[NTLUG:Discuss] Social Engineering Attempt
Paul Ingendorf
pauldy at wantek.net
Fri Feb 4 12:27:09 CST 2005
Been there done that the best you can do is make sure your employees are
aware of the attempt and make them conscious of what happened so they might
be more alert for future attempts. You can also contact the company in
canada find out what they do etc... More than likely they have an open pbx
that enables people to dial in and get an outside line. You would be
surprised how many receptionists will blind transfer you to extension 9xxx.
There are also companies out there who will send out fake caller id
information so it may also have nothing to do with the company in canada.
-----Original Message-----
From: discuss-bounces at ntlug.org [mailto:discuss-bounces at ntlug.org]On
Behalf Of Courtney Grimland
Sent: Friday, February 04, 2005 11:52 AM
To: NTLUG Discussion List
Subject: [NTLUG:Discuss] Social Engineering Attempt
This isn't Linux-related, but maybe someone here can offer me some advice.
This morning I got a call on my company's tech support line from a guy
pretending to be an employee, asking for the admin password to our mail
server for maintenance or some such. The only info I have is the number
that showed up on Caller-ID which, according to Google, belongs to a
company in Canada. Is there anything I can do to investigate or report
this?
_______________________________________________
https://ntlug.org/mailman/listinfo/discuss
More information about the Discuss
mailing list