Skip links

How I Nearly Fell Prey to a Scam

How I Nearly Fell Prey to a Scam

You read that correctly. Just a few days ago, I almost fell for a phishing scam. Its deceptive simplicity, coupled with my brief lapse in attention, nearly had me fooled. This week, I want to share the specifics of this scam, drawing from my experience to help you stay alert.

It began with this email (https://share.zight.com/z8udg221) received through our website’s contact form. The sender was someone named Marc from John Deere, seeking IT services related to computer hardware. Initially, it seemed unlikely to me that someone from John Deere would need our IT assistance, considering they likely have their own internal department. However, we have previously served smaller departments from large corporations, often for utilizing their marketing funds or to expedite urgent purchases. A search for ‘Marc Johnson’ on LinkedIn yielded a legitimate-looking profile. Moreover, entering the domain from his email, “deerecompany.com,” into my browser redirected me to the John Deere website. The realness of both Marc and the domain swayed me to respond.

I replied to Marc (https://share.zight.com/WnupnPvE), inquiring how we could assist. His response (https://share.zight.com/9ZuLpn1k) was a question about if we kept any laptops for sale in stock, sent from a John Deere email address. His email signature and writing style appeared genuine. Nevertheless, something felt amiss, prompting me to seek our lead technician Daniel’s expertise. Daniel’s quick investigation revealed a basic phishing strategy I had overlooked.

Daniel discovered that the domain “deerecompany.com” was recently registered and wasn’t the actual Deere website, which is “deere.com.” The scammer had cleverly bought a similar-sounding domain, set up an easy redirect to the real John Deere site, and impersonated an actual John Deere employee, Marc Johnson. Using our website’s contact form, which is set up to bypass our spam filters, was a strategic move to legitimize the communication and ensure the email reached my inbox.

What could I have done to detect this? Our email security service added a warning banner (https://share.zight.com/E0umvQ1K), a clear red flag to his direct email. I also should have been more observant of the address bar after typing the fake domain name. Additionally, reaching out to the real Marc Johnson on LinkedIn could have clarified things.

This phishing attack was exceedingly simple and very cheap for them to execute, yet it’s potent enough to deceive anyone, especially when distracted. With an increasing number of people worldwide adopting hacking as a profession, the low-cost nature of cyber attacks, poor law enforcement, and the availability of technologies like ChatGPT that enable flawless English communication, cyber threats are continuously evolving.

What can you do? Take warning banners from email security systems seriously and treat quarantined messages with caution. Always remain vigilant. And when in doubt, don’t hesitate to ask for help. That’s what we’re here for.

Stay safe!

– Burak Sarac, Team Lead

Google will Start Deleting Inactive Accounts. Here’s How to Save Your Google Account

Google taking action on inactive accounts. Starting from December 1, Google is set to delete inactive accounts within days, as part of the company’s updated account policy. This move by Google is significant for users who may have accounts they haven’t used in a while. This article provides valuable insights into why Google is implementing this change and outlines steps on how users can save their data before the deletion process begins.

18 Best Ways to Protect Your Devices From Cyber Threats

As we commemorate National Computer Security Day today, Let’s not forget the significance of taking proactive measures to protect personal and sensitive information from cyber threats. With cyber-attacks becoming increasingly sophisticated, this 18 Ways to Secure Your Devices From Hackers emphasizes the importance of user awareness and proactive measures to safeguard personal and sensitive information from any cyber threats and strategies to protect your devices from potential cyber risks.

Having trouble with Your Google Sheets Formulas? 

Have you ever encountered a situation in Google Sheets where your formulas seem to be misbehaving, not updating, or not working as intended, causing frustration and hindering your workflow? This “Top 7 Fixes for Formulas Not Working in Google Sheets” provides practical solutions to troubleshoot and resolve these formula-related challenges. It also aims to assist anyone in overcoming formula-related hurdles and ensuring a smooth experience with Google Sheets.

National Cookie Day!

National Cookie Day is just around the corner, the 4th of December, Monday, and what better way to honor it than by exploring this comprehensive list of delectable cookie recipes? This “50 Best Cookie Recipes to Make in 2023” showcases a diverse array of cookie recipes, promising to satisfy sweet cravings, elevate the joy of baking, and share delicious homemade cookies with friends and family on this special National Cookie Day.

We need your help!

We start every day with the aim to spoil you with an exceptional IT support because we truly care. If we’ve exceeded your expectations, would you consider sharing your experience with others through a sweet Google review? Your kind words will not only brighten our day but also help potential small businesses discover the reliable IT support they deserve. Thank you for being a part of the CTS Care family, we appreciate your continued trust in us.

Leave a Google Review