Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat, to everyone’s security. Disguised as documents, voicemails, e-faxes or PDFs, malicious email attachments they are designed to launch an attack on the victim's computer when the attachment is opened.

For instance, according to an “anti-fraud alert” email someone tried to pay with your credit card and the “payment is hold”.

The email includes information about the amount, time, and IP address of the supposed transaction and features the logo of a popular online store, It suggests that you ask your bank manager to confirm the payment and then instructs you to click a link to “download the blank, fill it out and send it back”.

However, the email is not a legitimate transaction notification and it was not sent by a real online store.

If you click the link, you will first see a notification that falsely claims that the message has been checked by a security system. If you then click the “download” link in the notification, you will be redirected to a malicious website.
Malware may then be downloaded to your computer.

Details, such as the name and logo of the online store and the amount of the supposed purchase may vary in different versions of the malware email. 

Inboxes are also being hit by malicious emails purporting to be package notifications from delivery company DHL.
The emails claim that there was a problem with the delivery of your package because your shipping address contains a mistake. The emails, which include the DHL logo, urge you to click a link to access a form which will supposedly allow you to rectify the addressing error.

If you receive one of these messages do not click any links or open any attachments that it contains. It is always safest to login to your online accounts by entering the address into your browser’s address bar or via a trusted app.

HoaxSlayer 1         HoaxSlayer 2:    

You Might Also Read: 

Half Of UK Businesses Have Fallen For Phishing Attacks:

 

« Career Opportunities In Cybersecurity
Three New Free Cyber First Courses For Students »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.