Are you tired of seeing phishing attacks in the form of either tells from bots or fake twitch giveaway streams? Here's a really simple way you can help.
Step 1: Identify their domain name.
Here is an example phishing message: https://i.imgur.com/HmTy3QL.png
What you need to look for is the last . to identify the domain name. This is not a .com domain! The domain they are using for the attack in this example is "com-nq.xyz".
Step 2: Identify the domain registrar. All you have to do is go to who.is and type in the domain name. For every attempt I have seen so far, the registrar is NameSilo.
Step 3: Report the domain for phishing. Go to https://new.namesilo.com/phishing_report.php and fill out the form. You will need to provide your own email address (they will let you know once the domain has been placed on ClientHold status, at which point the site will no longer be accessible from that domain. They will have to buy a new one every time!)
In the real website you should include the link to the lodestone, and in phishing website the full link from the fake tell or twitch stream. In report, you should also mention that the real lodestone site does not require a login to view. I'm not sure if the image is required - I have been adding a screenshot of the phishing page, but it isn't necessarily a good idea to open the phishing site at all, so you could also just send a screenshot of the tell you received or the fake giveaway link.
Every time a report is dealt with (and they usually get dealt with pretty fast), the phishing site will become inaccessible and they will both have to notice it's not working and purchase a new domain, costing them money and keeping anyone who opens it safe during the downtime. If you have any other suggestions for how to cause the scammers trouble, please post in the comments!
submitted by /u/blahpy
[link] [comments]
Continue reading...
Step 1: Identify their domain name.
Here is an example phishing message: https://i.imgur.com/HmTy3QL.png
What you need to look for is the last . to identify the domain name. This is not a .com domain! The domain they are using for the attack in this example is "com-nq.xyz".
Step 2: Identify the domain registrar. All you have to do is go to who.is and type in the domain name. For every attempt I have seen so far, the registrar is NameSilo.
Step 3: Report the domain for phishing. Go to https://new.namesilo.com/phishing_report.php and fill out the form. You will need to provide your own email address (they will let you know once the domain has been placed on ClientHold status, at which point the site will no longer be accessible from that domain. They will have to buy a new one every time!)
In the real website you should include the link to the lodestone, and in phishing website the full link from the fake tell or twitch stream. In report, you should also mention that the real lodestone site does not require a login to view. I'm not sure if the image is required - I have been adding a screenshot of the phishing page, but it isn't necessarily a good idea to open the phishing site at all, so you could also just send a screenshot of the tell you received or the fake giveaway link.
Every time a report is dealt with (and they usually get dealt with pretty fast), the phishing site will become inaccessible and they will both have to notice it's not working and purchase a new domain, costing them money and keeping anyone who opens it safe during the downtime. If you have any other suggestions for how to cause the scammers trouble, please post in the comments!
submitted by /u/blahpy
[link] [comments]
Continue reading...