You are on page 1of 5

DEPARTMENTS

LAW OFFICE TECHNOLOGY

Tales from the Inbox


BY JEFFREY ALLEN

I
have spent a fair amount of evaluate whether you are being Interestingly, the next day’s
time writing about avoiding scammed. Given the severity of Chronicle contained an article
the risks associated with open- the problem, I decided that could titled “They’re Hacking People-
ing strange emails and exposing prove a topic of interest to many Not Systems,” bylined to Sean
yourself to having the bad guys of you, so here goes. Sposito. This article recounted
get access to your data and confi- the story of a young woman
dential information. I have had a who works for a tech startup
number of people ask me to write RECENT NEWS ACCOUNTS and was victimized by a phony
an article discussing some of the text message purportedly from
more common scams and how to Just to put things into a bit of Google. Are you beginning to
perspective, as I read the news- see a pattern here? The article
papers the other day, two arti- reported that the text message,
Jeffrey Allen is the principal cles caught my attention. One logo included, advised her that
of Graves & Allen, a small firm in of them appeared in the San her Gmail account was com-
Oakland, California, that, since 1973, Francisco Chronicle, reporting that promised. It told her that her
has emphasized negotiation, struc- the LeakedSource Web site had account logged in from an unfa-
turing, and documentation of real reported that it has a cache of 33 miliar location and that if she
estate acquisitions, loans and other million Twitter records, includ- had not done that, she should
business transactions, receiverships, ing passwords. The article noted respond with a security code that
related litigation, and bankruptcy. that Twitter denied that its sys- Google would send her. When
He also works extensively as an arbi- tems had been breached and sug- she did that, the hijacker gained
trator and a mediator. He is editor- gested that the information had, control over her email account,
in-chief of GPSolo magazine and most likely, come from malware- allowing access to any previ-
the GPSolo eReport and serves on infected browsers that captured ous emails and any confidential
the Board of Editors of Experience the information and transmit- information they contained. The
Magazine. He also served as a mem- ted it to hackers. (SF Chronicle, article goes on to say that over
ber of the Board of Editors of the 6/10/16, page C-1). The other the course of the next several
ABA Journal. Allen has served as a article appeared in the Wall Street days, the young woman fought
member of and liaison to the ABA Journal, bylined to Nicole Hong, with the hijackers for control of
Standing Committee on Technology and reported that two individu- the account in a war that saw the
and Information Services. Allen als entered not-guilty pleas to password changed 11 times by
regularly presents at substantive law charges in federal court that they the woman before she regained
and technology-oriented programs had broken into computer net- control of the account. The arti-
for attorneys and writes for several works of a dozen companies, cle also noted that some of her
legal trade magazines. In addition including J.P. Morgan Chase & friends had similar issues in the
to being licensed as an attorney in Company, as part of a global net- same time frame. The article,
California, he has been admitted as work of criminal activity. Other which references this approach as
a Solicitor of the Supreme Court of companies allegedly involved “social engineering,” reports that
England and Wales. He is an asso- included: E-Trade Financial Corp, Google refers to this as “manual
ciate professor at California State Scot-trade, Inc. and Dow Jones & hijacking”. (SF Chronicle, 6/11/16
University Co. (WSJ 6/10/16 page C-1). page D-1.) With a tip of the hat

