Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat, to everyone’s security. Disguised as documents, voicemails, e-faxes or PDFs, malicious email attachments they are designed to launch an attack on the victim's computer when the attachment is opened.

For instance, according to an “anti-fraud alert” email someone tried to pay with your credit card and the “payment is hold”.

The email includes information about the amount, time, and IP address of the supposed transaction and features the logo of a popular online store, It suggests that you ask your bank manager to confirm the payment and then instructs you to click a link to “download the blank, fill it out and send it back”.

However, the email is not a legitimate transaction notification and it was not sent by a real online store.

If you click the link, you will first see a notification that falsely claims that the message has been checked by a security system. If you then click the “download” link in the notification, you will be redirected to a malicious website.
Malware may then be downloaded to your computer.

Details, such as the name and logo of the online store and the amount of the supposed purchase may vary in different versions of the malware email. 

Inboxes are also being hit by malicious emails purporting to be package notifications from delivery company DHL.
The emails claim that there was a problem with the delivery of your package because your shipping address contains a mistake. The emails, which include the DHL logo, urge you to click a link to access a form which will supposedly allow you to rectify the addressing error.

If you receive one of these messages do not click any links or open any attachments that it contains. It is always safest to login to your online accounts by entering the address into your browser’s address bar or via a trusted app.

HoaxSlayer 1         HoaxSlayer 2:    

You Might Also Read: 

Half Of UK Businesses Have Fallen For Phishing Attacks:

 

« Career Opportunities In Cybersecurity
Three New Free Cyber First Courses For Students »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.