{"id":1353,"date":"2012-06-03T21:49:04","date_gmt":"2012-06-04T04:49:04","guid":{"rendered":"http:\/\/computertechsreno.com\/tips\/?p=1353"},"modified":"2023-12-18T07:28:24","modified_gmt":"2023-12-18T15:28:24","slug":"email-spam-from-someone-you-know-links-to-websites-that-hack-your-password","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/email-spam-from-someone-you-know-links-to-websites-that-hack-your-password\/","title":{"rendered":"Email spam from someone you know links to websites that hack your password"},"content":{"rendered":"<p><em>Updated 8\/26\/14:<\/em><\/p>\n<p>Over the years\u00a0we&#8217;ve been contacted by dozens of clients who have had their email account hacked and sending out spam to all of their contacts. This happened shortly after clicking on a link in an abnormal email from someone they know. The website that the link opens typically shows a video while capturing email address and password credentials, then hackers log into the email account and send similar spam emails to all of their contacts.<\/p>\n<p>The subject line\u00a0of the emails are vague in hopes that you&#8217;ll be curious and open it. Examples include:<\/p>\n<p>&#8211; Hey<br \/>\n&#8211; Hi<br \/>\n&#8211; fwd:<br \/>\n&#8211; re:<\/p>\n<p>Some of the phrases in the body of the emails include:<\/p>\n<p>&#8211; wow this is amazing look into this [link]<br \/>\n&#8211; this is awesome\u00a0[link]<br \/>\n&#8211;\u00a0wow can you look at this\u00a0[link]<br \/>\n&#8211;\u00a0wow this is crazy check it out\u00a0[link]<br \/>\n&#8211;\u00a0this is pretty amazing you should give it a look\u00a0[link]<br \/>\n&#8211; [link only]<\/p>\n<p>Other variants coming\u00a0from the email address from someone you know include links to an unknown website that will:<\/p>\n<p>&#8211; Ask you to enter your email login credentials in order to view a document or photo<br \/>\n&#8211; Ask you to install Java or Flash Player in order to view the website<\/p>\n<p>The methods above are tricks to get you to divulge private information or to install malware on your computer.<\/p>\n<p>Security reminder: Do not click on links in an email that you are not expecting or if you are not absolutely sure that the link will open a trustworthy website.\u00a0If you discover that your email account has already been hacked, see our information about\u00a0<a href=\"http:\/\/computertechsreno.com\/tips\/what-to-do-if-your-email-has-been-hacked\/\" target=\"_blank\" rel=\"noopener\">what to do if your email account has been hacked<\/a>.<\/p>\n<p>Also read about <a title=\"Click here to view the article\" href=\"http:\/\/computertechsreno.com\/tips\/how-to-spot-fake-email-from-legitimate-companies\/\" target=\"_blank\" rel=\"noopener\">emails that appear to come from a business that you recognize<\/a>.<\/p>\n<p>More essential reading:<\/p>\n<p>\u2022 More information about this method to hack email accounts at <a href=\"http:\/\/truthorfiction.com\/rumors\/z\/Zombies.htm\" target=\"_blank\" rel=\"noopener\">TruthOrFiction.com<\/a><\/p>\n<a href=\"https:\/\/computertechsreno.com\/tips\/email-spam-from-someone-you-know-links-to-websites-that-hack-your-password\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/email-spam-from-someone-you-know-links-to-websites-that-hack-your-password\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated 8\/26\/14: Over the years\u00a0we&#8217;ve been contacted by dozens of clients who have had their email account hacked and sending out spam to all of their contacts. This happened shortly after clicking on a link in an abnormal email from someone they know. The website that the link opens typically shows a video while capturing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[],"class_list":["post-1353","post","type-post","status-publish","format-standard","hentry","category-passwords","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=1353"}],"version-history":[{"count":16,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1353\/revisions"}],"predecessor-version":[{"id":3915,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1353\/revisions\/3915"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=1353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}