196
TALES FROM THE INBOX 197

to Gertrude Stein and a nod to are too obviously scams to fool easy to fall for this one, but for
Shakespeare, a scam by any other anyone reading this column. one small detail: I have no-online
name is a scam, is a scam, is a The scam can play out a number relationship with Macy’s to reset.
scam! of different ways, none of them That fact made it clear to me
good. The “bride” may simply that, no matter how legitimate it
want to try to get money from may look, the email represented
SCAMS, SCAMS, SCAMS you to pay to bring her over here a scam. Undoubtedly the bad
to marry you (odds are she will guys sent it to any number of
I have titled this piece “Tales never show up, and you will addresses, anticipating that some
from the Inbox,” as I intend to never see the money again). On would have Macy’s accounts and
focus primarily upon examples the other hand, it may well be an that some of those people would
of the work of the bad guys that immigration scam to try to get fall for the request and provide
appears in the form of emails. I someone into the United States. their passwords to the hackers.
have collected a number of exam- The scams come in the form
ples from my own inbox and will of email purporting to be from
An Amateurish Recent
explore them with you to help stores, banks, politicians, admin-
Example
you understand how they are istrators in foreign governmental
suspicious and why you should posts, and even in the form of Now let’s look at a far more
stay away from such emails posers as officers of foreign com- amateurish approach. The other
should they appear in your inbox. panies looking for legal represen- day I received an email purport-
tation. Many of them present a ing to be from Janet L. Yellen.
highly amateurish approach, oth- If that name sounds familiar
ers, however, are fairly sophis- to you, it should; she chairs
Her account logged in from ticated. We will look at some the Board of Governors of the
an unfamiliar location. examples of both. Federal Reserve System. That
email read as follows:
Phony Web Sites
I will not bother with the Mrs. Janet L. Yellen
legion of emails that I have Many of the bad guys have Reply-To: Donald Mcgrath
received (and that I suspect many gone to the trouble of setting up Tracking number: 6823350549
of you have received) offering phony Web sites to try to pass
to sell various drugs for erectile them off as legitimate. Most of Dear customer.
dysfunction at discounts. By the the scams seek to obtain access
way, if you are a person of the to credit or bank accounts. Often This is to notify you that your
female persuasion and happen to they purport to come from banks, Recompense fund as approved
get them, don’t feel like the Lone sometimes from stores. For by the Federal Reserve Bank
Ranger. I know many women example, yesterday I received a have been transformed into an
who have received such emails. legitimate looking email purport- atm card and mailed already to
Whether they are selling what ing to be from Macy’s telling me you. Because we did not receive
they claim to is something I do that I needed to reset my pass- a confirmation of your mailing
not know. Nor is it something I word or they would cut off my address before the dispatch took
will explore. I would rather pay account. The email had a Macy’s place, it was mailed to a counter-
more and get my prescriptions logo and appeared for all pur- part here in USA whom volun-
filled by a pharmacy that I know poses to be from Macy’s. If you tarily agreed to receive it on your
is regulated than from a facility click on the enclosed link it takes behalf through DHL after paying
in another country where I have you to a Web site that appears to your mailing fee. Below are the
no such confidence. be Macy’s and asks you to reset tracking details:
I will also skip the many your password by first provid-
emails that seem to go around ing your current password and DHL Website: www. dhl.com
(again to men and women) offer- then typing the new password. It Tracking number: 6823350549
ing to get you fixed up with a looked very real and represents a
bride from Russia or from (pick sophisticated approach to email Note that the delivery had
a country, any country). Those scamming. It would have been been on transit but only arrived a
198 AMERICAN JOURNAL OF FAMILY LAW

while ago. You’re to contact him send an email on such a subject, my firm Web site and not as part
and let him have your mailing or that anyone would be send- of an email directed to “undis-
address where he shall mail the ing me recompense of $4.7 mil- closed recipients,” I was some-
card to. Kindly note that you’re lion for anything, those were what suspicious of it. I had it
to refund him the $158 which only the first clues that this was in mind that I would write this
he paid on your behalf before a scam. I had several other rea- article, so I elected to do some-
the mailing took place for him sons to know that the email thing I would not normally do
to mail the card to you. Send was a scam. By clicking on the in a suspicious circumstance: I
the fee of $158 to them via this name “Janet L. Yellen” at the responded to the inquiry. I sim-
below information. You are to top of the email, I got the email ply emailed back that we han-
use below information to send address for the so-called Janet L. dled that type of matter. The
the required $155 through money Yellen. It was “westernindustrial@ response that came back shortly
gram or Wal-Mart to Wal-Mart andinanet.net”. Nothing about after my email asked me to pro-
transfer to proceed the transfer that address suggests that it vide terms of representation and
process immediately. really came from Janet L. Yellen information as to the firm’s bill-
or from the Federal Reserve ing practices. The hacker also
Receiver Name: Emeline Board. Whenever I see a situa- asked for a copy of my represen-
Faulkner. tion like that, I presume that the tation agreement.
Country: United states of email is not legitimate. Although
America that approach is not foolproof, it
City: Roseburg Oregon. can identify phony notices. Other
Amount, $158 only things that put me on notice of She fought with the hijackers
something rotten in the inbox for control of her account.
You can call us or text SMS include: the unusual sentence
this number (762) 278-0239 structure, the many instances of
bad grammar, and the inconsis- Continuing my game of cat
Contact him through the email: tency in the text. These are not and mouse, I told them our bill-
(donaldmcgrath331@deliveryman. foolproof as, occasionally, even ing practices, my hourly rates,
com) and call them this phone the best of us makes a gram- and the amount of a deposit
number +1 (762) 278-0239. His mar error. It is, however, highly we would require. I also sent
name is Mr. Donald McGrath and unlikely that the real Janet Yellen them a copy of the form of our
his wife is Faulkner McGrath. would have sent an email as representation agreement, but
You must thank them very much badly structured grammatically not on letterhead and water-
since they saved you from losing as the one quoted. marked as a “SAMPLE” to pre-
this recompense tam card worth vent them from making any use
$4.7million united state dollars of it. They responded by send-
Attorneys as Targets
which was almost canceled as a ing me an email telling me they
result of your negligence. Not surprisingly, I have wanted to hire our firm and ask-
encountered some examples ing for information about our
Let them tell you how to send of scams designed specifically bank account so that they could
them back their refund of $158 to prey on attorneys. Because wire transfer funds to it. They
and make sure you send it to most of the people who read also sent documentation that
them so that they will mail your this column practice law, I will included what purported to be
card to you. talk about some of those scams. a contract, invoices, and sev-
I recently received an inquiry eral pieces of correspondence.
Confirm receipt of this email. through my law office Web site Nothing about the documenta-
asking if my firm handled breach tion appeared phony, but I was
Regards, of contract litigation, which, still pretty sure it was a scam. As
of course, we do. In fact, any- a result, I did not want to pro-
Mrs. Janet L. Yellen one who looked at the Web site vide our banking information,
would have known we handled so I simply responded that they
While it is certainly suspi- such matters. Despite the fact should send a check to us. They
cious that Janet L. Yellen would that the inquiry came through did not like that very much and
TALES FROM THE INBOX 199

