Is SubdoMailing the most dangerous phishing scam yet? • Blisstech Solutions

Picture this: You’re going about your day, checking your emails, when suddenly you see a message from a company you trust.

You think, “Great! That’s safe to read”. But hold on just one minute… this email is not what it seems.

It’s part of yet another scam created by cybercriminals to trick you into clicking malicious links or giving up sensitive info. It’s called “SubdoMailing,” and it’s as dangerous as it sounds.

What’s the deal?

Just like regular phishing attacks, cybercriminals pretend to be trusted brands.

But here’s how it works: These cybercriminals scour the internet for unoccupied subdomains of reputable companies. You know those extra bits in a web address that come before the main domain? For example, experience.trustedbrand.com. That ‘experience’ bit is the subdomain.

They find a subdomain that the brand is no longer using and is still pointing to an external domain that’s no longer registered.

Then, they buy the domain and set up the scam website.

So, you believe you’re clicking on experience.trustedbrand.com… but you have no idea it automatically redirects to scamwebsite.com.

The criminals are sending out five million emails a day targeting people in businesses just like yours.

Because these emails seem to come from a legitimate source, they often sail right past usual security checks and land in your inbox.

Here’s our advice to avoid SubdoMailing scams and keep your data safe and sound:

  • Be wary of any emails that seem even remotely suspicious. If something looks fishy, it probably is.
  • Consider investing in top-notch security software to keep the cyber criminals at bay. It might seem like an extra expense, but trust us, it’s worth it.

As always, if you need help with this or any other aspect of your email security, get in touch.

More Content

Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...
Where could AI take your business - Blog image

Could AI be the key to your businesses growth?

Artificial Intelligence (AI) is no longer just a futuristic concept. It's here now, and businesses of all sizes need to start embracing it to stay ahead of the competition. Our latest guide shows you how to use AI to revolutionise your business, from customer support...
Beware these free tools – they may be hiding ransomware

Beware these free tools – they may be hiding ransomware

Need to change a file from one format to another? Easy, just Google a file converter, right? Stop! That may not be as safe as it seems. Find out why here…

How to use footnotes and endnotes in Word

Tech Tip: How to use footnotes and endnotes in Word

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you may need to expand on certain sentences without making the...
You might hold the secret to data security in your finger

You might hold the secret to data security in your finger

Is your password keeping your data as safe as it could be? Maybe not. And there are new, safer alternatives to try. Here are all the details.

Tech Tip: How to Sync Teams Files to Your Computer

Hello everyone, welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you use Microsoft 365?    👉 Do you need to collaborate on documents with your colleagues?    👉 Do you want to do this using the same familiar Windows...

Can your business go green by switching to the cloud?

Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More

Windows is the prime target for cyber criminals

With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals.

Don’t forget your phone when you think about cyber security

Our phones are a goldmine of private information. If they’re not as secure your other devices, they can become a gaping hole in your cyber security

Microsoft wants you to pay for updates

Microsoft wants you to pay for updates

Microsoft plans to charge for updates to Windows 10 starting next year (2025). We tell you your three options… and which we recommend.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05