Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat, to everyone’s security. Disguised as documents, voicemails, e-faxes or PDFs, malicious email attachments they are designed to launch an attack on the victim's computer when the attachment is opened.

For instance, according to an “anti-fraud alert” email someone tried to pay with your credit card and the “payment is hold”.

The email includes information about the amount, time, and IP address of the supposed transaction and features the logo of a popular online store, It suggests that you ask your bank manager to confirm the payment and then instructs you to click a link to “download the blank, fill it out and send it back”.

However, the email is not a legitimate transaction notification and it was not sent by a real online store.

If you click the link, you will first see a notification that falsely claims that the message has been checked by a security system. If you then click the “download” link in the notification, you will be redirected to a malicious website.
Malware may then be downloaded to your computer.

Details, such as the name and logo of the online store and the amount of the supposed purchase may vary in different versions of the malware email. 

Inboxes are also being hit by malicious emails purporting to be package notifications from delivery company DHL.
The emails claim that there was a problem with the delivery of your package because your shipping address contains a mistake. The emails, which include the DHL logo, urge you to click a link to access a form which will supposedly allow you to rectify the addressing error.

If you receive one of these messages do not click any links or open any attachments that it contains. It is always safest to login to your online accounts by entering the address into your browser’s address bar or via a trusted app.

HoaxSlayer 1         HoaxSlayer 2:    

You Might Also Read: 

Half Of UK Businesses Have Fallen For Phishing Attacks:

 

« Career Opportunities In Cybersecurity
Three New Free Cyber First Courses For Students »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.