pushed for the banking informa- fraudulent. I never heard from • Do not open emails from
tion. When I would not provide them again. unknown sources.
it they changed their tactics. This approach is not uncom-
I got an email from them tell- mon. I have had numerous rep- • If you get an email asking
ing me that they had notified the etitions of the initial letter from you to reset your password
buyer under the contract that a variety of companies in many or to log into an Internet
my office represented them and locations, almost all of which are account, be careful. Do not
that we were preparing litigation outside of the United States. I have use any link provided in
against them. The email told me not played cat and mouse with the email; odds favor link-
that the prospective defendant the others, as I thought one was ing to a phony site. Instead
had caved completely and would enough for this article. I have oper- log directly into the Web
be sending me a cashier’s check ated under the assumption that all site of the company and
for the balance owed under the were fraudulent, in part because of work from there.
contract (an amount in the low the fact they repeat almost verba-
six-figure range). Sure enough, tim the opening salvo. • If you get an email you do
the next day, we received what There are many other types not expect with an attach-
appeared for all purposes to be of email scams out there, and ment, do not open the
a cashier’s check from the buyer. any effort to discuss all of them attachment, as it might con-
The check was payable to our would require a book, not just an tain malware that can infect
office. Presumably the tactic article. I wrote this to give you and perhaps even take con-
would be to have us deposit it in some insight into the nature of trol of your computer.
our trust account and write the some of the issues that you face
scammer a check to transfer the due to the increasingly common If you have never heard of
money. use of the Internet and email by The United States Computer
all of us. I do not write it to sug- Emergency Readiness Team
gest that you should not use (US-CERT), it is a branch of
these facilities any more than I the Office of Cybersecurity
Keep software current; would suggest that you should and Communications’ National
updates may address not drive because a car can be a Cybersecurity and Communi-
security issues. deadly weapon. Rather I write cations Integration Center. Its
to urge you to use these facilities job is to analyze and endeavor
with great care, just as I would to reduce cyber threats and vul-
Still confident that this was a advise you to drive carefully and nerabilities, disseminating cyber
scam, I had my assistant take the defensively. threat warning information, and
check to the local branch of the coordinating incident response
bank, and they confirmed that activities. They wrote a very use-
the check was not legitimate. I SOME RULES TO PRACTICE ful piece on this subject titled
sent an email to the scammer “Recognizing and Avoiding
saying that they had no authority Some of the rules you should Email Scams.” I recommend
to send an email to anyone claim- practice: that you get a copy and read it.
ing we represented them, unless You can find it online at https://
and until we did. I also advised • Keep your software cur- www.us-cert.gov/sites/default/files/
them that we had received the rent as updates often publications/emailscams_0905.pdf,
so-called check and that it was address security issues. (last accessed October 16, 2016).
Copyright of American Journal of Family Law is the property of Aspen Publishers Inc. and its
content may not be copied or emailed to multiple sites or posted to a listserv without the
copyright holder's express written permission. However, users may print, download, or email
articles for individual use.

You might also like