Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat, to everyone’s security. Disguised as documents, voicemails, e-faxes or PDFs, malicious email attachments they are designed to launch an attack on the victim's computer when the attachment is opened.

For instance, according to an “anti-fraud alert” email someone tried to pay with your credit card and the “payment is hold”.

The email includes information about the amount, time, and IP address of the supposed transaction and features the logo of a popular online store, It suggests that you ask your bank manager to confirm the payment and then instructs you to click a link to “download the blank, fill it out and send it back”.

However, the email is not a legitimate transaction notification and it was not sent by a real online store.

If you click the link, you will first see a notification that falsely claims that the message has been checked by a security system. If you then click the “download” link in the notification, you will be redirected to a malicious website.
Malware may then be downloaded to your computer.

Details, such as the name and logo of the online store and the amount of the supposed purchase may vary in different versions of the malware email. 

Inboxes are also being hit by malicious emails purporting to be package notifications from delivery company DHL.
The emails claim that there was a problem with the delivery of your package because your shipping address contains a mistake. The emails, which include the DHL logo, urge you to click a link to access a form which will supposedly allow you to rectify the addressing error.

If you receive one of these messages do not click any links or open any attachments that it contains. It is always safest to login to your online accounts by entering the address into your browser’s address bar or via a trusted app.

HoaxSlayer 1         HoaxSlayer 2:    

You Might Also Read: 

Half Of UK Businesses Have Fallen For Phishing Attacks:

 

« Career Opportunities In Cybersecurity
Three New Free Cyber First Courses For Students »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BTWorks

BTWorks

BTWorks provides identity management and anti-phishing / smishing solutions for web and mobile apps.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

DarkLight

DarkLight

DarkLight Cyio is an AI-powered cyber risk solution that applies real-time threat intelligence and business context to risk prioritization.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.

Netarx

Netarx

Netarx provide real-time deepfake detection for enterprise voice, video and email.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.