{"id":11370,"date":"2022-10-24T12:55:21","date_gmt":"2022-10-24T12:55:21","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=11370"},"modified":"2023-11-01T16:54:06","modified_gmt":"2023-11-01T16:54:06","slug":"norton-spam-email","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/norton-spam-email\/","title":{"rendered":"What is Norton Scam Email? Tips to Protect Yourself"},"content":{"rendered":"<p>Norton scam email is a tricky phishing campaign that pretends to be an official mailing from Norton. It generally aims at users\u2019 sensitive information, including banking data. Let\u2019s figure out what these spam emails are, how dangerous they are, and how you can counteract them.<\/p>\n<h2>What is Norton Scam?<\/h2>\n<p>Norton scam email is a common name for dubious emails that may come to anybody, regardless if they are the users of their products or not. These emails may potentially contain different text and disguise, <a href=\"https:\/\/gridinsoft.com\/phishing\">same as any other phishing<\/a>. But the most common is a notification <strong>about the subscription purchase or renewal<\/strong>. People receive a message that says their card was charged with a hefty sum, and to cancel it and receive a refund you should follow the instructions. <strong>The sum varies from $200 to $1000<\/strong>. This is not very realistic as these emails usually come to single users, who will never buy a corporate license or a one for 10+ machines.<\/p>\n<figure id=\"attachment_11373\" aria-describedby=\"caption-attachment-11373\" style=\"width: 829px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-invoice.png\" alt=\"Norton scam email\" width=\"829\" height=\"798\" class=\"size-full wp-image-11373\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-invoice.png 829w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-invoice-300x289.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-invoice-768x739.png 768w\" sizes=\"auto, (max-width: 829px) 100vw, 829px\" \/><figcaption id=\"caption-attachment-11373\" class=\"wp-caption-text\">Fake invoice from Norton<\/figcaption><\/figure>\n<p>Still, the sum is pretty scary and attracts the user&#8217;s attention. Phishing Norton emails may occasionally contain <strong>a link to a third-party site or a contact number of tech support<\/strong>. Both of them, as you can already guess, have nothing to do with the real services of a company. Villains may use a single phishing page <a href=\"\/blogs\/amazon-phishing-email\/\">for multiple spam campaigns<\/a>.<\/p>\n<figure id=\"attachment_11374\" aria-describedby=\"caption-attachment-11374\" style=\"width: 880px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-1000.png\" alt=\"Norton email scam\" width=\"880\" height=\"478\" class=\"size-full wp-image-11374\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-1000.png 880w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-1000-300x163.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/nlok-1000-768x417.png 768w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><figcaption id=\"caption-attachment-11374\" class=\"wp-caption-text\">The example of a letter that states the sum of almost $1000<\/figcaption><\/figure>\n<p>The link may be plain text, as well as inside of the button or email text. It leads you to a phishing page, that will ask for your personal information \u2013 name, email address, phone number, et cetera. In some cases, they can ask you about the <strong>bank card details, including the security code (CVV\/2)<\/strong>. Later, this information will be used against you \u2013 after selling it to a third party <a href=\"https:\/\/gridinsoft.com\/darknet\">on the Darknet<\/a>.<\/p>\n<p> The Tech support number is no good as well. There, <a href=\"https:\/\/howtofix.guide\/fastsupport-com-scam\/\" target=\"_blank\" rel=\"noopener nofollow\">crooks who mimic the real support<\/a> will try to lure out your sensitive information, same as in the case with a link. The other thing which repeats the previous method is the behavior around the collected data \u2013 <strong>they sell it on Darknet forums as well<\/strong>.<\/p>\n<h2>How dangerous is the Norton scam email?<\/h2>\n<p>Same as any other phishing, it aims at grabbing as much personal information as possible. At a glance, you may think it is not that bad, as <a href=\"https:\/\/gridinsoft.com\/data-breaches\">you share this information<\/a> with different online services too. However, most of them keep this data a secret, as there are data protection laws that punish data selling. Meanwhile, <strong>phishing actors are not bound by any kind of laws<\/strong>, as the very essence of phishing is outlawed.<\/p>\n<figure id=\"attachment_11376\" aria-describedby=\"caption-attachment-11376\" style=\"width: 950px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/darknet-prices.jpg\" alt=\"Darknet leaked data prices\" width=\"950\" height=\"600\" class=\"size-full wp-image-11376\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/darknet-prices.jpg 950w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/darknet-prices-300x189.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/darknet-prices-768x485.jpg 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><figcaption id=\"caption-attachment-11376\" class=\"wp-caption-text\">Darknet prices for leaked data, divided by different types<\/figcaption><\/figure>\n<p>It is unlikely to meet a benevolent person among the buyers for leaked information on the Darknet. If you\u2019ve shared your personal information, that will be the base for <a href=\"https:\/\/gridinsoft.com\/blogs\/phishing\/\">more precise, spear phishing<\/a>. Crooks will try <strong>to perform a more sophisticated fraud<\/strong> to make you pay them by mimicking a thing you\u2019re expecting. Leaked bank card details, on the other hand, give them the ability to manage your money as they want \u2013 and they can find a way to circumvent the bank\u2019s safety measures. Carding has become way less widespread over the last 5 years, but remains a threat.<\/p>\n<h2>How to avoid being fooled with email scams?