Is SubdoMailing the most dangerous phishing scam yet? • Blisstech Solutions

Picture this: You’re going about your day, checking your emails, when suddenly you see a message from a company you trust.

You think, “Great! That’s safe to read”. But hold on just one minute… this email is not what it seems.

It’s part of yet another scam created by cybercriminals to trick you into clicking malicious links or giving up sensitive info. It’s called “SubdoMailing,” and it’s as dangerous as it sounds.

What’s the deal?

Just like regular phishing attacks, cybercriminals pretend to be trusted brands.

But here’s how it works: These cybercriminals scour the internet for unoccupied subdomains of reputable companies. You know those extra bits in a web address that come before the main domain? For example, experience.trustedbrand.com. That ‘experience’ bit is the subdomain.

They find a subdomain that the brand is no longer using and is still pointing to an external domain that’s no longer registered.

Then, they buy the domain and set up the scam website.

So, you believe you’re clicking on experience.trustedbrand.com… but you have no idea it automatically redirects to scamwebsite.com.

The criminals are sending out five million emails a day targeting people in businesses just like yours.

Because these emails seem to come from a legitimate source, they often sail right past usual security checks and land in your inbox.

Here’s our advice to avoid SubdoMailing scams and keep your data safe and sound:

  • Be wary of any emails that seem even remotely suspicious. If something looks fishy, it probably is.
  • Consider investing in top-notch security software to keep the cyber criminals at bay. It might seem like an extra expense, but trust us, it’s worth it.

As always, if you need help with this or any other aspect of your email security, get in touch.

More Content

Outsourcing always beats DIY

Do you ever feel like you're juggling ten tasks at once to keep your business running? Marketing, sales, finances, IT… the list goes on! And somewhere in that chaos, your dreams for growth get lost. Enter Dave, a fellow entrepreneur who has created the same...

Tech Tip: How to Stay Cyber Safe at Christmas

CHRISTMAS SPECIAL!!! As we are on the countdown to Christmas, today's Tuesday Two Minute Tech Tip is on a (very tenuous) Christmas theme. As we all get ready for the big day we will be thinking of having a few days or even weeks off work and relaxing. Christmas is a...
Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Tech Tip: How to share files securely in Teams

Welcome to a new Tuesday tech tip video where we will be exploring how to share files securely with people outside of your organisation using Microsoft 365 and Teams. Microsoft Teams is a powerful tool that allows for seamless collaboration and communication within an...
Are you ready for next-gen email security? (YES!)

Are you ready for next-gen email security? (YES!)

Sick of spam emails? We have details of a cool new tool to help keep us better protected.

Tech Tip: How to use a Password Manager

This Tech Tip is a tip on how to manage your passwords. It's a long tip this week, but that's because there is a lot to tell! With so many things being done online now, passwords are needed constantly.  But with the advice that every password should be unique and not...
Video thumbnail

Tech Tip: Quickly add lines numbers and bullets in Word

Happy Tuesday everyone! Today's Tech Tip is a tip on how to use some of the formatting shortcuts in Word to add lines, bullets and numbers to organise your documents. If you use Word to write your documents, and 90% of people do, you will love this tip as it will show...
Protect your business from a data leak with Microsoft Edge

Protect your business from a data leak with Microsoft Edge

Keeping your data away from the wrong hands is a big challenge. But thanks to Microsoft Edge for Business, it’s just become easier. Here we tell you why.

How to use footnotes and endnotes in Word

Tech Tip: How to use footnotes and endnotes in Word

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you may need to expand on certain sentences without making the...
A mailbox with NO SPAM written on it

Spam emails are losing your business hundreds of hours every year

Spam emails: Very annoying and everyone hates them! They take up your time and make it hard for you to get other work done! A recent study found that each one of our employees could be losing 80 hours per year due the hassle associated with managing spam. That’s a LOT...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05