Home Computer Chase Fraud Alert Email

Chase Fraud Alert Email

by stacy

Phishing attacks target Chase Bank customers

Ever received an email claiming your bank had something wrong with your account? Even people who are savvy enough to spot scams and malicious messages may not be able to ignore the warning. Criminals want you to take their bait.

Learn more about cybersecurity

Armorblox, an email security provider, examined two recent Phishing Campaigns aimed at Chase Bank customers. It also offered tips on how to avoid such scams in a report.

The first sent a credit card statement. The second alerted recipients that they could only access their accounts for unusual activity. Both campaigns had the same goal: to obtain your account credentials.

Spoofed Chase credit cards statement

The spoofed email had a subject “Your Credit Card Statement is Ready” and a sender named “Jp Morgan Chase”. The email itself looked and felt similar to Chase emails and contained links to view your statement or make payments. The email’s primary link led to a fake Chase login portal, where you were asked to enter your bank account details. Cybercriminals then captured the information.

Image: Armorblox

NameSilo hosted the landing page’s domain. Although it is a legitimate hosting company, cybercriminals can set up shop cheaply and easily to launch malicious campaigns. After being given a Spam Confidence level of -1, the emails were able to bypass spam filtering from Microsoft Exchange online Protection and Microsoft Defender For Office 365. This grade is based upon an analysis of whether the email was sent from a trusted sender or originated from an IP Allow server.

Spoofed Chase secured account workflow

The attackers posed as Chase fraud officers and claimed that they had restricted account access due to unusual login activity. The emails had a subject line “URGENT” and referred to “Chase Bank customer care”. The message contained a link that victims could click to confirm their account, and restore normal access. The link is clicked by the user and takes them to a landing page asking for their login credentials.

Related Posts

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More