CloudFlare Cautions Clients about Phishing E-mail Attack
CloudFlare, which is popularly known to run network for content supply as well as for servicing distributed DNS, has alerted its consumers regarding one currently spreading phishing electronic mail campaign, published HELP NET SECURITY during the 2nd-week of November 2012.
Addressing recipients as cloudflare.com clients, the phishing electronic mail tells the reader that his domain account with CloudFlare service website can no longer upload new content at the prevailing scheme of payment. Therefore, for continuing his account as before, the company suggests that he switch to one improved payment scheme alternatively reduce his uploading limit via the utilization of code most favorable, the e-mail adds.
A client of CloudFlare while sharing on the customer care site of the company wrote that although he should've determined it was a phishing e-mail since the message rather than coming at his CloudFlare id came at his WHOIS id, he got trapped into the ruse only late evening that day. In short as a minute, he realized the phishing nature of the e-mail and promptly reset his password for the CloudFlare website, he wrote. Networkworld.com published this during the 2nd-week of November 2012.
Another client stated that he received the particular e-mail, while expressed embarrassment at telling that he believed it. Actually, he had just a while ago, did some reconfiguration on CloudFlare therefore, logically enough he might've surpassed certain limit. He was concentrating on CloudFlare methodology of uploading and elimination, thus it was merely the incorrect instance the phishing message came into his account, the client added. Networkworld.com published this.
Remarking about the above phishing assault, Senior E-Threat Analyst Bogdan Botezatu at BitDefender an anti-virus firm stated that it was an extremely targeted assault since mention of the domain name related to CloudFlare (with respect to the attacked A/Cs) was exact. Cio.com published this during the 2nd-week of November 2012.
Eventually, for avoiding any monetary loss due to the phishing scam, CloudFlare has urged subscribers against clicking any web-link inside the e-mail. But incase anybody has done so and become trapped then he should set a new password for his CloudFlare account right away.
» SPAMfighter News - 11/22/2012
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!