Monday, February 1, 2010

How to Report a Phishing Scam

Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or ecommerce provider. The email tries to trick recipients into clicking a link which leads to a spoofed website that only looks like the real bank or ecommerce site. If the recipient enters their login details on the fake website, their credentials will be sent to the attackers. Using this method, attackers are often able to gain not only the login username and password, but quite often the victim also divulges their credit card and other sensitive financial and personal information.

If you've received a phishing email and fallen victim to it, stop reading now and contact your financial institution(s) immediately by phone or in person.


If you've received a phishing email, haven't fallen victim, but want to report the email, here's how.

You can usually send a copy to abuse@DOMAIN.com where DOMAIN.com signifies the company to which you are directing the email. For example, abuse@suntrust.com is the email address for sending phishing emails purporting to be from SunTrust Bank.
If in the United States, you can also forward a copy to the Federal Trade Commission (FTC) using the address spam@uce.gov.
If you aren't in the U.S. and the abuse@DOMAIN.com address bounces, you can visit the real website by using a pre-existing bookmark in your browser or typing the known good URL (link) into your browser. Do not use the link included in the phishing email! Once on the site, look for a viable contact resource. For example, at the very bottom of the page on the eBay website is a link titled "Security & Resource Center". Following that link takes you to a page that instructs you on how to submit "suspicious-looking email that appears to be from eBay or PayPal and you want eBay to take action." If you can't find a specific security resource, try looking for general contact or support contact details on the website.
If you still can't find suitable contact details and you're not ready to give up, you can always do a domain name lookup, referred to as a whois, and get the contact details that way. Keep in mind that whois information is often grossly out-of-date and the email addresses listed therein are frequently unmonitored accounts. Still, it's worth a shot. Popular whois servers include APNIC, ARIN, and Network Solutions.
Whichever method you choose, be sure to forward the email as an attachment so that the HTML encoding and header information is preserved; otherwise the email will be of little use for investigative purposes.

Target Platforms
Trojan Remover is designed for Windows 2000/XP/Vista/Windows 7 - however it is not currently compatible with any 64bit versions of Windows.

What Trojan Remover Does
Trojan Remover examines all the system files, the Windows Registry and the programs and files loaded at boot time. The majority of malicious programs (once triggered) load this way.

Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Remover also checks to see if Windows loads Services which are hidden by Rootkit techniques and warns you if it finds any.


For each identified Trojan Horse, Worm, or other malware, Trojan Remover pops up an alert screen which shows the file location and name; it offers to remove the program's reference from the system files and allows you to rename the file to stop its activation.


Most modern Malware programs are memory-resident, which makes their de-activation more difficult. How many times have you been told to start your computer in 'Safe' mode, or even worse, in DOS? Trojan Remover does all this for you. When it finds Malware that is memory-resident, Trojan Remover automatically re-starts (on request) your system and completely DISABLES the Malware before Windows restarts.

Trojan Remover writes a detailed logfile every time it performs a scan. This logfile contains information on which programs load at boot-time, and what (if any) actions Trojan Remover carried out. The logfile can be viewed and printed using Notepad.


The FastScan component of Trojan Remover is set to automatically scan for Malware every time you start your PC (you can disable this if you wish). You can also run the FastScan manually any time you wish (START | Programs | Trojan Remover | FastScan). This FastScan checks all program-loading points - it is a quick and effective check for actively-loading malicious programs. You can scan the whole drive, or any directories on the drive, by selecting Scan a Drive/Directory from the main Trojan Remover menu.


You can scan individual files and directories from within Windows Explorer.

Trojan Remover incorporates an integral Updater allowing for quick and easy Database updates. You can use the Windows Task Scheduler to schedule automatic updates.

The program comes with a comprehensive help file (this can be viewed online, here).

Context-sensitive help is also available for most screens by tapping the F1 key.


This essential security utility is available for you to try out FREE. Download a fully-working evaluation copy today. The program will work for 30 days before you need to decide whether you would like to register it.