|
||||||||||||||
Beware Disaster-Related E-Mail Fraud |
||||
|
Spammers have begun using the World Trade Center disaster as an excuse to defraud generous people of money. Spammers can't be eliminated, but here's what enterprises can do to protect themselves. |
|||
|
|
|||
|
Event
On 12 September 2001, two Internet advocacy groups, Coalition Against Unsolicited Commercial Email and SpamCon Foundation, warned that some people have tried to profit from the World Trade Center attack by sending spam e-mail to solicit donations fraudulently. First TakeDisasters attract spammers who prey on people's generosity, but spammers present a moving target. They often open an account with an Internet service provider, send out their e-mail and then shut down the account so that they can't be replied to or traced. Or they relay e-mail via a third-party's machine to make it seem as though the spam has come from a legitimate source and to cloak the spammer's real point of origin. The e-mail messages include requests to send money to a postal address or to click on a URL and donate money by credit card. Spammers can thus collect money without being identified. The terrorist attacks will likely ignite a flurry of Internet hoaxes and chain letters. People should suspect any message that asks them to forward the e-mail to others or that does a lot of name dropping a favorite ploy of scam artists to gain credibility. Such hoaxes live for a long time on the Internet because unsuspecting people forward them to large lists while those who suspect fraud quietly delete them. By itself, the use of spam blacklists, which highlight the latest victims of relay attacks, is inadequate. By the time the site appears on the blacklist, the actual spammer has moved on to the next victim. Enterprises should therefore:
Web sites that publish information on e-mail hoaxes include:
Analytical Sources: Maurene Grey and Joyce Graff, Intranets & Electronic Workplace |
|||
|
Entire contents © 2001 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The content herein is often based on late-breaking events whose sources are believed to be reliable. The conclusions, projections and recommendations represent Gartner's initial analysis. As a result, our positions are subject to refinements or major changes as Gartner analysts gather more information and perform further analysis. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of the information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof.
Resource ID: 340786 |
||