Outlook Malicious Message - "We Detected a Login Attempt with Valid Password to Your Email"
Mar 27, 2015
Sep 18, 2013
The email message below: "We detected a login attempt with valid password to your email using the reset password," contains a malicious attachment disguised as a PDF document. The attachment is a virus and will infect your computer if you open it. Also, do not click on any of the links in this email message or follow any instructions in it.
Please continue reading below.
Malicious Outlook Email Message
Dear Outlook User,
We detected a login attempt with valid password to your email using the reset password option by answering the security Questions and Answers from an unrecognized device on Sun, Sep 15, 2013 6:27 PM GMT-0300.
Location: United Kingdom, Manchester (IP=18.104.22.168)
Note: The location is based on information from your Internet service or wireless carrier provider.
Was this you? If so, you can disregard the rest of this email.
If this wasn't you, please follow the links below on the attached PDF file to protect your Outlook! account information from potential future account compromise:
To learn how to sign-in alerts like this one can help you to protect your account information, please view the attached PDF file.
This email message attempts to trick the recipients into opening the malicious attachment, by pretending to be a legitimate email message from Microsoft. The email message was not sent by Microsoft.
Never click on the links or open the attachments in these email messages. If you receive these email messages, please go directly to hotmail.com or live.com, and sign into your account. Microsoft will display any alerts or notifications after you have signed in.
Remember to leave your comment and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: email@example.com .
Alert and help your family and friends by sharing this article with them: