So I get the following e-mail today. I’m including headers, and indicating where form entry areas and “submit” buttons are via text since I obviously can’t replicate the HTML here:
Header:
Obviously, this asshat isn’t with PayPal.
Body:
Mercifully, I’ve never used PayPal, so I knew this was faux right from the start (and I wouldn’t send my CC# over email anyway, even in the guise of a web form – I’d visit the PayPal website first). But I’ve gotta admit, this thing looked pretty convincing at first glance. I can see plenty of people getting duped.
And it pisses me off plenty because I’ve got to warn my parents (because they might fall for it), which only makes them more afraid to use the computer. Grrrrrrr.
I guess this isn’t so much a rant as a PSA. Emailers beware.
These type of scams keep being perpetuated by the blockheads who do fall for them and eagerly give away this kind of information. “There’s a sucker born every minute!”
Everything before the @ sign in the url of the form is ignored by the browser and the server, so davidpage.port5.com is the domain the form is being submitted to, and 01001…1001.php is the file. I just tried entering the domain into my browser, and got a non-reponse.
Portland Communications Ltd (PORT48-DOM)
3 Lyon Road
Walton On Thames, Surrey KT12 3PU
UK
Domain Name: PORT5.COM
Administrative Contact, Technical Contact:
Clements, Justin (JC31547) sales@PORTLAND.CO.UK
Portland Communications Ltd
3 Lyon Road
Walton On Thames, Surrey KT12 3PU
UK
01932 227234 fax: 01932 252569
Record expires on 02-Aug-2003.
Record created on 15-May-2002.
Database last updated on 10-Jun-2003 20:12:28 EDT.
Domain servers in listed order:
NS0.PORTLAND.CO.UK 212.15.64.83
NS1.PORTLAND.CO.UK 212.15.64.25
Going to www.port5.com, they’re a webhosting company that offers free subdomains (e.g., davidpage.port5.com), and you can sign up from anywhere in the world, so it’s no help locating him. So, your scammer obtains a free subdomain there, locates his php script to forward your info somewhere else, and collects his illicit booty.
You can complain to port5, and should. They’ll shut down his account (unless they’re in on it).
Well, anything between the ‘http://’ and the ‘@’ in the beginning, without getting into the details, is totally ignored by the browser in this instance. Thus, the info is going to http://davidpage.port5.com, whatever that is. The numbers are obviously binary, but I’m not sure whether a browser would interpret those or leave them the way they are. In any case, upon trying it, it appears that the host has taken down the page, as it’s a 404 error now.
I got the same damn message. Like the OP, I had to warn my parents about it–and they would have responded too! I love my parents dearly and think they’re normally quite intelligent. But damn they can be naive about things!
I suspected the thing was a scam. To be on the safe side, I deleted the e-mail and “updated” my info directly on eBay’s web site. But it’s good to finally see confirmation of the scam. (I was hoping eBay would have some announcement warning about it…they really should!) Now I don’t need to bother even with that step.
I received something very similar about earthlink. They asked for everything but a DNA sample. If that wasn’t enough of a tip-off the abhorrent spelling sure was.
I recieved something like that from AOL not so long ago. Unfortunately for them my bank account had just been drafted so I knew my info. was current. I reported them. It makes me so angry that there are people out there like that, their karma is gonna kick them in the ass so hard. I just wish I could be there to see it. :mad:
I got something like this yesterday, The subject line was “Pay-Pal Confirmation needed!” and then when I opened it, out of sheer curiousity, it pretty much asked me for everything short of my first born! I don’t have Pay-Pal. I got a few things like that from AOL too. I don’t have AOL either. sigh
I just phoned the number in the whois entry (the company Portland is just down the road from my office) and verified that this particular case has been definitely dealt with.
I’d be interested to know what they actually do, except boot the miscreant off their servers. Do they even report the scam, plus all the info on that customer they have, to the police?