Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat, to everyone’s security. Disguised as documents, voicemails, e-faxes or PDFs, malicious email attachments they are designed to launch an attack on the victim's computer when the attachment is opened.

For instance, according to an “anti-fraud alert” email someone tried to pay with your credit card and the “payment is hold”.

The email includes information about the amount, time, and IP address of the supposed transaction and features the logo of a popular online store, It suggests that you ask your bank manager to confirm the payment and then instructs you to click a link to “download the blank, fill it out and send it back”.

However, the email is not a legitimate transaction notification and it was not sent by a real online store.

If you click the link, you will first see a notification that falsely claims that the message has been checked by a security system. If you then click the “download” link in the notification, you will be redirected to a malicious website.
Malware may then be downloaded to your computer.

Details, such as the name and logo of the online store and the amount of the supposed purchase may vary in different versions of the malware email. 

Inboxes are also being hit by malicious emails purporting to be package notifications from delivery company DHL.
The emails claim that there was a problem with the delivery of your package because your shipping address contains a mistake. The emails, which include the DHL logo, urge you to click a link to access a form which will supposedly allow you to rectify the addressing error.

If you receive one of these messages do not click any links or open any attachments that it contains. It is always safest to login to your online accounts by entering the address into your browser’s address bar or via a trusted app.

HoaxSlayer 1         HoaxSlayer 2:    

You Might Also Read: 

Half Of UK Businesses Have Fallen For Phishing Attacks:

 

« Career Opportunities In Cybersecurity
Three New Free Cyber First Courses For Students »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.