IT.COM

Network Solutions Spoof Email - Beware

Spaceship Spaceship
Watch
I received following email today ...


Dear Network Solutions Customer,

We recently notified you that the registration period for your Network Solutions domain name had expired. As a benefit of having previously registered a domain name(s) with Network Solutions, you are eligible to receive a percentage of the net proceeds that were generated from the renewal and transfer of the domain name you chose not to renew. Since you have chosen not to renew the domain name listed below during the applicable grace period, we were successful in securing a back..order for this domain name on your behalf and it has been transferred to another party in accordance with the Service Agreement.

Renew your domain now -http://www.networksolutions...dot.. .com

You must click on the following link, enter your domain name, and confirm your contact information in order to claim these funds. If your contact information is not correct, you must enter Account Manager and make the appropriate changes prior to clicking "submit" from the confirmation screen. If you do not do this, you will be confirming inaccurate information and will not receive any payment. Checks will only be made payable and mailed to the Account Holder of record.

Sincerely,

Network Solutions® Customer Support
 
0
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Phish Alert - http://www.networksolutions.com

>
> Dear Network Solutions Customer,
>
> We recently notified you that the registration period for your Network Solutions domain name had expired. As a benefit of having previously registered a domain name(s) with Network Solutions, you are eligible to receive a percentage of the net proceeds that were generated from the renewal and transfer of the domain name you chose not to renew. Since you have chosen not to renew the domain name listed below during the applicable grace period, we were successful in securing a backorder for this domain name on your behalf and it has been transferred to another party in accordance with the Service Agreement.
>
> Renew your domain now - http://www.networksolutions.com
THE HYPERLINK IS www . networksolutions.21com.asia !! BEWARE
>
> You must click on the following link, enter your domain name, and confirm your contact information in order to claim these funds. If your contact information is not correct, you must enter Account Manager and make the appropriate changes prior to clicking "submit" from the confirmation screen. If you do not do this, you will be confirming inaccurate information and will not receive any payment. Checks will only be made payable and mailed to the Account Holder of record.
>
> Sincerely,
>
> Network Solutions® Customer Support




Be careful out there guys.
 
Last edited by a moderator:
0
•••
How can a domainer fall victim to this type of URL trick? :gl:
 
0
•••
0
•••
InvisionTech said:
How can a domainer fall victim to this type of URL trick? :gl:
true..... maybe i should post this on soccermomsforum
 
0
•••
0
•••
It must happen or we wouldn't have this section.
It is a "head's up" that communities provide as some of our members might not be as astute or experienced as you.:hehe:
There are some very sneaky URL's floating around out there...

InvisionTech said:
How can a domainer fall victim to this type of URL trick? :gl:
 
0
•••
Just received the same email myself, it is the same people who are doing the eNom phishing emails I posted the other day by the looks of it.
 
0
•••
Got this, too... Never had any domains reg'd at NetSol.

After eNom and NetSol, I wonder if there'll be more registrars these spammers will start impersonating for similar type phishing scams.
 
0
•••
Always type in the domain name you are trying to get to.... you can always hoover over the link (do not click on it) and it will spell out what domain it is.

My wife is always clicking on links.. I get a little heated because they say they are from our bank but are not... :)

InvisionTech said:
How can a domainer fall victim to this type of URL trick? :gl:
 
Last edited:
1
•••
scammers also use smtp of netsol

Return-Path: xxxxx
Delivered-To: [email protected]
Received: (qmail 15036 invoked by uid 89); 19 Apr 2007 02:45:01 -0000
Received: by simscan 1.1.0 ppid: 15030, pid: 15032, t: 0.3525s
scanners: clamav: 0.87.1/m:34/d:1162 spam: 3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on
mailfw.fraudwatchers.org
X-Spam-Level: ***
X-Spam-Status: No, score=3.5 required=5.0 tests=AWL,HTML_20_30,HTML_MESSAGE,
RCVD_NUMERIC_HELO autolearn=no version=3.1.0
Received: from FWHost (HELO remote-fw) ()
by mailfw.fraudwatchers.org with SMTP; 19 Apr 2007 02:45:01 -0000
Received-SPF: none (mailfw.fraudwatchers.org: domain at xxxxx does not designate permitted sender hosts)
Received: from mail.networksolutionsemail.com (ns-omr7.mgt.hosting.dc2.netsol.com [10.49.6.70])
by omr7.networksolutionsemail.com (8.13.6/8.13.6) with SMTP id l3J2ix3k001941
for <[email protected]>; Wed, 18 Apr 2007 22:44:59 -0400
Received: (qmail 30822 invoked by uid 78); 19 Apr 2007 02:44:59 -0000
Received: from unknown (HELO webmail12) (205.178.146.50)
by ns-omr7.lb.hosting.dc2.netsol.com with SMTP; 19 Apr 2007 02:44:59 -0000
Received: from xxxxx
by webmail12 (Netsol 11.2.30)
with WEBMAIL id 5473;
Thu, 19 Apr 2007 02:44:59 +0000
From: xxxxx
To: [email protected]
Importance: Normal
Sensitivity: Normal
Message-ID: <W506122279854731176950699@webmail12>
X-Mailer: Network Solutions Webmail, Build 11.2.30
X-Originating-IP: [71.135.48.9]
X-Forwarded-For: [(null)]
Date: Thu, 19 Apr 2007 02:44:59 +0000
Subject: Fwd: HELLO FROM CHINA!!
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--=_vm_0011_W5061222798_5473_1176950699"
 
0
•••
0
•••
thanx for sharing wid us!!
 
0
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back