<\/h2>\n<p>There are a few rules that will help you to detect and avoid any questionable emails. They do not require anything specific and only rely on your attentiveness. <strong>Even the most sophisticated scams cannot be 100% identical<\/strong> <a href=\"https:\/\/howtofix.guide\/ibm-and-check-point-researchers-named-brands-that-are-most-commonly-used-in-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">to genuine emails<\/a>. When it comes to some massive mailing with low-quality phishing emails, it is very easy to bust their disguise.<\/p>\n<h3>Unrealistic claims or offers<\/h3>\n<p>Do you really think Norton <strong>will charge you without your knowledge<\/strong>? Or offer a 1-year license for free, just for taking part in a quiz? When the things in the letter look untrustworthy, get some other ways to verify such offers. For example, you can check your bank account and see if there were any debit operations as described in the letter. On the official Norton website, you can see if there are any active subscriptions, and also promotions or giveaways. Still, <a href=\"https:\/\/gridinsoft.com\/spam\">emails may repeat the promotions<\/a>, but contain a different link, so you will get into a fraud either.<\/p>\n<h3>Email addresses<\/h3>\n<p>No one can copy the email addresses of genuine mailing services, used by companies. And phishing actors sometimes don\u2019t even try to \u2013 they apply <a href=\"https:\/\/gridinsoft.com\/blogs\/geek-squad-email-scam\/\">using hijacked accounts<\/a> or single-use emails, created only for spamming. Hence, seeing a letter that pretends to be a message from Norton, and is <strong>sent from ol1209130@bilibili.com is already fishy<\/strong>. In advanced scams, crooks <a href=\"https:\/\/gridinsoft.com\/spoofing\">may try to spoof the genuine address<\/a> by changing the letters with numbers, to make them harder to distinguish from real ones in haste. For example, you may witness the <strong>nort0nsupp0rt@norton.com instead of support@nortonlifelock.com<\/strong>. Here is the list of address domains used by Norton in their official mailing \u2013 crooks cannot use or counterfeit it in any way.<\/p>\n<figure id=\"attachment_11381\" aria-describedby=\"caption-attachment-11381\" style=\"width: 838px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/fake-email.png\" alt=\"Fake email Norton scam\" width=\"838\" height=\"488\" class=\"size-full wp-image-11381\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/fake-email.png 838w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/fake-email-300x175.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/fake-email-768x447.png 768w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><figcaption id=\"caption-attachment-11381\" class=\"wp-caption-text\">The example of a fake Norton invoice sent from the email address of individual user. Probably, it was hijacked earlier.<\/figcaption><\/figure>\n<div class=\"su-spoiler su-spoiler-style-default su-spoiler-icon-plus su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>List of genuine Norton email addresses domains<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\"><div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n@nortonlifelock.com<br \/>\n@norton.com<br \/>\n@identity.norton.com<br \/>\n@login.norton.com<br \/>\n@securenorton.com<br \/>\n@secure.norton.com<br \/>\n@lifelock.norton.com<br \/>\n@mylogin.norton.com<br \/>\n@myidentity.norton.com<br \/>\n@family.norton.com<br \/>\n@lifelock.com<br \/>\n@mail.nortonstore.hk<br \/>\n@mail.nortonstore.cn<br \/>\n@mail.nortonstore.tw<br \/>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n@mail.nortonstore.kr<br \/>\n@mail.nortonstore.jp<br \/>\n@mail.norton.com<br \/>\n@email.norton.com<br \/>\n@e-mail.norton.com<br \/>\n@identityprotection.norton.com<br \/>\n@subscriptions.norton.com<br \/>\n@zuberance.com<br \/>\n@ifeelgoods.com<br \/>\n@trustpilot.com<br \/>\n@club-off.com<br \/>\n@m.onetrust.com<br \/>\n@cleverbridge.com<br \/>\n@creditview.co.uk<br \/>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<h3>Typos and poor email design<\/h3>\n<p>Can you imagine official letters from a worldwide-known company, whose <strong>design is poor and the text is full of errors?<\/strong> Most companies hire several writers who review the patterns used for automated emails and check up on all hand-made correspondence. Seeing a genuine letter that looks like a kid&#8217;s scribble is hardly a case. Be sure that <a href=\"https:\/\/gridinsoft.com\/blogs\/phishing-top-5-signs\/\">it is likely a scam<\/a>; you can additionally confirm your expectations <strong>by looking for the signs we mentioned above<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Norton scam email is a tricky phishing campaign that pretends to be an official mailing from Norton. It generally aims at users\u2019 sensitive information, including banking data. Let\u2019s figure out what these spam emails are, how dangerous they are, and how you can counteract them. What is Norton Scam? Norton scam email is a common [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":11387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4],"tags":[1007,131,674,681],"class_list":{"0":"post-11370","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"tag-norton","9":"tag-phishing","10":"tag-phishing-scams","11":"tag-spam-email"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/norton-spam-email.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/11370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=11370"}],"version-history":[{"count":17,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/11370\/revisions"}],"predecessor-version":[{"id":17434,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/11370\/revisions\/17434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/11387"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=11370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=11370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=11370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}