Virus Email - "The ACH Transfer, Recently Initiated from Your Online Bank Account"
May 8, 2015
The email message below, which claims that a ACH transfer was initiated from the recipients' accounts is a fake and is malicious. The links in the email message will download a Zip or compressed file that contains a virus or Trojan horse that will infect the recipients' computers.
Please continue reading below.
The Fake and Malicious Email Message
The ACH transfer, recently initiated from your online bank account, was aborted by the other financial institution.
Aborted ACH transfer
Transfer Case ID: DRD718509208
Amount: 60521 US Dollars
Billing E-mail: <email removed>
Please go through the link you can find above to view the Word document with all necessary info about this case.
The cybercriminals behind the malicious email message aim is to trick the curious recipients into infecting their computers with a virus or Trojan horse.
Once their computers have become infected with a Trojan horse or some other malware, the cybercriminals behind this email message will be able to access and take control of their computers remotely from anywhere around the world. They may spy on them, use their computesr to commit cyber-crimes, or steal their personal and financial information.
Now, if you have already clicked on the link, downloaded and open the malicious file, please do a full scan of your computer with the antivirus software installed on it.
If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.
Click here for a list of email attachments you should never open, regardless of where they came from.
For a list of other virus email messages, please click here.
Remember to leave your question or comment, and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: email@example.com .
Alert and help your family and friends by sharing this article with them: