1. There is no such thing as a "pending" ban or Steam admin. Anyone threatening your account is a scammer trying to scare you. Read more.

Do thos efree steam links count as phising?

Discussion in 'Discussion Archive' started by The Scammer is the spy, Jun 28, 2012.

  1. The Scammer is the spy

    The Scammer is the spy New User

    Messages:
    156
    Steam:
    STEAM_0:0:51533359
    If so theres a lot to report including this guy named red mage
  2. The Scammer is the spy

    The Scammer is the spy New User

    Messages:
    156
    Steam:
    STEAM_0:0:51533359
  3. The Scammer is the spy

    The Scammer is the spy New User

    Messages:
    156
    Steam:
    STEAM_0:0:51533359
  4. Champelliot

    Champelliot New User

    Messages:
    193
    Steam:
    STEAM_0:1:36236835
    If they do not ask for Steam usernames/passwords, then they tend to not be called phishing links. In most cases, reports of these chain spam sites are marked invalid. Wait for an admin response, however.
  5. SilentReaper(SR)

    SilentReaper(SR) Retired Staff

    Messages:
    11,991
    SteamRep Admin:
    STEAM_0:0:89705646
    As there are no actual "free" games unless free 2 play on Steam. It happens that some gaming community is giving away, but those have often a lot of legacy and way more "clout" then some strange link to a random site. Without examining the link, the site etc by us, its not really possible for us to get a clear view of it.

    in general:
    - faking steam site/login, easy to dispel ( http://forums.steamrep.com/threads/how-to-recognize-hijacking-sites.5772/ )
    - random site, but its popping up a "update" for some browser addon, generally said to be Flash. See previous.
    - a actual sophistical attack on your browser. This one is hardest to discern often. Here it comes down to experience and being able to see thru this. Unfortunately, I didn't have time to finish my http://forums.steamrep.com/threads/guide-to-prevent-hijacking.5437/ topic, for that would be most answers.

    Protection exists in the form of:
    - Having antivirus software like Avast, Eset NOD32 (sorry, AVG I very strongly advise to stay away from, not after having to clean up a bunch of computers which where infected while running AVG)
    - Having antispyware software (spywareblaster, spybot S&D, etc)
    - having MVPS Hosts installed, and auto-updating using for example the HostsMan program.
    - Using a browser plugin like "NoScript" for firefox to block Scripts etc
    - Updating your OS regularly
    - Updating your applications
    - update your browser
    - update flash & Java and other plugins
    - use a account with lower privileges then admin on your computer.
    - Sandbox your browser.

    Vulnerabilities come into your computer in most cases thru a website you visited, or you downloaded something. in order:
    - Browser >> having it in a sandbox prevents anything from permanently installing itself in the system
    - Scripts >> NoScript stops XSS and other sites linked into the visited page, you can be very selective on what sites you allow.
    - Flash, Java >> having it updated, keeps known vulnerabilities out.
    - Operating system >> once it goes beyond that, your OS's vulnerabilities come to play. If you're running as admin, without a sandbox, you are prone to allow anything that comes past it. Updating it patches the holes in it.
    - Other applications >> applications that aren't updated, pose a problem after this, for they may be (ab)used with that.

    Some have asked me about VPN/Proxy's in the past:
    Simply said: It does not protect you, really. It only obfuscates your real IP and anonymizes you. Its not a added layer of protection against attacks via a website. Or direct attacks to your place. In most cases its in the contrary even, for a lot of free proxy's are sandboxes, or boxes where ppl want to spy upon other ppl that uses them. MitM attacks are possible with that. Also it does NOT encrypt your communication end-to-end. There are solutions that may encrypt it between you and the VPN provider's exit, but those are often costly, but still allows the previous mentioned MitM attack. ONLY when end-to-end encryption ( HTTPS:// ) is used, your communications are not prone to MitM attacks. Its known for security engineers to just sniff the hell out of it, and get to know more about users of such then they would normally be able to.
    Yes, there may be reasons to use these kind of solutions, but those do not match with "securing" your system or protection against virusses/mallware etc.
  6. The Scammer is the spy

    The Scammer is the spy New User

    Messages:
    156
    Steam:
    STEAM_0:0:51533359
  7. Xel'Naga

    Xel'Naga New User

    Messages:
    202
    Steam:
    STEAM_0:0:11090427
    Not sure why you're bumping this. SilentReaper just explained to you what would or would not constitute as a phishing site.

    If you want to actually file a report on somebody you think may be spamming phishing links, you'll want to provide some actual information. The user's name, alone, isn't sufficient. A link to their profile page on SteamRep would work, along with any evidence of that person giving out phishing links.
  8. Jailbait

    Jailbait New User

    Messages:
    330
    Steam:
    STEAM_0:1:26285681
    Plso, advertising =/= phishing, make sure you don't confuse the two.