Alerts left arrow right arrow   

Fake and Malicious Email - Acorn Engineering Limited Trading - Court Action

Comments  +
Fake and Malicious Email - Acorn Engineering Limited Trading - Court Action

The email message below with the subject: "Acorn Engineering Limited trading," has a malicious attachment that will infect your Windows computer if you open it. The message was not sent by Acorn Engineering Limited, but was created and sent by cyber-criminals to trick the recipients into opening the malicious attachment that contains a virus, by threatening that they need to make payment, or legal action will be taken against their companies.

The Virus Email Message

Subject: Acorn Engineering Limited trading
Attachment: 20 October 2014:

October 20, 2014
Head Office
Acorn Engineering Limited trading as Acorn Maintenance
Acorn House
20 Wellcroft Road

Tel: 01753 386 073
Fax: 01753 409 672

Dear ,

Reference: 48771955-A8

Court action will be the consequence of your ignoring this letter.

Despite our telephone calls on October 10 and our letters of September 25, 2014 and October 20, 2014, and your promise to pay, payment of your account has still not been received. If full payment is not received by October 22, 2014 court action will be taken against your company.

If you allow this to happen you will incur court costs and you may forfeit your company’s credit status because the name of your company will be recorded by the major credit reference agencies. This may deter others from supplying you.

You are also being charged debt recovery costs and statutory interest of 8% above the reference rate (fixed for the six month period within which date the invoices became overdue) pursuant to the late payment legislation.

To stop this from happening please pay in full now the overdue invoice which is also attached to this letter.

Yours truly,

signature-Mishenko.gif (626?272)
Nadine Cox,
Acorn Engineering Limited
Enclosure (Attachment)

The attachment "20 October 2014:" contains the malicious file "Invoice_7380901925299.xls.exe".

The cybercriminals behind the malicious email message aim is to trick the curious recipients into opening the malicious attachment, which will infect their computers with a virus or Trojan horse.

Once your computer has become infected with this malicious Trojan horse, the cybercriminals behind this email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cyber-crimes, or steal your personal and financial information.

Now, if you have already opened the malicious attachment, please do a full scan of your computer with the antivirus software installed on it. The name of the attachment may change, so be careful when opening email attachments.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

Please share with us what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward malicious or phishing email messages to us at the following email address:

Comments, Questions and Reviews

Comment(Total: 0)

Write a Comment, Review, or ask a Question or scroll down to view comments, reviews and questions made by others.

Would you recommend this article to a friend or family member?
Yes (0) No (0)   

Submit Comment Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.
All comments, questions or reviews will be examined for derogatory or indecent statements, spam or malicous code, before they are posted on this website.

More for you:
Warning! JavaScript is turned off or disabled! Some features on this website will not work.