Solved

IQ test yahoo IM spam

Posted on 2010-11-29
2
1,426 Views
Last Modified: 2013-11-05
For the IQ test yahoo IM spam, how does this virus work or is it even a virus?  

The machines of compromised users that I scan for malware have nothing, so I'm assuming it's just that their account has been hacked and their is nothing wrong with their machine (though it's funny that I got three today)

However, in researching this, it is recommended by various sites to do a complete scan on any computer a compromised user has used.  However, the real cure for a compromised user is to have them login to their yahoo account and change their password - quite generous that their account wasn't completely taken over and locked out.

This makes me wonder: Are their are elements of this that may be local to the machine or is it just a well intentioned overreaction?

(this is the phishing scam that takes you to a dutch site - mymindquiz.com - that has you enter your mobile phone number and they charge you every month for a fake "mobile content charge" )

0
Comment
Question by:Marketing_Insists
2 Comments
 
LVL 3

Accepted Solution

by:
noelmul earned 500 total points
ID: 34237784
It is just an overreaction to a point. That spam is a phishing attack to bill your phone. It is surprisingly difficult to get a refund as in general you are relying on the scammers to issue the refund. Generally the mobile company doesn't want to hear anything about it and will back away and not help you.

It is possible to be infected with a virus that will try and get your yahoo passwords etc so I think the idea is to play it safe in that if there is a suspicion of something funny going in then it is a good idea to change your password on a clean computer to be safe.
0
 

Author Closing Comment

by:Marketing_Insists
ID: 34240654
OK, thanks.  Yes, it's better safe than sorry.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Months ago my boss came to me with a simple request, “How can we minimize GoTo meeting accounts and also improve our integration and collaboration initiatives?”  Well the answer, with some research, was easy… Lync.  Lync provided us all the necessar…
Article by: Ahmedn1
Introduction Some developers today tend to use Skypekit in their applications to make it more interactive with the user. Skype API is very awesome indeed but the problem is it is only available in C++, Java and Python. I can't understand why Micr…
The goal of the tutorial is to teach the user how to instant message and make a video call in Skype.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now