logo
episode-header-image
May 2016
11m 9s

Case study: Verifying a link before clic...

Scott Johnson
About this episode

One of the most dangerous things you can do with your computer is to click on a link when you don’t know where that link will take you. It doesn’t matter if it’s a Facebook link from someone you barely know, or a loving email from your dear sweet mother – don’t click on a link without knowing where it goes!

 

This is wonderfully illustrated this past week in an email I got from my friend and long-time client Marge. She got an email that was supposedly from Paypal Customer Service, asking her to verify her account using a link that just said “CLICK HERE”. She wisely did not click on it and just forwarded it to me to verify that it was a scam.

Here’s the email:

 

With a lot of scams, the email sender will at least spoof the “From” address so that it looks like it came from Paypal. In this case, the scammer was just too lazy I guess. Obviously that is not an email address for Paypal Support.

But more importantly, the message in the email asked her to click on a link to “verify” her account (this was another red flag, since Marge does not have a Paypal account). And even if she did have a Paypal account, Paypal would never ask  you to do this. They know that any security-conscious user would not click that link. Here’s why.

There are two components to any link: the link text and the link address.

The link text are the words you can actually see; the text that you are supposed to click on. In this case, the link text is “CLICK HERE”. That text can be anything the writer wants it to be. It doesn’t have to be anything related to where the link address goes.

The link address is the actual website where you’ll be sent when you click on the link text. In a lot of cases you can’t see the link address; you can only see the link text. That’s what makes this a little tricky.

In fact, the link text could even be a website address, and you could click on it thinking that was also the link address, but the link address could be completely different. For example, the link below says it’s supposed to be for the Ford automobile website, right? But if you actually click on it (it’s safe if you want to try it), it will instead take you to the Chevrolet website. That’s because the text says Ford, but the address is for Chevy.

http://www.Ford.com

In the case of the email shown above, all we see is the link text. How do we find out what the actual address is? Well, the WORST way to find out is to just click the link and see where it takes you – don’t do that, no matter how tempting it might be!

What you should do instead is RIGHT click on the link text, and choose “Copy Hyperlink” or “Copy link address” or something similar:

 

Then, open up a plain text editing program on your computer. In Windows, Notepad is perfect for this. When you have that open you can click Edit – Paste, or just right-click in the white area and choose Paste from the menu that pops up. In this case, here is what was shown as the link address:

 

Well, isn’t that interesting! Sure doesn’t look like a Paypal website address, does it?

Bitly is actually what’s called a link-shortening service. If you want to send a link to someone but it’s one of those really long ones, you can paste it in at the Bitly website (www.Bit.ly) and they’ll create a much shorter link for you, which will actually redirect to your longer link address. It’s a legitimate and useful service, but unfortunately it gets used by scammers in order to hide the REAL website address where they want to send you.

So we have the Bit.ly address – how do we know where that’s going to lead? There’s a little trick to that. When you copy and paste a Bitly address into your web browser (such as Firefox or Chrome), add a “+” (a plus sign) after it and hit Enter. Instead of taking you directly to the end website address, Bitly will instead give you a preview of where it leads, and THEN you can decide if you want to go there or not. It’s a handy security feature built into Bitly, which you should definitely take advantage of. So we put this into the web browser:

and here’s the preview that Bitly provides for us:

It doesn’t take much of a security expert to determine that “huytv.ml.silentroom.cf” is not a website address for Paypal Customer Support.

I was curious about the “.CF” that came at the end of that address though. It was not one that I was familiar with. The more common ones are easy to identify – .CA means it’s based in Canada, .gov means it’s either the federal or state government here in the US, etc. When I checked on what the “.CF” originated, here’s what I found:

 

Unfortunately, it’s not a big surprise to see that it came from Africa – that’s where a lot of internet scams originate. Probably the biggest majority are in Nigeria though. So this email could have come from an organized spammer/scammer group that’s raking in a lot of money from this activity, or it could be some teenager sitting in an internet cafe, sending out emails and hoping to get lucky when someone clicks on one of them. Stay alert and suspicious so that you’re not a victim!

The post Case study: Verifying a link before clicking on it first appeared on The Computer Tutor.
Up next
Nov 2021
386 The Norton and McAfee billing scam
I’m still seeing a LOT of these showing up, and clients still contact me to see if they are legitimate. Here’s how to identify this scam. There’s a good chance you’ve gotten one of these emails at some point over the past several months. The scammers have been sending out a LOT o ... Show More
8m 26s
Nov 2021
385 How to download all of your Google Photos images
Do you have all your photos automatically saved to your Google Photos account? What if you want to download all those photos and save them to your computer? Here’s how. Storing all of your photos on Google Photos is a good thing. It’s kind of like an automatic backup for the phot ... Show More
8m 13s
Oct 2021
Blocking Windows 11 from coming in
If your computer is currently running Windows 10, like most Windows computers currently are, there’s a new major update that’s just been released – it’s Windows 11. It’s not something you want yet. For quite some time, Microsoft said that the last version of Windows would be Wind ... Show More
9m 10s
Recommended Episodes
Oct 2024
Google’s First Link Bias
E466: Google’s First Link Bias, also called the First Link Counts Rule, is both weird and notable. Google has a bias towards the first link on a page. This applies to both internal links and external links. Google has a bias. And this bias gets even stranger when image links are ... Show More
6m 25s
Aug 2023
Exercise caution: online shopping edition.
Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one listener writes in for some clarification on the "AI versus AI" episode regarding Go ... Show More
55m 25s
Jan 2023
Ransomware (noun) [Word Notes]
Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key. CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gt ... Show More
7m 46s
Apr 2025
Hello? Is it malware you’re looking for? [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil ... Show More
37m 37s
Nov 2016
Daily: It walks, it talks, it reports to Shanghai. Locky takes a run at US Army Cyber Command. CrySis decrypted. SpamTorte 2.0 is out. Adults should be warned off by "adult."
In today's podcast we hear about a backdoor Kryptowire has found preinstalled in some Android phones. We speak with Ryan Johnson, the researcher who discovered the vulnerability.  The Locky ransomware takes a run at US Army Cyber Command. CrySis ransomware is decrypted. SpamTorte ... Show More
18m 18s
Jul 3
Brushed aside: The subtle scam you didn't order.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making ... Show More
44 m
Apr 2025
Not-so-real deals.
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow- ... Show More
46m 12s
Feb 2025
DeepSeek JailbreakYields System Prompt and Open AI Link: Cyber Security Today for Monday, February 3, 2025
Cybersecurity Threats: Fraud in Canada, DeepSeek AI Jailbreak & Toll Scams - Exclusive Interview with Ivan Novikov In this episode of Cybersecurity Today, host Jim Love discusses the alarming $638 million lost by Canadians to fraud in 2024, with investment fraud being the most si ... Show More
26m 20s
Mar 2025
Scams in the henhouse.
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We ... Show More
34m 38s