Entri ni sangat penting sila baca sampai habis tau. Just now, BW dapat email dengan title Maybank2u.com: Status Update. Banyak kali dah dapat dari Hong Leong la RHB la macam-macam la, tapi bila BW cuba buka, slalunya web tu dah di block. Tapi kali ni dari Maybank, lambat blok, BW dah call maybank dan email report to maybank. Jom tengok macamana modus operandi si penyangak ni.
Korang jangan la tertipu dengan email macam ni yer. Profile will expire? Tak Logik!
Asking for username. BW masukkan dummy nyer.
Asking for password. Siap ada notis, 'Your security image is currently unavailable. You will be required to select new security image after you log in' Pandai kan nak confusekan orang.
Ha, ni la key point nya. Cara si penyangak tu menipu. Nanti kat bawah BW story details yer.
Interface exactly sama dengan Maybank2u sebenar. Tapi setiap kali klik link yang lain, just loading non stop.
Ni part BW nak explain kat korang macamana modus operandi si penyangak ni. Ni bedasarkan BW punya logik tau :) Si penyangak ni memang ada depan PC. By the time kita masukkan real username and password, akan masuk kat database si penyangak ni. So, penyangak ni akan login kat Maybank2u sebenar guna username and password kita tu. Bila kita nak update info, kita kena masukkan TAC number, so kita pun klik kat Request a TAC number kat web fraud tu. So penyangak ni at the same akan buat transaction dan request TAC number kat Maybank2u sebenar. Kita pun dapat la sms TAC number dari maybank2u sebenarkan. Katakan kita tak baca sms betul-betul, kita masukkan TAC number tu kat web fraud, masuklah kat database si penyangak ni, dia pun cepat-cepat guna TAC number tu proceed transaction. Katakan transaction yang dia buat tu transfer duit, satu hari maximum boleh transfer RM3000 tu kot. So hati-hati yer semua.
Kalau korang nak tau si penyangak ni ada banyak domain. Sama ada dia seseorang yang ada banyak domain, ataupun penyangak ni bergroup. First time open link, go to rajaampatkalabia.com/cache/M2u/M2ULogin.doaction=Login.html. Yang ni dah diblock. Second time open link, go to fcwiltz.lu/wp-content/uploads/images/M2u/M2ULogin.doaction=Login.html. BW email lagi kot kat Maybank. FYI, fcwiltz.lu ni web kelab bola sepak oversea.
Actually, bila klik link, first go to, www.818printing.com/wp-includes/theme-compat/index.htm then redirect to link 1st yang BW mentioned. Bila link tu kena block, redirect kat 2nd link pula. Hopefully Maybank akan check details-details and block root dia la kan. (By 3.00pm, still belum block)
Harap entri ni akan buat korang semua berhati-hati. Kalau korang ada alami fraud macam ni juga, sila report kepada bank berkenaan. Untuk Maybank boleh call ke 03-58914744 atau email ke mgcc@maybank.com.my. Kalau boleh, share info ni yer, agar ramai yang alert pasal internet banking fraud ni.
Update: 17 Feb 2014, 2.30pm.
Link fcwiltz.lu/wp-content/uploads/images/M2u/M2ULogin (Still belum di block)
Just now receive reply email dari mgcc@maybank.com.my, dia tulis "we would appreciate that you continue to ignore and delete such phishing emails" haha.. hampeh nyer maybank Customer Interaction Service Fulfilment Unit, kita request dia minta do something supaya link tu kena block, dia just suruh ignore, (of course la kan) Normally bank-bank lain macam RHB dan Hong Leong awal-awal dah block link fraud bank diorang.
Update: 17 Feb 2014, 2.30pm.
Link fcwiltz.lu/wp-content/uploads/images/M2u/M2ULogin (Still belum di block)
Just now receive reply email dari mgcc@maybank.com.my, dia tulis "we would appreciate that you continue to ignore and delete such phishing emails" haha.. hampeh nyer maybank Customer Interaction Service Fulfilment Unit, kita request dia minta do something supaya link tu kena block, dia just suruh ignore, (of course la kan) Normally bank-bank lain macam RHB dan Hong Leong awal-awal dah block link fraud bank diorang.
Thanks For Viewing! By: BW (Buat Wanita)
No comments:
Post a Comment
TERIMA KASIH KERANA BERKUNJUNG DI 'BUAT WANITA', BLOG PERKONGSIAN CERITA, RESEPI & REVIEW. SUDI-SUDIKANLAH TINGGALKAN KOMEN DISINI KAY. THANKS :)