Is SubdoMailing the most dangerous phishing scam yet? • Blisstech Solutions

Picture this: You’re going about your day, checking your emails, when suddenly you see a message from a company you trust.

You think, “Great! That’s safe to read”. But hold on just one minute… this email is not what it seems.

It’s part of yet another scam created by cybercriminals to trick you into clicking malicious links or giving up sensitive info. It’s called “SubdoMailing,” and it’s as dangerous as it sounds.

What’s the deal?

Just like regular phishing attacks, cybercriminals pretend to be trusted brands.

But here’s how it works: These cybercriminals scour the internet for unoccupied subdomains of reputable companies. You know those extra bits in a web address that come before the main domain? For example, experience.trustedbrand.com. That ‘experience’ bit is the subdomain.

They find a subdomain that the brand is no longer using and is still pointing to an external domain that’s no longer registered.

Then, they buy the domain and set up the scam website.

So, you believe you’re clicking on experience.trustedbrand.com… but you have no idea it automatically redirects to scamwebsite.com.

The criminals are sending out five million emails a day targeting people in businesses just like yours.

Because these emails seem to come from a legitimate source, they often sail right past usual security checks and land in your inbox.

Here’s our advice to avoid SubdoMailing scams and keep your data safe and sound:

  • Be wary of any emails that seem even remotely suspicious. If something looks fishy, it probably is.
  • Consider investing in top-notch security software to keep the cyber criminals at bay. It might seem like an extra expense, but trust us, it’s worth it.

As always, if you need help with this or any other aspect of your email security, get in touch.

More Content

How to plan a big IT project

We all dream of making changes to our business that will make us more efficient and profitable, but significant changes to the technology you use to run your business should never be rushed.

Tech Tip: How to Provide Remote Support for FREE with Quick Assist

This Two Minute Tech Tip shows you how to view or control someone else's screen for FREE. As an IT managed service provider we have lots of tools we have to pay for to help us support our clients. However, if you've ever been in a situation where you are trying to...

Tech Tip: How to share files securely in Teams

Welcome to a new Tuesday tech tip video where we will be exploring how to share files securely with people outside of your organisation using Microsoft 365 and Teams. Microsoft Teams is a powerful tool that allows for seamless collaboration and communication within an...

Tech Tip: How to Share Large Files for Free with WeTransfer

Welcome to a new Tuesday tech tip video where I will show you how to transfer large files using WeTransfer. Do you ever have trouble sending large files through email? Email servers have size limits, so you can't just attach a big file and send it off. This can be a...
Templates and Slide Masters in PowerPoint title

Tech Tip: How to use Templates and Slide Masters in PowerPoint

This Tech Tip will show you how to use templates and Slide Masters in PowerPoint to give your presentations a professional and consistent look. I've been using PowerPoint for over 25 years and have created a lot of presentations. Previously, I would work from a...

Serious Flaws Discovered in D-Link Routers

Researchers at Fortinet have uncovered serious flaws in four D-Link routers.  The router vulnerabilities were found to allow for remote code execution which means a remote attacker could gain control of your router, snoop on your traffic and redirect your browser to...
Metal work coming out of a metal apple

Do I need Antivirus on a Mac?

Broadly speaking there are two different types of desktop computer users; Windows users and Mac users (sorry Linux users but you are very much in the minority). Microsoft has included a free antivirus solution called Windows Defender for years because they realised...

Windows 11 Upgrade Requirements

The termination of support for Windows 10 by Microsoft in October 2025 means that business leaders need to plan for the transition to Windows 11, and this means understanding the Windows 11 upgrade requirements. Upgrading from Windows 10 to 11 is free, however,...

Cybercrime is always evolving. Your training should be too

Cybercrime is an ever-evolving threat, and it's crucial to adapt and stay ahead. The increasing recognition of the value of cybersecurity awareness training among businesses is a positive trend.  However, moving away from the "one-and-done" mindset is vital....

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05