LIME warns customers of e-mail con

| 28/01/2013

phishing-scammer (239x300).jpg(CNS): Local telecommunications company LIME is telling its customers to be on the lookout for a phishing scam following a number of reports from people who have received emails claiming to be from LIME regarding webmail storage quotas which is not genuine.  Julie Hutton, Marketing Manager LIME Cayman Islands explained that this was a con designed to extract secure information from its customers and warned them not to give out sensitive information to anyone. Offering advice on how to avoid being scammed LIME warned its customer to stay off spam lists and to not post e-mail addresses on public sites.

“Phishing is an attempt, usually via e-mail, to trick people into revealing sensitive information like usernames, passwords, and credit card data by pretending to be a bank or some other legitimate entity,” said Hutton.

“The e-mails typically include a link to a Web site that appears to be legitimate and which prompts users to provide information.  Many phishing attempts originate from overseas so they often have misspellings and grammatical errors. Some have an urgent tone and they seek sensitive information that legitimate companies don't typically ask for via e-mail.  I would like to remind everyone that LIME would never ask for a customer’s password and customers should never give out that type of information whether over the phone or via email and avoid clicking on links if you suspect the email is not genuine” she added.

The contents of the email received by LIME customers read:

Dear User,
You have almost exceeded your webmail storage quota. To avoid losing your files & Mail Sevice Suspension, please kindly click on the link below.
please click here to proceed
Failure to do this will lead to suspension/deactivation of your Email account.
Thank you for choosing our service provider.
Sincerely,
Customer Support
Copyright 2013 LIME. Cable & Wireless Plc.

Offering some advice on how to avoid falling foul of phishing and other scams LIME said people should create an e-mail address that is less likely to get included in spam lists. Instead of bobsmith@xyz.com, the firm said use something like bob.smith.az@xyz.com .
If an e-mail looks reasonable contact the company directly if you receive an e-mail asking you to verify information. Type the address of the company into the address bar directly rather than click on a link. Or call them, but don't use any phone number provided in the e-mail. Don't give out personal information requested via e-mail. Legitimate companies and agencies will use regular mail for important communications and never ask customers to confirm log-in or passwords by clicking on links in e-mail.

Look carefully at the Web address a link directs to and type in addresses in the browser for businesses if you are uncertain. Don't open e-mail attachments that you did not expect to receive. Don't open download links in IM. And don't enter personal information in a pop-up window or e-mail. Make sure you are using a secure Web site when submitting financial and sensitive information. Change passwords frequently. Don't use the same password on multiple sites.

Regularly log into online accounts to monitor the activity and check statements. Use antivirus, antispam, and firewall software and keep your operating system and applications up-to-date.

Meanwhile the police also endorsed the advice given by LIME.

“No-one should ever open, or respond to a suspicious e-mail or provide passwords, account numbers or any other personal details. Criminals send out millions of these fraudulent e-mails to random e-mail addresses in the hope of luring persons to respond and provide their personal details” said Donavon Livingston Bailey, from the RCIPS.

If you receive a suspicious email, the best course of action is to delete it immediately and avoid following any suggested web links.   Anyone who wants to find out more about how to avoid online scams should contact the RCIPS Financial Crime Unit 949-8797.

Print Friendly, PDF & Email

Category: Crime

About the Author ()

Comments are closed.