(Updated June 23, 2021)Hello Dear Ones,
It’s my turn to announce that a spoof email account using my name exists. The difference between the accounts is infinitesimally small so you’ll need to be alert and focused to spot it. Only a single period separates my true account from the spoof account: “.”
The spoof account contains a period “.” separating my first and last name. Please delete any messages that appear to come from me where the gmail sender address shows a period as in “veronica.wolfe” If an email message sounds a little off, it probably is. Trust your intuition and know that I would not ask anyone in this community for a personal contribution via email. Please do not respond to any email request from me to send money or gift cards or to purchase things on my behalf.
This opportunity is calling us to stay conscious and aware, and affirm that all is well!
If you have any questions, feel free to call the office at 937.2191 and a staff member will assist you.
Several of you have reported receiving spoof emails from me. This is becoming an unfortunate and increasingly common phenomenon -- especially targeting congregations.
You may receive something that comes from an email that looks like it would be my email, because it has my full name, but it is not. It may even have my picture on it! The emails invariably ask for your assistance right away. The scammer may ask you to buy gift cards or some other form of purchase on my behalf.
Please don't click on anything further or reply to it. Do check the address. If you do not know my correct email address or have any questions, feel free to leave a message on the office phone at 937.2191 and a staff member will get back to you with the correct information.
Let's pray those who are enacting these scams discover prosperity and fulfillment through honest means!
Spoofing and Phishing
Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.
For example, you might receive an email that looks like it’s from your boss, a company you’ve done business with, or even from someone in your family—but it actually isn’t.
Criminals count on being able to manipulate you into believing that these spoofed communications are real, which can lead you to download malicious software, send money, or disclose personal, financial, or other sensitive information.
Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to.
In a phishing scam, you might receive an email that appears to be from a legitimate business and is asking you to update or verify your personal information by replying to the email or visiting a website. The web address might look similar to one you’ve used before. The email may be convincing enough to get you to take the action requested.
But once you click on that link, you’re sent to a spoofed website that might look nearly identical to the real thing—like your bank or credit card site—and asked to enter sensitive information like passwords, credit card numbers, banking PINs, etc. These fake websites are used solely to steal your information.
Phishing has evolved and now has several variations that use similar techniques:
- Vishing scams happen over the phone, voice email, or VoIP (voice over Internet Protocol) calls.
- Smishing scams happen through SMS (text) messages.
- Pharming scams happen when malicious code is installed on your computer to redirect you to fake websites.
Spoofing and phishing are key parts of business email compromise scams.
How to Protect Yourself
- Remember that companies generally don’t contact you to ask for your username or password.
- Don’t click on anything in an unsolicited email or text message. Look up the company’s phone number on your own (don’t use the one a potential scammer is providing), and call the company to ask if the request is legitimate.
- Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.
- Be careful what you download. Never open an email attachment from someone you don’t know and be wary of email attachments forwarded to you.
- Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
- Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.
Source: FBI and FTC Websites