Yolo FCU SMS Phishing Scam Lessons

I’ve gotten reports from a few people about an SMS phishing scam that is targeting customers of a small credit union near Sacramento, CA. Ordinarily I’d just ignore it as one more bit of flotsam in the teeming sea of junk that’s on the net, but this one has a few interesting aspects.

Here is the text that has been going out to cell phones in the 530 area code [1]:

From: NOTICE3319@yolofcu.org

NOTICE: Your YOLO-FCU CARD starting with 4661* has been put on hold. Please call us at (888) 819 9661.

Calling the line (which is still active as of this morning, 6/19) gives you a synthesized-voice prompt:

Thank you for calling Yolo Federal Credit Union 24 hours (sic) credit activation services.

For card card activation, press 1.
To change your pin, press 2.
To end this call, press pound.

The usual first line defense of simply reading the text (and listening) in this case should be a least a mild tipoff. The first detail that jumps out is the use of the first four digits of the account number (“starting with 4661”)[2]. Banks and card issues always refer to accounts by the last four digits, because the first four are always the same for a given issuer; they’re called the Issuer Identification Number (IIN). What’s particularly devious about this detail is that it lends false credibility to the phish because it invites users (victims) to improperly generalize from the familiar security practice of referring to an account by only the last four digits.

The next detail that seems a bit incongruous is the synthesized voice message. While not entirely unknown, one might expect a reputable credit union to use a real voice in the recorded message (if only for customer service reasons).

Other than those couple details (and the fact that no bank should ask for the information it’s requesting), this is a pretty decent phish. I give it a C+.

Feeling Insecure Is As important as Feeling Secure

Using SMS is a new twist, and is devious for the same reason the IIN was. The use of the cell phone as out of band (OOB) authentication (for email, banking and brokerage accounts) is beginning to permeate the public consciousness. Likewise, SMS doesn’t (in the US) typically get spam or solicitors the way email and land lines do, so it has a bit more of an aura of authenticity. These two pieces help make this particular incident nastier than your average phish.

We all need to remember that the more something feels secure, the more value there is to the criminal in subverting it or co-opting it. User training and UI design can’t just be about making users feel secure, it has to be about making them feel secure when they are actually secure, and likewise (and just as important) making them feel insecure when they are actually insecure.

If you regularly teach your users to “look for the lock icon” when connecting to a secure site, it can’t just be rote (though I know sometimes that’s what we have to settle for). What we should also teach along with it are the implications of what it means when the lock isn’t there. This is the type of knowledge that can help internalize and instinctualize security behavior (yes, I made up a word).

Banks: Please Meet Us Halfway

The last thing that I thought was interesting was the website for the real Yolo Federal Credit Union.

Here’s what I saw when I visited:

Wow, nothing about the scam? Seriously? That’s unconscionable. Oh wait, let me turn off NoScript:


Here’s a catch 22 for YFCU; I’m sure they would advocate secure browsing practices (using NoScript while doing online banking is a no-brainer), and yet users trying to do that right wouldn’t see this important security information on the site. You’ll notice that it’s all an image, and wrapped inside a flash object. So, again a plea to site designers banks and everyone else; please, at least meet your security conscious users half way.

[1] I’m including the entire text of the scam message to raise the visibility of

[2] Similarly, the first five digits of a Social Security Number (e.g. 224-87-XXXX) are also fairly public information. Data that is presumed private has the effect of legitimizing a communication, making it all the more important to help users differentiate public and private data.

3 Responses to “Yolo FCU SMS Phishing Scam Lessons”

  1. Sara Says:

    Ive gotten the YOLO FCU text message 8 times today….

  2. traci Says:

    Just got the text message from notice@vzwpix.com. since I don’t bank there, I googled and found this. Thanks for the heads up!!

  3. Hoffmans Says:

    We got similar message and googled and found this site as well, thank you. Here was our message from “info@vzwpix.com”. Message was: “(NOTICE)Loudoun-CU-Your CARD starting with 4429 has a temporary HOLD. Please call 703-286-7410..” Did a reverse lookup on phone & it was a land line in Arlington, VA. Tried to reply via text message saying msg was forwarded to U.S. Secret Service Credit Fraud Investigation team but text msg was un-deliverable.

Leave a Reply