$eea50510$6400a8c0@eventualities9> From: "Your Facebook" <firstname.lastname@example.org> To: <email@example.com>
So beware when opening emails, check before opening any zip file, this header indicate that ft.com might have a compromised server or that its is being spoofed along with the facebook premise.
- Please remember that you will never be asked for your password or pin number, no matter how plausable the socially engineered email is.
- Check who sent it
- Where is it going to before you press send