Ask Dave Taylor
  • Facebook
  • Instagram
  • Linkedin
  • Pinterest
  • Twitter
  • YouTube
  • Home
  • YouTube Channel
  • Most Popular
  • Newsletter!
  • Ask Me A Question
  • Meet Dave
  • Home
  • Computer & Internet Basics
  • Beware the latest Wells Fargo Phishing Attack

Beware the latest Wells Fargo Phishing Attack

June 1, 2015 / Dave Taylor / Computer & Internet Basics, Spam, Scams & Security / 4 Comments

Criminals are constantly trying to separate us from our account and personal financial information. That’s not news. Usually what they do is pretty lame, but sometimes it can be surprisingly well crafted. Like a notice I got over the weekend from “Wells Fargo Bank”…

  ★ ASKDAVETAYLOR WEEKLY EMAIL! ★
Guaranteed to Make you Smarter.
Click Here to Subscribe.

As soon as we started to trust the Internet and share personal information, it became clear to crooks that if they could somehow trick us into sharing that information with them, they could use it to purchase things, apply for loans, get new credit cards, and much worse. The price of our online system is vigilance, and sometimes it’s easy to let that slip and inadvertently come close to giving them just the information they want.

I bank at Wells Fargo Bank and have done for many years, and this weekend I received an email from the bank about an overseas ATM transaction that I knew I hadn’t made. Had I been scammed? Had someone actually taken my ATM information and used it in a foreign country to tap into my account?

Here’s the email as received:

bogus phishing email wells fargo

Looks legit and because the sender’s email address was spoofed, mail from “@notify.wellsfargo.com” automatically is moved into my “Banking” folder, giving it an additional air of legitimacy.

Still, banks don’t just give you a button to click saying “not my transaction” and Wells is better than most with invitations to log in then use the site’s secure email facility for communications, not just regular email like this.

Moving my cursor over the button reveals the problem:

that's the wrong url destination address phishing

It’s a bit hard to read, but the link would actually take me to fec.org.au, which turns out to be the Freemantle Education Centre in Australia, of all odd places. Australia? A “.org”? That’s not the Wells Fargo site!

Here’s where it gets interesting. A smart, skeptical person would immediately say “Ha! Gotcha! Darn $#@$# Scammer!” and delete the email. But I decided to click on the button instead…

phishing attack ahead

First off, it’s great that Google Chrome automatically detects that there’s a dangerous destination ahead and warns me. Again, any rational person clicks “Back to safety” and they’re done. But I continued forward anyway…

Oh, and notice that we didn’t stay on the Freemantle Education Centre web site very long: it’s bouncing us to doitdestin.com for this phase of the attack, a site that’s been hijacked by cyber terrorists and has a big splash screen with a gun-wielding guy and lots of Arabic script.

Click through and you won’t see the Arabic side of things, however, you’ll get to what sure as heck looks like the home page for Wells Fargo:

bogus phishing wells fargo bank home page scam

A close examination of the URL shows that doitdestin.com/wp-content/plugins/vg/wellsfargo/index.html is the current URL, which is a long, long way from the real Wells site. Oh, and no secure connection either, another red flag.

But let’s say that you were suckered and did enter your username and password. What would you see next?

This screen:

super dangerous information request from phishing attack

Now you can see just what’s so incredibly dangerous with these attacks. Not only would they ostensibly be able to harvest your account credentials for Wells Fargo Bank — which they could then use to log in to your account and transfer your entire balance to their own accounts — but if you were completely taken in by the scam, they’d also get your SSN, a credit card number, you birthdate and a lot of other information that you really, really don’t want bad guys knowing.

This is why I keep saying the same thing to y’all: vigilance. Skepticism and vigilance. Be careful out there!

If you’re curious how I navigated the phishing site, just remember that since the criminals don’t actually have access to your account information, you can always use credentials like an account name of “not” and a password of “likely” to pass right on through the system. It’s not a valid account name or password, but that’s not really your problem, is it?

Enjoy watching videos? I've got hundreds of lively and interesting product reviews you can enjoy with just a click. Please check 'em out: AskDaveTaylor Video Gallery.

About the Author: Dave Taylor has been involved with the online world since the early days of the Internet. Author of over 20 technical books, he runs the popular AskDaveTaylor.com tech help site. You can also find his gadget reviews on YouTube and chat with him on X as @DaveTaylor.

Let’s Stay In Touch!

Never miss a single article, review or tutorial here on AskDaveTaylor, sign up for my fun weekly newsletter!
Name: 
Your email address:*
Please enter all required fields
Correct invalid entries
No spam, ever. Promise. Powered by FeedBlitz
Please choose a color:
Starbucks coffee cup I do have a lot to say, and questions of my own for that matter, but first I'd like to say thank you, Dave, for all your helpful information by buying you a cup of coffee!
online cyber-terrorism, online phishing, phishing attack, wells fargo bank, wells phishing attack

4 comments on “Beware the latest Wells Fargo Phishing Attack”

  1. Name says:
    June 27, 2015 at 11:30 am

    Dave, I recently got a similar attack, but without all the tedious clicking around. It appears to be a DNS hijack, but I can’t confirm. By simply going to the WellsFargo.com site an entering ANY login information, when you hit “Go” a popup screen appears asking for all the personal information that you were asked for (and more).

