Protect Yourself and Report the Latest Frauds, Scams, Spams, Fakes, Identify Theft Hacks and Hoaxes
There are affiliate links on this page.
Read our disclosure policy
to learn more.
Translate this page to any language by choosing a language in the box below.
From February, 2007, there are emails that are made to look as if they are sent from the FDIC or VeriSign, Inc. These scam emails ask recipients to run a "security guard script" to secure Web sites. Currently, the emails have false return addresses of:
and the subject lines include the phrases:
The emails are frauds and they were not sent by the FDIC or VeriSign, Inc.
Information about counterfeit items, cyber-fraud incidents and other fraudulent activity may be forwarded to the FDIC's Cyber-Fraud and Financial Crimes Section, 550 17th Street, N.W., Room F-4004, Washington, D.C. 20429, or transmitted electronically to alert@fdic.gov . Questions related to federal deposit insurance or consumer issues should be submitted to the FDIC using an online form that can be accessed at http://www2.fdic.gov/starsmail/index.asp .
Below is an alert published by the FDIC to warn of these scams:
Special Alert
TO: | CHIEF EXECUTIVE OFFICER (also of interest to Security Officer) |
SUBJECT: | Fraudulent E-Mails Claiming to Be From the FDIC |
Summary: | E-mails fraudulently claiming to be from the FDIC or VeriSign, Inc. are attempting to deceive financial institutions in to installing unknown software on their computer networks. |
The Federal Deposit Insurance Corporation (FDIC) has become aware of e-mails that appear to be sent from the FDIC or VeriSign, Inc. and ask recipients to run a "security guard script" to secure Web sites. Currently, the e-mails are purportedly from "FDIC Legal Information Technology," "FDIC Information Security," or "Verisign Inc." and the subject lines include the phrase "Regular Security Maintenance" or "Regular Hosting Security Maintenance." The e- mails are fraudulent and were not sent by the FDIC or VeriSign, Inc.
The fraudulent e-mails state that "to secure your websites, please use the attached file and (for UNIX/Linux Based servers) upload the file "vprotect.php" in: "./public_html" or (for Windows Based servers) in: "./wwwroot" in your site." The e-mails also provide instructions for recipients who "do not know how to use" the file.
The FDIC is working with the United States Computer Emergency Readiness Team to determine the exact effects of the executable file. Recipients should consider this file to be a malicious attempt to collect personal or confidential information. Financial institutions and consumers should NOT download the executable file attached to the e-mails. Consumers and financial institutions should report any similar situations by following the procedures below.
Information about counterfeit items, cyber-fraud incidents and other fraudulent activity may be forwarded to the FDIC's Cyber-Fraud and Financial Crimes Section, 550 17th Street, N.W., Room F-4004, Washington, D.C. 20429, or transmitted electronically to alert@fdic.gov . Questions related to federal deposit insurance or consumer issues should be submitted to the FDIC using an online form that can be accessed at http://www2.fdic.gov/starsmail/index.asp .
Sandra L. Thompson Director Division of Supervision and Consumer Protection |
|
|
Distribution: All FDIC-Insured Institutions
NOTE: Paper copies of FDIC Special Alerts may be obtained through the FDIC's Public Information Center (1-877-275-3342 or 703-562-2200).
For more information about phishing, see this page
.
All images and text � Copyright Benivia, LLC 2017 Disclaimer and Privacy Policy
Names used by scammers in the examples on this
page and others often belong to real people and businesses who often have no
knowledge of nor connection to the scammer's use of their name and
information. Sample scam emails and other documents presented on this
website are real copies of the scam to help potential victims recognize and
avoid it. You should presume that any names used and presented here in a
scam are either fictitious or used without their legitimate owner's
permission and have no relationship to any person or business that also
shares that name, address, phone number or other identifying information.
Permission is given to link to any public page on http://www.ConsumerFraudReporting.org