    I’ve run 6 different antivirus and malware scans and nothing has come up. This one is very insidious because it doesn’t modify the URL. I can still see it as https://www.wellsfargo.com.

    Have you seen this one yet?

    Reply
    • Dave Taylor says:
      June 27, 2015 at 3:18 pm

      Haven’t seen that attack, “Name”, but glad you’re vigilant and haven’t filled in the data. Wondering if it’s as simple as your DNS records being modified? Call Wells Fargo security (the local branch can give you their 800 number) and ask them to help you fix it. And do come back to let us know what’s going on…

      Reply
      • Name says:
        June 29, 2015 at 5:00 pm

        Thanks, Dave. Seems to only be affecting Firefox right now as I can get normal login screens with other browsers. When I mentioned this to Wells Fargo security, they recommended that I, “contact my computer manufacturer since it’s not on our side.” When I tried to remind them that this has been out for several years and surely they had seen it before and all I wanted was recommendations to fix it, they then recommended that I talk to my “software provider”. Useless information. I’ll try again at different times of the day to see if I can get someone who understands the problem and not just reading from a checklist.

        Reply
        • Name says:
          July 3, 2015 at 8:49 pm

          Hi Dave, this was a tricky one. I ended up having to uninstall Firefox, then do a “clean uninstall” according to these pages:
          https://support.mozilla.org/en-US/kb/uninstall-firefox-from-your-computer, and
          http://kb.mozillazine.org/Uninstalling_Firefox

          This didn’t quite seem to do it since I saw the bogus login screen the next time I installed Firefox. So I repeated the steps above and then went into the Windows Registry with regedit and deleted every occurrence of “Firefox” that I could find.

          A cleanup with CCleaner, a reboot, and a fresh reinstall of Firefox and it seems to have fixed it. Whew!

          Interestingly none of my antivirus, malware, or spyware scanners picked anything up.

          I also ran a check on the FBI website for the DNS Changer virus:
          https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

          I hope this helps someone else that sees this. I still don’t know what the source of this attack was or how I would have gotten it. Firefox is my primary browser, so I assume somewhere in my internet travels I may have clicked on something dodgy that installed some code into my Firefox installation.

          Thanks

          Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Recent Posts

  • How to Update the Software on your KOBO Ebook Reader
  • How to Change Your Default Web Browser in Windows
  • How to Check for Spam DM’s in Facebook Messenger
  • How to Automatically Close Your Garage Door with MyQ App
  • Best Time to Post on Facebook Business Pages?

On Our YouTube Channel

The NearHub Frames 10 Smart Photo Frame Really is SMART

Endless Cleaning with the Roborock Q10 S5+ Robot Vacuum & Mop

Categories

  • AdSense, AdWords, and PPC Help (106)
  • AI and ChatGPT Help (75)
  • Alexa, Kindle, and Nook Help (112)
  • Amazon, eBay, and Online Shopping Help (176)
  • Android Help (321)
  • Apple iPad Help (156)
  • Apple Watch & Smartwatch Help (63)
  • Articles, Tutorials, and Reviews (361)
  • Auto Tech Help (31)
  • Business Advice (202)
  • Chromebook & ChromeOS Help (80)
  • Computer & Internet Basics (847)
  • d) None of the Above (169)
  • Facebook Help (405)
  • Google, Chrome & Gmail Help (227)
  • HTML & Web Page Design (249)
  • Instagram, Bluesky & Threads Help (70)
  • iPhone & iOS Help (702)
  • iPod & MP3 Player Help (173)
  • LinkedIn Help (98)
  • Linux Help (182)
  • Linux Shell Script Programming (95)
  • Mac & MacOS Help (994)
  • Microsoft Outlook and Office 365 Help (53)
  • Most Popular (16)
  • PayPal Help (69)
  • Pinterest Help (58)
  • Reddit Help (24)
  • SEO & Marketing (83)
  • Spam, Scams & Security (130)
  • Trade Show News & Updates (23)
  • Video Game Tips (66)
  • Web Site Traffic Tips (62)
  • Windows PC Help (1,093)
  • Wordpress Help (207)
  • Writing and Publishing (72)
  • X/Twitter Help (233)
  • YouTube Help (54)
  • YouTube Video Reviews (159)
  • Zoom, Skype & Video Chat Help (80)

Archives

Social Connections:

Ask Dave Taylor


Follow Me on Pinterest
Follow me on Twitter
Follow me on LinkedIn
Follow me on Instagram


AskDaveTaylor on Facebook



microsoft insider mvp


This web site is for the purpose of disseminating information for educational purposes, free of charge, for the benefit of all visitors. We take great care to provide quality information. However, we do not guarantee, and accept no legal liability whatsoever arising from or connected to, the accuracy, reliability, currency or completeness of any material contained on this site or on any linked site. Further, please note that by submitting a question or comment you're agreeing to our terms of service, which are: you relinquish any subsequent rights of ownership to your material by submitting it on this site. Our lawyer says "Thanks for your cooperation."
© 2025 by Dave Taylor. "Ask Dave Taylor®" is a registered trademark of Intuitive Stories, LLC.
FTC Notice: If you buy products through links on this site we may receive a modest affiliate commission. This won’t affect the price you pay.
Privacy Policy - Terms and Conditions - Accessibility Policy - Humix Video Content
  • Home
  • YouTube Channel
  • Most Popular
  • Newsletter!
  • Ask Me A Question
  • Meet Dave